From: Jonathan H <pythonnut@gmail.com>
To: Peter Stephenson <p.w.stephenson@ntlworld.com>
Cc: zsh-workers@zsh.org
Subject: Re: Complex config triggering Segfault in pattern matching code.
Date: Mon, 15 Dec 2014 13:20:44 -0800 [thread overview]
Message-ID: <CAAW2-Zft+xzCfSYF4O9F5TnaYqODdr8P_ZisPTPHQK8qyeGuVw@mail.gmail.com> (raw)
In-Reply-To: <20141214182021.1944bbcd@pws-pc.ntlworld.com>
[-- Attachment #1: Type: text/plain, Size: 3029 bytes --]
It usually is, but for some reason I can't get it to crash in
valgrind. I forgot to tell you guys, but the crashes happen more often
when the user types rapidly. (Race condition related maybe).
Anyway, here's the STDERR from "valgrind -v -v". It shows some errors
or something so maybe it's still of use. I'll post if I can get it to
crash though.
On Sun, Dec 14, 2014 at 10:20 AM, Peter Stephenson
<p.w.stephenson@ntlworld.com> wrote:
> On Sat, 13 Dec 2014 20:40:32 -0800
> Bart Schaefer <schaefer@brasslantern.com> wrote:
>> On Dec 13, 3:36pm, Jonathan H wrote:
>> }
>> } $ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
>> } $(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
>> } PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"
>> }
>> } I've attached the output of gdb backtrace, watch and the headers.
>>
>> OK, thanks. If you look closely at that backtrace, you'll see that the
>> shell is actually inside the zle-line-init widget, which means that the
>> entire editor is just starting up:
>>
>> #364 "zle-line-init", arg=0x0) at zle_utils.c:1706
>>
>> This calls through here:
>>...
>> #280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181
>>
>> So at this point we haven't even finished initializing ZLE yet, but one of
>> these "auto-fu" functions has recursively invoked it. This is a recipe for
>> disaster if ever I saw one. I suspect recursive-edit should simply throw
>> an error if it's invoked from zle-line-init, but PWS may be able to speak
>> better to this.
>
> I'm not actually what would go wrong here.
>
> After zle-line-init runs (in zleread),the next thing we do is zrefresh()
> and then zlecore(). So I think it *has* finished initialising ---
> zrefresh() and zlecore() are the stuff that we can only do when zsh is
> set up and we can do them at this point.
>
> Indeed, zlecore() is basically what recursive-edit does, although
> there's quite lot in the way in the hook stuff in execzlefunc(). So if
> something's going wrong here it's the hooking rather than the not being
> started that should prevent a recursive edit. But I still don't know
> what it is we can't allow because of what.
>
>> At this point we're already either hosed or about to be because ZLE isn't
>> ready to be re-entered yet within zle-line-init
>
> I don't actually see why not, as I said above.
>
>> Oh-my-zsh syntax highlighting is known to tickle several subtle crash-
>> inducing memory errors
>
> This is probably more to the point.
>
>> #126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208
>
> This is utterly bizarre, but, again, I'm not really sure what the core
> shell should be disallowing. It's up to the user rather than the shell
> not to complete anything before they've even started up the command
> line...
>
>> Anyway, the location of the crash is just where the badly-freed or in some
>> other way abused chunk of memory, from some previous error, finally gets
>> re-used.
>
> Would it be possible to run valgrind on this, if it's sufficiently
> reproducible?
>
> pws
[-- Attachment #2: zsh_valgrind.log --]
[-- Type: application/octet-stream, Size: 4332058 bytes --]
==7806== Memcheck, a memory error detector
==7806== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==7806== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==7806== Command: ./zsh
==7806==
--7806-- Valgrind options:
--7806-- -v
--7806-- -v
--7806-- Contents of /proc/version:
--7806-- Linux version 3.17.6-1-ARCH (builduser@foutrelis) (gcc version 4.9.2 (GCC) ) #1 SMP PREEMPT Sun Dec 7 23:43:32 UTC 2014
--7806-- Arch and hwcaps: AMD64, LittleEndian, amd64-rdtscp-sse3
--7806-- Page sizes: currently 4096, max supported 4096
--7806-- Valgrind library directory: /usr/lib/valgrind
--7806-- TT/TC: VG_(init_tt_tc) (startup of code management)
--7806-- TT/TC: cache: 16 sectors of 27597024 bytes each = 441552384 total
--7806-- TT/TC: table: 16 tables of 12580032 bytes each = 201280512 total
--7806-- TT/TC: table: 65521 entries each = 1048336 total entries max occupancy 681408 (65%)
==7806== Adding active redirection:
--7806-- new: 0xffffffffff600000 (??? ) R-> (0000.0) 0x380c1e33 ???
==7806== Adding active redirection:
--7806-- new: 0xffffffffff600400 (??? ) R-> (0000.0) 0x380c1e3d ???
==7806== Adding active redirection:
--7806-- new: 0xffffffffff600800 (??? ) R-> (0000.0) 0x380c1e47 ???
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/bin/zsh
--7806-- svma 0x000040e430, avma 0x000040e430
--7806-- Reading syms from /usr/lib/ld-2.20.so
--7806-- svma 0x0000000bc0, avma 0x0004000bc0
--7806-- summarise_context(loc_start = 0x10): cannot summarise(why=1):
0x3c0: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x3c7): cannot summarise(why=1):
0x4ce: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x4d3): cannot summarise(why=1):
0x7c0: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x7c7): cannot summarise(why=1):
0x8c0: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x8c5): cannot summarise(why=1):
0x974: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x97b): cannot summarise(why=1):
0xa1c: [0]={ 56(r3) { u u u c-56 u u u u u u u u u u u u c-8 u u u }
--7806-- summarise_context(loc_start = 0x2d): cannot summarise(why=1):
0x4a: [0]={ 0(r5) { u u u c0 u u r9 r8 u u u u c16 c24 c32 c40 r1 u u u }
==7806== Adding active redirection:
--7806-- new: 0x04018ad0 (strlen ) R-> (0000.0) 0x380c1e51 ???
--7806-- Reading syms from /usr/lib/valgrind/memcheck-amd64-linux
--7806-- svma 0x0038000150, avma 0x0038000150
--7806-- object doesn't have a symbol table
--7806-- object doesn't have a dynamic symbol table
--7806-- Scheduler: using generic scheduler lock implementation.
--7806-- Reading suppressions file: /usr/lib/valgrind/default.supp
==7806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7806-by-pythonnut-on-???
==7806== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-7806-by-pythonnut-on-???
==7806== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-7806-by-pythonnut-on-???
==7806==
==7806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7806== don't want to do, unless you know exactly what you're doing,
==7806== or are doing some strange experiment):
==7806== /usr/lib/valgrind/../../bin/vgdb --pid=7806 ...command...
==7806==
==7806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7806== /path/to/gdb ./zsh
==7806== and then give GDB the following command
==7806== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7806
==7806== --pid is optional if only one valgrind process is running
==7806==
--7806-- TT/TC: initialise sector 0
--7806-- REDIR: 0x4018ad0 (ld-linux-x86-64.so.2:strlen) redirected to 0x380c1e51 (???)
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_core-amd64-linux.so
--7806-- svma 0x00000005d0, avma 0x0004a245d0
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so
--7806-- svma 0x00000038e0, avma 0x0004c298e0
--7806-- object doesn't have a symbol table
==7806== Adding active redirection:
--7806-- new: 0x04018880 (index ) R-> (2002.0) 0x04c2d180 index
==7806== Ignoring duplicate redirection:
--7806-- old: 0x04018880 (index ) R-> (2002.0) 0x04c2d180 index
--7806-- new: 0x04018880 (index ) R-> (2002.0) 0x04c2d140 strchr
==7806== Adding active redirection:
--7806-- new: 0x04018aa0 (strcmp ) R-> (2016.0) 0x04c2e680 strcmp
==7806== WARNING: new redirection conflicts with existing -- ignoring it
--7806-- old: 0x04018ad0 (strlen ) R-> (0000.0) 0x380c1e51 ???
--7806-- new: 0x04018ad0 (strlen ) R-> (2007.0) 0x04c2d5d0 strlen
==7806== Adding active redirection:
--7806-- new: 0x040197c0 (mempcpy ) R-> (2029.0) 0x04c311d0 mempcpy
==7806== Adding active redirection:
--7806-- new: 0x04019910 (stpcpy ) R-> (2020.0) 0x04c30560 stpcpy
--7806-- REDIR: 0x4018880 (ld-linux-x86-64.so.2:index) redirected to 0x4c2d180 (index)
--7806-- REDIR: 0x4018aa0 (ld-linux-x86-64.so.2:strcmp) redirected to 0x4c2e680 (strcmp)
--7806-- REDIR: 0x40197c0 (ld-linux-x86-64.so.2:mempcpy) redirected to 0x4c311d0 (mempcpy)
--7806-- Reading syms from /usr/lib/libgdbm.so.4.0.0
--7806-- svma 0x0000002c60, avma 0x0004e38c60
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libdl-2.20.so
--7806-- svma 0x0000000ed0, avma 0x0005042ed0
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libncursesw.so.5.9
--7806-- svma 0x0000015130, avma 0x000525b130
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/librt-2.20.so
--7806-- svma 0x00000022f0, avma 0x00054b02f0
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libm-2.20.so
--7806-- svma 0x0000005580, avma 0x00056bb580
--7806-- object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libc-2.20.so
--7806-- svma 0x000001f4d0, avma 0x00059da4d0
--7806-- summarise_context(loc_start = 0x33): cannot summarise(why=1):
0x50: [0]={ 0(r5) { u u u c0 u u r9 r8 u u u u c16 c24 c32 c40 r1 u u u }
--7806-- summarise_context(loc_start = 0x35): cannot summarise(why=1):
0x7d: [0]={ 0(r5) { u u u c128 u u c120 c160 u u u u c72 c80 c88 c96 c168 u u u }
--7806-- summarise_context(loc_start = 0x1): cannot summarise(why=2):
0x25: [0]={ 0(r7) { u u u u u u u u u u u u u u u u r5 u u u }
--7806-- summarise_context(loc_start = 0x25): cannot summarise(why=2):
0x4b: [0]={ 8(r7) { u u u u u u u u u u u u u u u u r5 u u u }
--7806-- summarise_context(loc_start = 0x83): cannot summarise(why=1):
0xa0: [0]={ 0(r5) { u u u c0 u u r9 r8 u u u u c16 c24 c32 c40 r1 u u u }
==7806== Adding active redirection:
--7806-- new: 0x059f0be0 (putenv ) W-> (0000.0) 0x04c31930 putenv
==7806== Adding active redirection:
--7806-- new: 0x059f1030 (setenv ) W-> (0000.0) 0x04c31a70 setenv
==7806== Adding active redirection:
--7806-- new: 0x059f1090 (unsetenv ) W-> (0000.0) 0x04c319d0 unsetenv
==7806== Adding active redirection:
--7806-- new: 0x05a37440 (malloc ) R-> (1001.0) 0x04c29f20 malloc
==7806== Adding active redirection:
--7806-- new: 0x05a376b0 (malloc_get_state ) R-> (1018.0) 0x04c29e10 malloc_get_state
==7806== Adding active redirection:
--7806-- new: 0x05a37b10 (free ) R-> (1005.0) 0x04c2b190 free
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a37b10 (free ) R-> (1005.0) 0x04c2b190 free
--7806-- new: 0x05a37b10 (free ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a37b10 (free ) R-> (1005.0) 0x04c2b190 free
--7806-- new: 0x05a37b10 (free ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Adding active redirection:
--7806-- new: 0x05a37bb0 (realloc ) R-> (1009.0) 0x04c2c220 realloc
==7806== Adding active redirection:
--7806-- new: 0x05a37e70 (memalign ) R-> (1011.0) 0x04c2c480 memalign
==7806== Adding active redirection:
--7806-- new: 0x05a37e80 (calloc ) R-> (1007.0) 0x04c2c000 calloc
==7806== Adding active redirection:
--7806-- new: 0x05a381b0 (malloc_usable_size ) R-> (1017.0) 0x04c2c7c0 malloc_usable_size
==7806== Adding active redirection:
--7806-- new: 0x05a38290 (mallopt ) R-> (1014.0) 0x04c29da0 mallopt
==7806== Adding active redirection:
--7806-- new: 0x05a389a0 (malloc_set_state ) R-> (1018.0) 0x04c29e20 malloc_set_state
==7806== Adding active redirection:
--7806-- new: 0x05a38ef0 (valloc ) R-> (1012.0) 0x04c2c590 valloc
==7806== Adding active redirection:
--7806-- new: 0x05a38f40 (pvalloc ) R-> (1018.0) 0x04c29e00 pvalloc
==7806== Adding active redirection:
--7806-- new: 0x05a38fc0 (malloc_trim ) R-> (1015.0) 0x04c29de0 malloc_trim
==7806== Adding active redirection:
--7806-- new: 0x05a39280 (mallinfo ) R-> (1020.0) 0x04c2cb80 mallinfo
==7806== Adding active redirection:
--7806-- new: 0x05a393a0 (malloc_stats ) R-> (1019.0) 0x04c29e30 malloc_stats
==7806== Adding active redirection:
--7806-- new: 0x05a39580 (posix_memalign ) R-> (1016.0) 0x04c2c610 posix_memalign
==7806== Adding active redirection:
--7806-- new: 0x05a3afc0 (strcat ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Adding active redirection:
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
==7806== Adding active redirection:
--7806-- new: 0x05a3b1c0 (index ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1c0 (index ) R-> (2002.0) 0x04c2d080 index
--7806-- new: 0x05a3b1c0 (index ) R-> (2002.0) 0x04c2cf80 strchr
==7806== Adding active redirection:
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d000 __strchr_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a3b410 (strcmp ) R-> (2016.0) 0x04c2e540 strcmp
==7806== Adding active redirection:
--7806-- new: 0x05a3b450 (__GI_strcmp ) R-> (2016.0) 0x04c2e590 __GI_strcmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b450 (__GI_strcmp ) R-> (2016.0) 0x04c2e590 __GI_strcmp
--7806-- new: 0x05a3b450 (__GI_strcmp ) R-> (2016.0) 0x04c2e5e0 __strcmp_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a3c8a0 (strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Adding active redirection:
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
==7806== Adding active redirection:
--7806-- new: 0x05a3c9c0 (strcspn ) R-> (2033.0) 0x04c315d0 strcspn
==7806== Adding active redirection:
--7806-- new: 0x05a3ce70 (strlen ) R-> (2007.0) 0x04c2d510 strlen
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3ce70 (strlen ) R-> (2007.0) 0x04c2d510 strlen
--7806-- new: 0x05a3ce70 (strlen ) R-> (2007.0) 0x04c2d530 __GI_strlen
==7806== Adding active redirection:
--7806-- new: 0x05a3d030 (strnlen ) R-> (2006.0) 0x04c2d490 strnlen
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d030 (strnlen ) R-> (2006.0) 0x04c2d490 strnlen
--7806-- new: 0x05a3d030 (strnlen ) R-> (2006.0) 0x04c2d4d0 __GI_strnlen
==7806== Adding active redirection:
--7806-- new: 0x05a3d250 (strncat ) R-> (2004.0) 0x04c2d380 strncat
==7806== Adding active redirection:
--7806-- new: 0x05a3d290 (strncmp ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Adding active redirection:
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dd30 __strncmp_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a3eb30 (strncpy ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Adding active redirection:
--7806-- new: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce60 rindex
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce60 rindex
--7806-- new: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce90 __GI_strrchr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce60 rindex
--7806-- new: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce60 rindex
--7806-- new: 0x05a3eb70 (rindex ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Adding active redirection:
--7806-- new: 0x05a3ee60 (strpbrk ) R-> (2032.0) 0x04c31570 strpbrk
==7806== Adding active redirection:
--7806-- new: 0x05a3f1d0 (strspn ) R-> (2034.0) 0x04c31640 strspn
==7806== Adding active redirection:
--7806-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a3fc40 (strstr ) R-> (2031.0) 0x04c313c0 strstr
==7806== Adding active redirection:
--7806-- new: 0x05a3fe80 (memchr ) R-> (2017.0) 0x04c2e720 memchr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3fe80 (memchr ) R-> (2017.0) 0x04c2e720 memchr
--7806-- new: 0x05a3fe80 (memchr ) R-> (2017.0) 0x04c2e760 __GI_memchr
==7806== Adding active redirection:
--7806-- new: 0x05a401d0 (bcmp ) R-> (2019.0) 0x04c300d0 bcmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a401d0 (bcmp ) R-> (2019.0) 0x04c300d0 bcmp
--7806-- new: 0x05a401d0 (bcmp ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a401d0 (bcmp ) R-> (2019.0) 0x04c300d0 bcmp
--7806-- new: 0x05a401d0 (bcmp ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Adding active redirection:
--7806-- new: 0x05a40210 (__GI_memcmp ) R-> (2019.0) 0x04c30010 __GI_memcmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40210 (__GI_memcmp ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806-- new: 0x05a40210 (__GI_memcmp ) R-> (2019.0) 0x04c30050 __memcmp_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a40610 (__GI_memmove ) R-> (2018.1) 0x04c30a90 __GI_memmove
==7806== Adding active redirection:
--7806-- new: 0x05a40790 (memcpy@GLIBC_2.2.5 ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40790 (memcpy@GLIBC_2.2.5 ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- new: 0x05a40790 (memcpy@GLIBC_2.2.5 ) R-> (2018.1) 0x04c30810 memmove
==7806== Ignoring lower priority redirection:
--7806-- old: 0x05a40790 (memcpy@GLIBC_2.2.5 ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- new: 0x05a40790 (memcpy@GLIBC_2.2.5 ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806-- new: 0x05a407f0 (memset ) R-> (2021.0) 0x04c30760 memset
==7806== Adding active redirection:
--7806-- new: 0x05a40960 (mempcpy ) R-> (2029.0) 0x04c30f00 mempcpy
==7806== Adding active redirection:
--7806-- new: 0x05a40e20 (bcopy ) R-> (2023.0) 0x04c30d10 bcopy
==7806== Adding active redirection:
--7806-- new: 0x05a40e60 (stpcpy ) R-> (2020.0) 0x04c30150 stpcpy
==7806== Adding active redirection:
--7806-- new: 0x05a40ea0 (__GI_stpcpy ) R-> (2020.0) 0x04c30220 __GI_stpcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40ea0 (__GI_stpcpy ) R-> (2020.0) 0x04c30220 __GI_stpcpy
--7806-- new: 0x05a40ea0 (__GI_stpcpy ) R-> (2020.0) 0x04c302f0 __stpcpy_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a40f80 (stpncpy ) R-> (2042.0) 0x04c30630 stpncpy
==7806== Adding active redirection:
--7806-- new: 0x05a40fc0 (strcasecmp_l ) R-> (2014.0) 0x04c2e090 strcasecmp_l
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40fc0 (strcasecmp_l ) R-> (2014.0) 0x04c2e090 strcasecmp_l
--7806-- new: 0x05a40fc0 (strcasecmp_l ) R-> (2014.0) 0x04c2e120 __GI_strcasecmp_l
==7806== Adding active redirection:
--7806-- new: 0x05a41010 (strcasecmp ) R-> (2012.0) 0x04c2de10 strcasecmp
==7806== Adding active redirection:
--7806-- new: 0x05a41080 (__GI___strcasecmp_l ) R-> (2014.0) 0x04c2e1b0 __GI___strcasecmp_l
==7806== Adding active redirection:
--7806-- new: 0x05a432b0 (strncasecmp_l ) R-> (2015.0) 0x04c2e240 strncasecmp_l
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a432b0 (strncasecmp_l ) R-> (2015.0) 0x04c2e240 strncasecmp_l
--7806-- new: 0x05a432b0 (strncasecmp_l ) R-> (2015.0) 0x04c2e340 __GI_strncasecmp_l
==7806== Adding active redirection:
--7806-- new: 0x05a43300 (strncasecmp ) R-> (2013.0) 0x04c2def0 strncasecmp
==7806== Adding active redirection:
--7806-- new: 0x05a43370 (__GI___strncasecmp_l) R-> (2015.0) 0x04c2e440 __GI___strncasecmp_l
==7806== Adding active redirection:
--7806-- new: 0x05a459e0 (memcpy@@GLIBC_2.14 ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a459e0 (memcpy@@GLIBC_2.14 ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806-- new: 0x05a459e0 (memcpy@@GLIBC_2.14 ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806-- new: 0x05a45a50 (__GI_memcpy ) R-> (2018.0) 0x04c2f080 __GI_memcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a45a50 (__GI_memcpy ) R-> (2018.0) 0x04c2f080 __GI_memcpy
--7806-- new: 0x05a45a50 (__GI_memcpy ) R-> (2018.0) 0x04c2f390 __memcpy_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a46f30 (strcasestr ) R-> (2035.0) 0x04c316b0 strcasestr
==7806== Adding active redirection:
--7806-- new: 0x05a477a0 (rawmemchr ) R-> (2026.0) 0x04c30e20 rawmemchr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a477a0 (rawmemchr ) R-> (2026.0) 0x04c30e20 rawmemchr
--7806-- new: 0x05a477a0 (rawmemchr ) R-> (2026.0) 0x04c30e40 __GI___rawmemchr
==7806== Adding active redirection:
--7806-- new: 0x05a479b0 (strchrnul ) R-> (2025.0) 0x04c30df0 strchrnul
==7806== Adding active redirection:
--7806-- new: 0x05a4ae20 (memrchr ) R-> (2036.0) 0x04c2e7a0 memrchr
==7806== Adding active redirection:
--7806-- new: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806-- new: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d9f0 __strncpy_sse2
==7806== Adding active redirection:
--7806-- new: 0x05a50bc0 (__strncpy_sse2_unali) R-> (2009.0) 0x04c2db20 __strncpy_sse2_unaligned
==7806== Adding active redirection:
--7806-- new: 0x05a51ba0 (__stpcpy_sse2_unalig) R-> (2020.0) 0x04c303c0 __stpcpy_sse2_unaligned
==7806== Adding active redirection:
--7806-- new: 0x05a55790 (wcschr ) R-> (2040.0) 0x04c318d0 wcschr
==7806== Adding active redirection:
--7806-- new: 0x05a55920 (wcscmp ) R-> (2038.0) 0x04c317b0 wcscmp
==7806== Adding active redirection:
--7806-- new: 0x05a565f0 (wcscpy ) R-> (2039.0) 0x04c31800 wcscpy
==7806== Adding active redirection:
--7806-- new: 0x05a566b0 (wcslen ) R-> (2037.0) 0x04c31790 wcslen
==7806== Adding active redirection:
--7806-- new: 0x05a56c00 (wcsrchr ) R-> (2041.0) 0x04c31900 wcsrchr
==7806== Adding active redirection:
--7806-- new: 0x05ab0d00 (__memcpy_chk ) R-> (2030.0) 0x04c312c0 __memcpy_chk
==7806== Adding active redirection:
--7806-- new: 0x05ab0d70 (__memmove_chk ) R-> (2024.0) 0x04c30d70 __memmove_chk
==7806== Adding active redirection:
--7806-- new: 0x05ab0e50 (__stpcpy_chk ) R-> (2028.0) 0x04c30eb0 __stpcpy_chk
==7806== Adding active redirection:
--7806-- new: 0x05ab1020 (__strcpy_chk ) R-> (2027.0) 0x04c30e60 __strcpy_chk
==7806== Adding active redirection:
--7806-- new: 0x05ad9400 (__strcmp_sse42 ) R-> (2016.0) 0x04c2e630 __strcmp_sse42
==7806== Adding active redirection:
--7806-- new: 0x05ada1b0 (__strncmp_sse42 ) R-> (2011.0) 0x04c2dda0 __strncmp_sse42
==7806== Adding active redirection:
--7806-- new: 0x05b02b50 (__memcmp_sse4_1 ) R-> (2019.0) 0x04c30090 __memcmp_sse4_1
==7806== Adding active redirection:
--7806-- new: 0x05b04fc0 (__strchr_sse2_no_bsf) R-> (2002.0) 0x04c2d040 __strchr_sse2_no_bsf
--7806-- Reading syms from /usr/lib/libpthread-2.20.so
--7806-- svma 0x0000005a70, avma 0x0005d63a70
--7806-- REDIR: 0x5a41010 (libc.so.6:strcasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a41070 (__strcasecmp_sse2 ) R-> (2012.0) 0x04c2de10 strcasecmp
--7806-- REDIR: 0x5a43300 (libc.so.6:strncasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a43360 (__strncasecmp_sse2 ) R-> (2013.0) 0x04c2def0 strncasecmp
--7806-- REDIR: 0x5a40790 (libc.so.6:memcpy@GLIBC_2.2.5) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40610 (__GI_memmove ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806-- new: 0x05a40610 (__GI_memmove ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a3eb70 (libc.so.6:rindex) redirected to 0x4c2ce60 (rindex)
--7806-- REDIR: 0x5a3b450 (libc.so.6:__GI_strcmp) redirected to 0x4c2e590 (__GI_strcmp)
--7806-- REDIR: 0x5a3ce70 (libc.so.6:strlen) redirected to 0x4c2d510 (strlen)
--7806-- REDIR: 0x5a3d2e0 (libc.so.6:__GI_strncmp) redirected to 0x4c2dcc0 (__GI_strncmp)
--7806-- REDIR: 0x5a3b1f0 (libc.so.6:__GI_strchr) redirected to 0x4c2cfc0 (__GI_strchr)
--7806-- REDIR: 0x5a3fe80 (libc.so.6:memchr) redirected to 0x4c2e720 (memchr)
--7806-- REDIR: 0x5a479b0 (libc.so.6:strchrnul) redirected to 0x4c30df0 (strchrnul)
--7806-- REDIR: 0x5a37440 (libc.so.6:malloc) redirected to 0x4c29f20 (malloc)
--7806-- REDIR: 0x5a45a50 (libc.so.6:__GI_memcpy) redirected to 0x4c2f080 (__GI_memcpy)
--7806-- REDIR: 0x5a37b10 (libc.so.6:free) redirected to 0x4c2b190 (free)
--7806-- REDIR: 0x5a407f0 (libc.so.6:memset) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a40860 (__GI_memset ) R-> (2021.0) 0x04c30760 memset
--7806-- REDIR: 0x5a40860 (libc.so.6:__GI_memset) redirected to 0x4c30760 (memset)
--7806-- REDIR: 0x5a3b1c0 (libc.so.6:index) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3b410 (libc.so.6:strcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a4b720 (__strcmp_sse2_unalig) R-> (2016.0) 0x04c2e540 strcmp
--7806-- REDIR: 0x5a4b720 (libc.so.6:__strcmp_sse2_unaligned) redirected to 0x4c2e540 (strcmp)
--7806-- REDIR: 0x5a3c8a0 (libc.so.6:strcpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3c8e0 (libc.so.6:__GI_strcpy) redirected to 0x4c2d6c0 (__GI_strcpy)
--7806-- REDIR: 0xffffffffff600000 (???:???) redirected to 0x380c1e33 (???)
--7806-- REDIR: 0x5a3f790 (libc.so.6:__GI_strstr) redirected to 0x4c31450 (__strstr_sse2)
--7806-- REDIR: 0x5a40ea0 (libc.so.6:__GI_stpcpy) redirected to 0x4c30220 (__GI_stpcpy)
--7806-- REDIR: 0x5a37e80 (libc.so.6:calloc) redirected to 0x4c2c000 (calloc)
--7806-- Reading syms from /usr/lib/libnss_files-2.20.so
--7806-- svma 0x0000002290, avma 0x000637c290
--7806-- object doesn't have a symbol table
--7806-- REDIR: 0x5a459e0 (libc.so.6:memcpy@@GLIBC_2.14) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a4b9d0 (__memcpy_sse2_unalig) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806-- REDIR: 0x5a4b9d0 (libc.so.6:__memcpy_sse2_unaligned) redirected to 0x4c2ea60 (memcpy@@GLIBC_2.14)
--7806-- REDIR: 0x5a40210 (libc.so.6:__GI_memcmp) redirected to 0x4c30010 (__GI_memcmp)
--7806-- REDIR: 0x5a3d030 (libc.so.6:strnlen) redirected to 0x4c2d490 (strnlen)
--7806-- REDIR: 0x5a477a0 (libc.so.6:rawmemchr) redirected to 0x4c30e20 (rawmemchr)
--7806-- REDIR: 0x5a4b610 (libc.so.6:__GI_strncpy) redirected to 0x4c2d8c0 (__GI_strncpy)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0xffffffffff600400 (???:???) redirected to 0x380c1e3d (???)
--7806-- REDIR: 0x5a37bb0 (libc.so.6:realloc) redirected to 0x4c2c220 (realloc)
--7806-- REDIR: 0x5a3eb30 (libc.so.6:strncpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806-- new: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3d290 (libc.so.6:strncmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dc50 strncmp
--7806-- REDIR: 0x59f1030 (libc.so.6:setenv) redirected to 0x4c31a70 (setenv)
client request: code 4d430005, addr 0xFFEFFFACC, len 4
client request: code 4d430005, addr 0xFFEFFF7CC, len 4
client request: code 4d430005, addr 0xFFEFFF7CC, len 4
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so
--7806-- svma 0x0000000880, avma 0x0006587880
--7806-- Discarding syms at 0x6587880-0x6587b9a in /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so due to munmap()
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40610 (__GI_memmove ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806-- new: 0x05a40610 (__GI_memmove ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a40610 (libc.so.6:__GI_memmove) redirected to 0x4c30a90 (__GI_memmove)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dc50 strncmp
client request: code 4d430005, addr 0xFFEFFEDDC, len 4
--7807-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7807== Ignoring duplicate redirection:
--7807-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7807-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
--7807-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005, addr 0xFFEFF5F5C, len 4
==7807== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7807-by-pythonnut-on-???
==7807== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-7807-by-pythonnut-on-???
==7807== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-7807-by-pythonnut-on-???
==7807==
==7807== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7807== don't want to do, unless you know exactly what you're doing,
==7807== or are doing some strange experiment):
==7807== /usr/lib/valgrind/../../bin/vgdb --pid=7807 ...command...
==7807==
==7807== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7807== /path/to/gdb ./zsh
==7807== and then give GDB the following command
==7807== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7807
==7807== --pid is optional if only one valgrind process is running
==7807==
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zle.so
--7806-- svma 0x0000016120, avma 0x000659d120
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3fc40 (libc.so.6:strstr) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complete.so
--7806-- svma 0x0000008930, avma 0x00067e1930
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zutil.so
--7806-- svma 0x0000001e30, avma 0x0006a04e30
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806-- new: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3f1d0 (libc.so.6:strspn) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a3f200 (__GI_strspn ) R-> (2034.0) 0x04c31640 strspn
--7806-- REDIR: 0x5a3f200 (libc.so.6:__GI_strspn) redirected to 0x4c31640 (strspn)
--7806-- REDIR: 0x5a401d0 (libc.so.6:bcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a40210 (__GI_memcmp ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806-- new: 0x05a40210 (__GI_memcmp ) R-> (2019.0) 0x04c300d0 bcmp
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/parameter.so
--7806-- svma 0x0000003070, avma 0x0006c0f070
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/stat.so
--7806-- svma 0x0000001180, avma 0x0006e18180
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d080 index
--7818-- Caught __NR_exit; running __libc_freeres()
==7818== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7818-by-pythonnut-on-???
==7818== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-7818-by-pythonnut-on-???
==7818== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-7818-by-pythonnut-on-???
==7818==
==7818== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7818== don't want to do, unless you know exactly what you're doing,
==7818== or are doing some strange experiment):
==7818== /usr/lib/valgrind/../../bin/vgdb --pid=7818 ...command...
==7818==
==7818== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7818== /path/to/gdb ./zsh
==7818== and then give GDB the following command
==7818== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7818
==7818== --pid is optional if only one valgrind process is running
==7818==
--7818-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7818==
==7818== HEAP SUMMARY:
==7818== in use at exit: 479,663 bytes in 12,406 blocks
==7818== total heap usage: 51,306 allocs, 38,900 frees, 5,584,812 bytes allocated
==7818==
==7818== Searching for pointers to 12,406 not-freed blocks
--7818-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7818-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7818-- Scanning root segment: 0x4022000..0x4043fff (139264)
--7818-- Scanning root segment: 0x4049000..0x404cfff (16384)
--7818-- Scanning root segment: 0x4222000..0x4222fff (4096)
--7818-- Scanning root segment: 0x4223000..0x4223fff (4096)
--7818-- Scanning root segment: 0x4224000..0x4224fff (4096)
--7818-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7818-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7818-- Scanning root segment: 0x5041000..0x5041fff (4096)
--7818-- Scanning root segment: 0x5245000..0x5245fff (4096)
--7818-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--7818-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--7818-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7818-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--7818-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7818-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7818-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7818-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7818-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7818-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7818-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7818-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7818-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7818-- Scanning root segment: 0x701a000..0x701afff (4096)
--7818-- Scanning root segment: 0xffeff8000..0xfff000fff (36864)
==7818== Checked 877,968 bytes
==7818==
==7818== LEAK SUMMARY:
==7818== definitely lost: 0 bytes in 0 blocks
==7818== indirectly lost: 0 bytes in 0 blocks
==7818== possibly lost: 0 bytes in 0 blocks
==7818== still reachable: 479,663 bytes in 12,406 blocks
==7818== suppressed: 0 bytes in 0 blocks
==7818== Rerun with --leak-check=full to see details of leaked memory
==7818==
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7877-by-pythonnut-on-???
==7877== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-7877-by-pythonnut-on-???
==7877== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-7877-by-pythonnut-on-???
==7877==
==7877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7877== don't want to do, unless you know exactly what you're doing,
==7877== or are doing some strange experiment):
==7877== /usr/lib/valgrind/../../bin/vgdb --pid=7877 ...command...
==7877==
==7877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7877== /path/to/gdb ./zsh
==7877== and then give GDB the following command
==7877== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7877
==7877== --pid is optional if only one valgrind process is running
==7877==
--7877-- Caught __NR_exit; running __libc_freeres()
--7877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7877==
==7877== HEAP SUMMARY:
==7877== in use at exit: 479,997 bytes in 12,413 blocks
==7877== total heap usage: 51,337 allocs, 38,924 frees, 5,586,425 bytes allocated
==7877==
==7877== Searching for pointers to 12,413 not-freed blocks
--7877-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7877-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7877-- Scanning root segment: 0x4022000..0x4043fff (139264)
--7877-- Scanning root segment: 0x4049000..0x404cfff (16384)
--7877-- Scanning root segment: 0x4222000..0x4222fff (4096)
--7877-- Scanning root segment: 0x4223000..0x4223fff (4096)
--7877-- Scanning root segment: 0x4224000..0x4224fff (4096)
--7877-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7877-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7877-- Scanning root segment: 0x5041000..0x5041fff (4096)
--7877-- Scanning root segment: 0x5245000..0x5245fff (4096)
--7877-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--7877-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--7877-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7877-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--7877-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7877-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7877-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7877-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7877-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7877-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7877-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7877-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7877-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7877-- Scanning root segment: 0x701a000..0x701afff (4096)
--7877-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==7877== Checked 878,168 bytes
==7877==
==7877== LEAK SUMMARY:
==7877== definitely lost: 0 bytes in 0 blocks
==7877== indirectly lost: 0 bytes in 0 blocks
==7877== possibly lost: 0 bytes in 0 blocks
==7877== still reachable: 479,997 bytes in 12,413 blocks
==7877== suppressed: 0 bytes in 0 blocks
==7877== Rerun with --leak-check=full to see details of leaked memory
==7877==
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8031-- Caught __NR_exit; running __libc_freeres()
==8031== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8031-by-pythonnut-on-???
==8031== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8031-by-pythonnut-on-???
==8031== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8031-by-pythonnut-on-???
==8031==
==8031== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8031== don't want to do, unless you know exactly what you're doing,
==8031== or are doing some strange experiment):
==8031== /usr/lib/valgrind/../../bin/vgdb --pid=8031 ...command...
==8031==
==8031== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8031== /path/to/gdb ./zsh
==8031== and then give GDB the following command
==8031== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8031
==8031== --pid is optional if only one valgrind process is running
==8031==
--8031-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8031==
==8031== HEAP SUMMARY:
==8031== in use at exit: 498,989 bytes in 12,948 blocks
==8031== total heap usage: 56,969 allocs, 44,021 frees, 6,125,903 bytes allocated
==8031==
==8031== Searching for pointers to 12,948 not-freed blocks
--8031-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8031-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8031-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8031-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8031-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8031-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8031-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8031-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8031-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8031-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8031-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8031-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8031-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8031-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8031-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8031-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8031-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8031-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8031-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8031-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8031-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8031-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8031-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8031-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8031-- Scanning root segment: 0x701a000..0x701afff (4096)
--8031-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8031== Checked 896,056 bytes
==8031==
==8031== LEAK SUMMARY:
==8031== definitely lost: 0 bytes in 0 blocks
==8031== indirectly lost: 0 bytes in 0 blocks
==8031== possibly lost: 0 bytes in 0 blocks
==8031== still reachable: 498,989 bytes in 12,948 blocks
==8031== suppressed: 0 bytes in 0 blocks
==8031== Rerun with --leak-check=full to see details of leaked memory
==8031==
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8036-- Caught __NR_exit; running __libc_freeres()
==8036== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8036-by-pythonnut-on-???
==8036== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8036-by-pythonnut-on-???
==8036== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8036-by-pythonnut-on-???
==8036==
==8036== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8036== don't want to do, unless you know exactly what you're doing,
==8036== or are doing some strange experiment):
==8036== /usr/lib/valgrind/../../bin/vgdb --pid=8036 ...command...
==8036==
==8036== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8036== /path/to/gdb ./zsh
==8036== and then give GDB the following command
==8036== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8036
==8036== --pid is optional if only one valgrind process is running
==8036==
--8036-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8036==
==8036== HEAP SUMMARY:
==8036== in use at exit: 499,480 bytes in 12,963 blocks
==8036== total heap usage: 57,118 allocs, 44,155 frees, 6,136,379 bytes allocated
==8036==
==8036== Searching for pointers to 12,963 not-freed blocks
--8036-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8036-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8036-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8036-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8036-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8036-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8036-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8036-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8036-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8036-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8036-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8036-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8036-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8036-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8036-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8036-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8036-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8036-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8036-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8036-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8036-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8036-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8036-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8036-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8036-- Scanning root segment: 0x701a000..0x701afff (4096)
--8036-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8036== Checked 896,472 bytes
==8036==
==8036== LEAK SUMMARY:
==8036== definitely lost: 0 bytes in 0 blocks
==8036== indirectly lost: 0 bytes in 0 blocks
==8036== possibly lost: 0 bytes in 0 blocks
==8036== still reachable: 499,480 bytes in 12,963 blocks
==8036== suppressed: 0 bytes in 0 blocks
==8036== Rerun with --leak-check=full to see details of leaked memory
==8036==
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8038-- Caught __NR_exit; running __libc_freeres()
==8038== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8038-by-pythonnut-on-???
==8038== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8038-by-pythonnut-on-???
==8038== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8038-by-pythonnut-on-???
==8038==
==8038== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8038== don't want to do, unless you know exactly what you're doing,
==8038== or are doing some strange experiment):
==8038== /usr/lib/valgrind/../../bin/vgdb --pid=8038 ...command...
==8038==
==8038== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8038== /path/to/gdb ./zsh
==8038== and then give GDB the following command
==8038== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8038
==8038== --pid is optional if only one valgrind process is running
==8038==
--8038-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8038==
==8038== HEAP SUMMARY:
==8038== in use at exit: 500,165 bytes in 12,984 blocks
==8038== total heap usage: 57,303 allocs, 44,319 frees, 6,152,151 bytes allocated
==8038==
==8038== Searching for pointers to 12,984 not-freed blocks
--8038-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8038-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8038-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8038-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8038-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8038-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8038-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8038-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8038-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8038-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8038-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8038-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8038-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8038-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8038-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8038-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8038-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8038-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8038-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8038-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8038-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8038-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8038-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8038-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8038-- Scanning root segment: 0x701a000..0x701afff (4096)
--8038-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8038== Checked 897,080 bytes
==8038==
==8038== LEAK SUMMARY:
==8038== definitely lost: 0 bytes in 0 blocks
==8038== indirectly lost: 0 bytes in 0 blocks
==8038== possibly lost: 0 bytes in 0 blocks
==8038== still reachable: 500,165 bytes in 12,984 blocks
==8038== suppressed: 0 bytes in 0 blocks
==8038== Rerun with --leak-check=full to see details of leaked memory
==8038==
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8049-- Caught __NR_exit; running __libc_freeres()
==8049== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8049-by-pythonnut-on-???
==8049== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8049-by-pythonnut-on-???
==8049== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8049-by-pythonnut-on-???
==8049==
==8049== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8049== don't want to do, unless you know exactly what you're doing,
==8049== or are doing some strange experiment):
==8049== /usr/lib/valgrind/../../bin/vgdb --pid=8049 ...command...
==8049==
==8049== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8049== /path/to/gdb ./zsh
==8049== and then give GDB the following command
==8049== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8049
==8049== --pid is optional if only one valgrind process is running
==8049==
--8049-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8049==
==8049== HEAP SUMMARY:
==8049== in use at exit: 503,703 bytes in 13,082 blocks
==8049== total heap usage: 58,181 allocs, 45,099 frees, 6,240,064 bytes allocated
==8049==
==8049== Searching for pointers to 13,082 not-freed blocks
--8049-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8049-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8049-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8049-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8049-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8049-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8049-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8049-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8049-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8049-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8049-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8049-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8049-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8049-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8049-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8049-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8049-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8049-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8049-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8049-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8049-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8049-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8049-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8049-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8049-- Scanning root segment: 0x701a000..0x701afff (4096)
--8049-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8049== Checked 900,440 bytes
==8049==
==8049== LEAK SUMMARY:
==8049== definitely lost: 0 bytes in 0 blocks
==8049== indirectly lost: 0 bytes in 0 blocks
==8049== possibly lost: 0 bytes in 0 blocks
==8049== still reachable: 503,703 bytes in 13,082 blocks
==8049== suppressed: 0 bytes in 0 blocks
==8049== Rerun with --leak-check=full to see details of leaked memory
==8049==
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8050-- Caught __NR_exit; running __libc_freeres()
==8050== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8050-by-pythonnut-on-???
==8050== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8050-by-pythonnut-on-???
==8050== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8050-by-pythonnut-on-???
==8050==
==8050== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8050== don't want to do, unless you know exactly what you're doing,
==8050== or are doing some strange experiment):
==8050== /usr/lib/valgrind/../../bin/vgdb --pid=8050 ...command...
==8050==
==8050== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8050== /path/to/gdb ./zsh
==8050== and then give GDB the following command
==8050== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8050
==8050== --pid is optional if only one valgrind process is running
==8050==
--8050-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8050==
==8050== HEAP SUMMARY:
==8050== in use at exit: 504,109 bytes in 13,096 blocks
==8050== total heap usage: 58,329 allocs, 45,233 frees, 6,250,460 bytes allocated
==8050==
==8050== Searching for pointers to 13,096 not-freed blocks
--8050-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8050-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8050-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8050-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8050-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8050-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8050-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8050-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8050-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8050-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8050-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8050-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8050-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8050-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8050-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8050-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8050-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8050-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8050-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8050-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8050-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8050-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8050-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8050-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8050-- Scanning root segment: 0x701a000..0x701afff (4096)
--8050-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8050== Checked 900,784 bytes
==8050==
==8050== LEAK SUMMARY:
==8050== definitely lost: 0 bytes in 0 blocks
==8050== indirectly lost: 0 bytes in 0 blocks
==8050== possibly lost: 0 bytes in 0 blocks
==8050== still reachable: 504,109 bytes in 13,096 blocks
==8050== suppressed: 0 bytes in 0 blocks
==8050== Rerun with --leak-check=full to see details of leaked memory
==8050==
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8051-- Caught __NR_exit; running __libc_freeres()
==8051== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8051-by-pythonnut-on-???
==8051== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8051-by-pythonnut-on-???
==8051== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8051-by-pythonnut-on-???
==8051==
==8051== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8051== don't want to do, unless you know exactly what you're doing,
==8051== or are doing some strange experiment):
==8051== /usr/lib/valgrind/../../bin/vgdb --pid=8051 ...command...
==8051==
==8051== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8051== /path/to/gdb ./zsh
==8051== and then give GDB the following command
==8051== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8051
==8051== --pid is optional if only one valgrind process is running
==8051==
--8051-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8051==
==8051== HEAP SUMMARY:
==8051== in use at exit: 542,450 bytes in 14,039 blocks
==8051== total heap usage: 69,083 allocs, 55,044 frees, 7,240,905 bytes allocated
==8051==
==8051== Searching for pointers to 14,039 not-freed blocks
--8051-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8051-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8051-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8051-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8051-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8051-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8051-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8051-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8051-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8051-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8051-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8051-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8051-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8051-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8051-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8051-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8051-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8051-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8051-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8051-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8051-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8051-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8051-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8051-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8051-- Scanning root segment: 0x701a000..0x701afff (4096)
--8051-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8051== Checked 936,992 bytes
==8051==
==8051== LEAK SUMMARY:
==8051== definitely lost: 0 bytes in 0 blocks
==8051== indirectly lost: 0 bytes in 0 blocks
==8051== possibly lost: 0 bytes in 0 blocks
==8051== still reachable: 542,450 bytes in 14,039 blocks
==8051== suppressed: 0 bytes in 0 blocks
==8051== Rerun with --leak-check=full to see details of leaked memory
==8051==
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8052-by-pythonnut-on-???
==8052== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8052-by-pythonnut-on-???
==8052== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8052-by-pythonnut-on-???
==8052==
==8052== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8052== don't want to do, unless you know exactly what you're doing,
==8052== or are doing some strange experiment):
==8052== /usr/lib/valgrind/../../bin/vgdb --pid=8052 ...command...
==8052==
==8052== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8052== /path/to/gdb ./zsh
==8052== and then give GDB the following command
==8052== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8052
==8052== --pid is optional if only one valgrind process is running
==8052==
--8052-- Caught __NR_exit; running __libc_freeres()
--8052-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8052==
==8052== HEAP SUMMARY:
==8052== in use at exit: 542,979 bytes in 14,059 blocks
==8052== total heap usage: 69,251 allocs, 55,192 frees, 7,251,964 bytes allocated
==8052==
==8052== Searching for pointers to 14,059 not-freed blocks
--8052-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8052-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8052-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8052-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8052-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8052-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8052-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8052-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8052-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8052-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8052-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8052-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8052-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8052-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8052-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8052-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8052-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8052-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8052-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8052-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8052-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8052-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8052-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8052-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8052-- Scanning root segment: 0x701a000..0x701afff (4096)
--8052-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8052== Checked 937,456 bytes
==8052==
==8052== LEAK SUMMARY:
==8052== definitely lost: 0 bytes in 0 blocks
==8052== indirectly lost: 0 bytes in 0 blocks
==8052== possibly lost: 0 bytes in 0 blocks
==8052== still reachable: 542,979 bytes in 14,059 blocks
==8052== suppressed: 0 bytes in 0 blocks
==8052== Rerun with --leak-check=full to see details of leaked memory
==8052==
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8053-- Caught __NR_exit; running __libc_freeres()
==8053== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8053-by-pythonnut-on-???
==8053== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8053-by-pythonnut-on-???
==8053== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8053-by-pythonnut-on-???
==8053==
==8053== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8053== don't want to do, unless you know exactly what you're doing,
==8053== or are doing some strange experiment):
==8053== /usr/lib/valgrind/../../bin/vgdb --pid=8053 ...command...
==8053==
==8053== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8053== /path/to/gdb ./zsh
==8053== and then give GDB the following command
==8053== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8053
==8053== --pid is optional if only one valgrind process is running
==8053==
--8053-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8053==
==8053== HEAP SUMMARY:
==8053== in use at exit: 543,239 bytes in 14,065 blocks
==8053== total heap usage: 69,281 allocs, 55,216 frees, 7,253,498 bytes allocated
==8053==
==8053== Searching for pointers to 14,065 not-freed blocks
--8053-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8053-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8053-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8053-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8053-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8053-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8053-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8053-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8053-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8053-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8053-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8053-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8053-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8053-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8053-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8053-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8053-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8053-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8053-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8053-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8053-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8053-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8053-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8053-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8053-- Scanning root segment: 0x701a000..0x701afff (4096)
--8053-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8053== Checked 937,592 bytes
==8053==
==8053== LEAK SUMMARY:
==8053== definitely lost: 0 bytes in 0 blocks
==8053== indirectly lost: 0 bytes in 0 blocks
==8053== possibly lost: 0 bytes in 0 blocks
==8053== still reachable: 543,239 bytes in 14,065 blocks
==8053== suppressed: 0 bytes in 0 blocks
==8053== Rerun with --leak-check=full to see details of leaked memory
==8053==
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8054-by-pythonnut-on-???
==8054== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8054-by-pythonnut-on-???
==8054== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8054-by-pythonnut-on-???
==8054==
==8054== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8054== don't want to do, unless you know exactly what you're doing,
==8054== or are doing some strange experiment):
==8054== /usr/lib/valgrind/../../bin/vgdb --pid=8054 ...command...
==8054==
==8054== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8054== /path/to/gdb ./zsh
==8054== and then give GDB the following command
==8054== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8054
==8054== --pid is optional if only one valgrind process is running
==8054==
--8054-- Caught __NR_exit; running __libc_freeres()
--8054-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8054==
==8054== HEAP SUMMARY:
==8054== in use at exit: 575,564 bytes in 15,016 blocks
==8054== total heap usage: 78,805 allocs, 63,789 frees, 8,203,968 bytes allocated
==8054==
==8054== Searching for pointers to 15,016 not-freed blocks
--8054-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8054-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8054-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8054-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8054-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8054-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8054-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8054-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8054-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8054-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8054-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8054-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8054-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8054-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8054-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8054-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8054-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8054-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8054-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8054-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8054-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8054-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8054-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8054-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8054-- Scanning root segment: 0x701a000..0x701afff (4096)
--8054-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8054== Checked 967,848 bytes
==8054==
==8054== LEAK SUMMARY:
==8054== definitely lost: 0 bytes in 0 blocks
==8054== indirectly lost: 0 bytes in 0 blocks
==8054== possibly lost: 0 bytes in 0 blocks
==8054== still reachable: 575,564 bytes in 15,016 blocks
==8054== suppressed: 0 bytes in 0 blocks
==8054== Rerun with --leak-check=full to see details of leaked memory
==8054==
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8056-- Caught __NR_exit; running __libc_freeres()
==8056== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8056-by-pythonnut-on-???
==8056== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8056-by-pythonnut-on-???
==8056== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8056-by-pythonnut-on-???
==8056==
==8056== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8056== don't want to do, unless you know exactly what you're doing,
==8056== or are doing some strange experiment):
==8056== /usr/lib/valgrind/../../bin/vgdb --pid=8056 ...command...
==8056==
==8056== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8056== /path/to/gdb ./zsh
==8056== and then give GDB the following command
==8056== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8056
==8056== --pid is optional if only one valgrind process is running
==8056==
--8056-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8056==
==8056== HEAP SUMMARY:
==8056== in use at exit: 575,833 bytes in 15,022 blocks
==8056== total heap usage: 78,835 allocs, 63,813 frees, 8,205,527 bytes allocated
==8056==
==8056== Searching for pointers to 15,022 not-freed blocks
--8056-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8056-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8056-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8056-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8056-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8056-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8056-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8056-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8056-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8056-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8056-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8056-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8056-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8056-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8056-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8056-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8056-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8056-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8056-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8056-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8056-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8056-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8056-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8056-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8056-- Scanning root segment: 0x701a000..0x701afff (4096)
--8056-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8056== Checked 967,984 bytes
==8056==
==8056== LEAK SUMMARY:
==8056== definitely lost: 0 bytes in 0 blocks
==8056== indirectly lost: 0 bytes in 0 blocks
==8056== possibly lost: 0 bytes in 0 blocks
==8056== still reachable: 575,833 bytes in 15,022 blocks
==8056== suppressed: 0 bytes in 0 blocks
==8056== Rerun with --leak-check=full to see details of leaked memory
==8056==
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8143-- Caught __NR_exit; running __libc_freeres()
==8143== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8143-by-pythonnut-on-???
==8143== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8143-by-pythonnut-on-???
==8143== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8143-by-pythonnut-on-???
==8143==
==8143== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8143== don't want to do, unless you know exactly what you're doing,
==8143== or are doing some strange experiment):
==8143== /usr/lib/valgrind/../../bin/vgdb --pid=8143 ...command...
==8143==
==8143== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8143== /path/to/gdb ./zsh
==8143== and then give GDB the following command
==8143== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8143
==8143== --pid is optional if only one valgrind process is running
==8143==
--8143-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8143==
==8143== HEAP SUMMARY:
==8143== in use at exit: 627,473 bytes in 16,376 blocks
==8143== total heap usage: 92,846 allocs, 76,470 frees, 9,597,128 bytes allocated
==8143==
==8143== Searching for pointers to 16,376 not-freed blocks
--8143-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8143-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8143-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8143-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8143-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8143-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8143-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8143-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8143-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8143-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8143-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8143-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8143-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8143-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8143-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8143-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8143-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8143-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8143-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8143-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8143-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8143-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8143-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8143-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8143-- Scanning root segment: 0x701a000..0x701afff (4096)
--8143-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8143== Checked 1,016,464 bytes
==8143==
==8143== LEAK SUMMARY:
==8143== definitely lost: 0 bytes in 0 blocks
==8143== indirectly lost: 0 bytes in 0 blocks
==8143== possibly lost: 0 bytes in 0 blocks
==8143== still reachable: 627,473 bytes in 16,376 blocks
==8143== suppressed: 0 bytes in 0 blocks
==8143== Rerun with --leak-check=full to see details of leaked memory
==8143==
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8144-- Caught __NR_exit; running __libc_freeres()
==8144== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8144-by-pythonnut-on-???
==8144== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8144-by-pythonnut-on-???
==8144== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8144-by-pythonnut-on-???
==8144==
==8144== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8144== don't want to do, unless you know exactly what you're doing,
==8144== or are doing some strange experiment):
==8144== /usr/lib/valgrind/../../bin/vgdb --pid=8144 ...command...
==8144==
==8144== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8144== /path/to/gdb ./zsh
==8144== and then give GDB the following command
==8144== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8144
==8144== --pid is optional if only one valgrind process is running
==8144==
--8144-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8144==
==8144== HEAP SUMMARY:
==8144== in use at exit: 638,116 bytes in 16,696 blocks
==8144== total heap usage: 95,969 allocs, 79,273 frees, 9,911,953 bytes allocated
==8144==
==8144== Searching for pointers to 16,696 not-freed blocks
--8144-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8144-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8144-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8144-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8144-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8144-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8144-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8144-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8144-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8144-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8144-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8144-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8144-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8144-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8144-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8144-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8144-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8144-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8144-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8144-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8144-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8144-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8144-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8144-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8144-- Scanning root segment: 0x701a000..0x701afff (4096)
--8144-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8144== Checked 1,026,440 bytes
==8144==
==8144== LEAK SUMMARY:
==8144== definitely lost: 0 bytes in 0 blocks
==8144== indirectly lost: 0 bytes in 0 blocks
==8144== possibly lost: 0 bytes in 0 blocks
==8144== still reachable: 638,116 bytes in 16,696 blocks
==8144== suppressed: 0 bytes in 0 blocks
==8144== Rerun with --leak-check=full to see details of leaked memory
==8144==
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8145-by-pythonnut-on-???
==8145== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8145-by-pythonnut-on-???
==8145== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8145-by-pythonnut-on-???
==8145==
==8145== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8145== don't want to do, unless you know exactly what you're doing,
==8145== or are doing some strange experiment):
==8145== /usr/lib/valgrind/../../bin/vgdb --pid=8145 ...command...
==8145==
==8145== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8145== /path/to/gdb ./zsh
==8145== and then give GDB the following command
==8145== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8145
==8145== --pid is optional if only one valgrind process is running
==8145==
--8145-- Caught __NR_exit; running __libc_freeres()
--8145-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8145==
==8145== HEAP SUMMARY:
==8145== in use at exit: 680,981 bytes in 17,979 blocks
==8145== total heap usage: 109,039 allocs, 91,060 frees, 11,231,634 bytes allocated
==8145==
==8145== Searching for pointers to 17,979 not-freed blocks
--8145-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8145-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8145-- Scanning root segment: 0x4022000..0x4043fff (139264)
--8145-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8145-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8145-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8145-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8145-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8145-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8145-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8145-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8145-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8145-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8145-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8145-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8145-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8145-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8145-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8145-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8145-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8145-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8145-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8145-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8145-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8145-- Scanning root segment: 0x701a000..0x701afff (4096)
--8145-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8145== Checked 1,066,368 bytes
==8145==
==8145== LEAK SUMMARY:
==8145== definitely lost: 0 bytes in 0 blocks
==8145== indirectly lost: 0 bytes in 0 blocks
==8145== possibly lost: 0 bytes in 0 blocks
==8145== still reachable: 680,981 bytes in 17,979 blocks
==8145== suppressed: 0 bytes in 0 blocks
==8145== Rerun with --leak-check=full to see details of leaked memory
==8145==
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8155-by-pythonnut-on-???
==8155== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8155-by-pythonnut-on-???
==8155== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8155-by-pythonnut-on-???
==8155==
==8155== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8155== don't want to do, unless you know exactly what you're doing,
==8155== or are doing some strange experiment):
==8155== /usr/lib/valgrind/../../bin/vgdb --pid=8155 ...command...
==8155==
==8155== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8155== /path/to/gdb ./zsh
==8155== and then give GDB the following command
==8155== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8155
==8155== --pid is optional if only one valgrind process is running
==8155==
--8155-- Caught __NR_exit; running __libc_freeres()
--8155-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8155==
==8155== HEAP SUMMARY:
==8155== in use at exit: 862,691 bytes in 21,780 blocks
==8155== total heap usage: 152,151 allocs, 130,371 frees, 16,612,056 bytes allocated
==8155==
==8155== Searching for pointers to 21,780 not-freed blocks
--8155-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8155-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8155-- Scanning root segment: 0x4022000..0x4047fff (155648)
--8155-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8155-- Scanning root segment: 0x41d6000..0x41f9fff (147456)
--8155-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8155-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8155-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8155-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8155-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8155-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8155-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8155-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8155-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8155-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8155-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8155-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8155-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8155-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8155-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8155-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8155-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8155-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8155-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8155-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8155-- Scanning root segment: 0x701a000..0x701afff (4096)
--8155-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8155== Checked 1,398,384 bytes
==8155==
==8155== LEAK SUMMARY:
==8155== definitely lost: 0 bytes in 0 blocks
==8155== indirectly lost: 0 bytes in 0 blocks
==8155== possibly lost: 0 bytes in 0 blocks
==8155== still reachable: 862,691 bytes in 21,780 blocks
==8155== suppressed: 0 bytes in 0 blocks
==8155== Rerun with --leak-check=full to see details of leaked memory
==8155==
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8157-by-pythonnut-on-???
==8157== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8157-by-pythonnut-on-???
==8157== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8157-by-pythonnut-on-???
==8157==
==8157== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8157== don't want to do, unless you know exactly what you're doing,
==8157== or are doing some strange experiment):
==8157== /usr/lib/valgrind/../../bin/vgdb --pid=8157 ...command...
==8157==
==8157== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8157== /path/to/gdb ./zsh
==8157== and then give GDB the following command
==8157== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8157
==8157== --pid is optional if only one valgrind process is running
==8157==
--8157-- Caught __NR_exit; running __libc_freeres()
--8157-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8157==
==8157== HEAP SUMMARY:
==8157== in use at exit: 863,443 bytes in 21,801 blocks
==8157== total heap usage: 153,088 allocs, 131,287 frees, 16,653,254 bytes allocated
==8157==
==8157== Searching for pointers to 21,801 not-freed blocks
--8157-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8157-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8157-- Scanning root segment: 0x4022000..0x4047fff (155648)
--8157-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8157-- Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8157-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8157-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8157-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8157-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8157-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8157-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8157-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8157-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8157-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8157-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8157-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8157-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8157-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8157-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8157-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8157-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8157-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8157-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8157-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8157-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8157-- Scanning root segment: 0x701a000..0x701afff (4096)
--8157-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8157== Checked 1,415,360 bytes
==8157==
==8157== LEAK SUMMARY:
==8157== definitely lost: 0 bytes in 0 blocks
==8157== indirectly lost: 0 bytes in 0 blocks
==8157== possibly lost: 0 bytes in 0 blocks
==8157== still reachable: 863,443 bytes in 21,801 blocks
==8157== suppressed: 0 bytes in 0 blocks
==8157== Rerun with --leak-check=full to see details of leaked memory
==8157==
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8158-by-pythonnut-on-???
==8158== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8158-by-pythonnut-on-???
==8158== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8158-by-pythonnut-on-???
==8158==
==8158== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8158== don't want to do, unless you know exactly what you're doing,
==8158== or are doing some strange experiment):
==8158== /usr/lib/valgrind/../../bin/vgdb --pid=8158 ...command...
==8158==
==8158== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8158== /path/to/gdb ./zsh
==8158== and then give GDB the following command
==8158== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8158
==8158== --pid is optional if only one valgrind process is running
==8158==
--8158-- Caught __NR_exit; running __libc_freeres()
--8158-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8158==
==8158== HEAP SUMMARY:
==8158== in use at exit: 864,675 bytes in 21,852 blocks
==8158== total heap usage: 153,090 allocs, 131,238 frees, 16,802,348 bytes allocated
==8158==
==8158== Searching for pointers to 21,852 not-freed blocks
--8158-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8158-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8158-- Scanning root segment: 0x4022000..0x4047fff (155648)
--8158-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8158-- Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8158-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8158-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8158-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8158-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8158-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8158-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8158-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8158-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8158-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8158-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8158-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8158-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8158-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8158-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8158-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8158-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8158-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8158-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8158-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8158-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8158-- Scanning root segment: 0x701a000..0x701afff (4096)
--8158-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8158== Checked 1,417,104 bytes
==8158==
==8158== LEAK SUMMARY:
==8158== definitely lost: 0 bytes in 0 blocks
==8158== indirectly lost: 0 bytes in 0 blocks
==8158== possibly lost: 0 bytes in 0 blocks
==8158== still reachable: 864,675 bytes in 21,852 blocks
==8158== suppressed: 0 bytes in 0 blocks
==8158== Rerun with --leak-check=full to see details of leaked memory
==8158==
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8209== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8209-by-pythonnut-on-???
==8209== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8209-by-pythonnut-on-???
==8209== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8209-by-pythonnut-on-???
==8209==
==8209== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8209== don't want to do, unless you know exactly what you're doing,
==8209== or are doing some strange experiment):
==8209== /usr/lib/valgrind/../../bin/vgdb --pid=8209 ...command...
==8209==
==8209== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8209== /path/to/gdb ./zsh
==8209== and then give GDB the following command
==8209== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8209
==8209== --pid is optional if only one valgrind process is running
==8209==
--8209-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8209== Ignoring duplicate redirection:
--8209-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8209-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
--8209-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005, addr 0xFFEFF32BC, len 4
==8210== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8210-by-pythonnut-on-???
==8210== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8210-by-pythonnut-on-???
==8210== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8210-by-pythonnut-on-???
==8210==
==8210== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8210== don't want to do, unless you know exactly what you're doing,
==8210== or are doing some strange experiment):
==8210== /usr/lib/valgrind/../../bin/vgdb --pid=8210 ...command...
==8210==
==8210== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8210== /path/to/gdb ./zsh
==8210== and then give GDB the following command
==8210== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8210
==8210== --pid is optional if only one valgrind process is running
==8210==
--8210-- Caught __NR_exit; running __libc_freeres()
--8210-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8210==
==8210== HEAP SUMMARY:
==8210== in use at exit: 879,508 bytes in 22,704 blocks
==8210== total heap usage: 621,350 allocs, 598,646 frees, 26,661,890 bytes allocated
==8210==
==8210== Searching for pointers to 22,704 not-freed blocks
--8210-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8210-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8210-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8210-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8210-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8210-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8210-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8210-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8210-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8210-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8210-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8210-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8210-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8210-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8210-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8210-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8210-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8210-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8210-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8210-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8210-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8210-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8210-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8210-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8210-- Scanning root segment: 0x701a000..0x701afff (4096)
--8210-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8210== Checked 1,134,104 bytes
==8210==
==8210== LEAK SUMMARY:
==8210== definitely lost: 0 bytes in 0 blocks
==8210== indirectly lost: 0 bytes in 0 blocks
==8210== possibly lost: 0 bytes in 0 blocks
==8210== still reachable: 879,508 bytes in 22,704 blocks
==8210== suppressed: 0 bytes in 0 blocks
==8210== Rerun with --leak-check=full to see details of leaked memory
==8210==
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complist.so
--7806-- svma 0x0000003850, avma 0x000a83e850
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/sched.so
--7806-- svma 0x0000000f70, avma 0x000aa4bf70
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/mathfunc.so
--7806-- svma 0x0000001fb0, avma 0x000ac4ffb0
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/terminfo.so
--7806-- svma 0x0000000e40, avma 0x000ae53e40
--8212-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8212== Ignoring duplicate redirection:
--8212-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8212-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
--8212-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005, addr 0xFFEFF30FC, len 4
--8211-- Caught __NR_exit; running __libc_freeres()
==8211== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8211-by-pythonnut-on-???
==8211== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8211-by-pythonnut-on-???
==8211== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8211-by-pythonnut-on-???
==8211==
==8211== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8211== don't want to do, unless you know exactly what you're doing,
==8211== or are doing some strange experiment):
==8211== /usr/lib/valgrind/../../bin/vgdb --pid=8211 ...command...
==8211==
==8211== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8211== /path/to/gdb ./zsh
==8211== and then give GDB the following command
==8211== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8211
==8211== --pid is optional if only one valgrind process is running
==8211==
--8211-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8211==
==8211== HEAP SUMMARY:
==8211== in use at exit: 718,129 bytes in 18,932 blocks
==8211== total heap usage: 621,743 allocs, 602,811 frees, 26,759,404 bytes allocated
==8211==
==8211== Searching for pointers to 18,932 not-freed blocks
--8211-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8211-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8211-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8211-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8211-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8211-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8211-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8211-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8211-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8211-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8211-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8211-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8211-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8211-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8211-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8211-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8211-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8211-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8211-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8211-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8211-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8211-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8211-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8211-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8211-- Scanning root segment: 0x701a000..0x701afff (4096)
--8211-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8211-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8211-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8211-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8211-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8211== Checked 1,005,584 bytes
==8211==
==8211== LEAK SUMMARY:
==8211== definitely lost: 0 bytes in 0 blocks
==8211== indirectly lost: 0 bytes in 0 blocks
==8211== possibly lost: 0 bytes in 0 blocks
==8211== still reachable: 718,129 bytes in 18,932 blocks
==8211== suppressed: 0 bytes in 0 blocks
==8211== Rerun with --leak-check=full to see details of leaked memory
==8211==
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDD7C, len 4
client request: code 4d430005, addr 0xFFEFFDFDC, len 4
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFD69C, len 4
client request: code 4d430005, addr 0xFFEFFD01C, len 4
==8213== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8213-by-pythonnut-on-???
==8213== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8213-by-pythonnut-on-???
==8213== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8213-by-pythonnut-on-???
==8213==
==8213== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8213== don't want to do, unless you know exactly what you're doing,
==8213== or are doing some strange experiment):
==8213== /usr/lib/valgrind/../../bin/vgdb --pid=8213 ...command...
==8213==
==8213== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8213== /path/to/gdb ./zsh
==8213== and then give GDB the following command
==8213== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8213
==8213== --pid is optional if only one valgrind process is running
==8213==
--8214-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8214== Ignoring duplicate redirection:
--8214-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8214-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
--8214-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005, addr 0xFFEFF47DC, len 4
--8213-- Caught __NR_exit; running __libc_freeres()
--8213-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8213==
==8213== HEAP SUMMARY:
==8213== in use at exit: 719,784 bytes in 18,979 blocks
==8213== total heap usage: 628,783 allocs, 609,804 frees, 27,045,303 bytes allocated
==8213==
==8213== Searching for pointers to 18,979 not-freed blocks
--8213-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8213-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8213-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8213-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8213-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8213-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8213-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8213-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8213-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8213-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8213-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8213-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8213-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8213-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8213-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8213-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8213-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8213-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8213-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8213-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8213-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8213-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8213-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8213-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8213-- Scanning root segment: 0x701a000..0x701afff (4096)
--8213-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8213-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8213-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8213-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8213-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8213== Checked 998,600 bytes
==8213==
==8213== LEAK SUMMARY:
==8213== definitely lost: 208 bytes in 1 blocks
==8213== indirectly lost: 6,756 bytes in 7 blocks
==8213== possibly lost: 0 bytes in 0 blocks
==8213== still reachable: 712,820 bytes in 18,971 blocks
==8213== suppressed: 0 bytes in 0 blocks
==8213== Rerun with --leak-check=full to see details of leaked memory
==8213==
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
--7806-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
==8216== Ignoring duplicate redirection:
--8216-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8216-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005, addr 0xFFEFF331C, len 4
--8215-- Caught __NR_exit; running __libc_freeres()
==8215== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8215-by-pythonnut-on-???
==8215== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8215-by-pythonnut-on-???
==8215== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8215-by-pythonnut-on-???
==8215==
==8215== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8215== don't want to do, unless you know exactly what you're doing,
==8215== or are doing some strange experiment):
==8215== /usr/lib/valgrind/../../bin/vgdb --pid=8215 ...command...
==8215==
==8215== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8215== /path/to/gdb ./zsh
==8215== and then give GDB the following command
==8215== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8215
==8215== --pid is optional if only one valgrind process is running
==8215==
--8215-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8215==
==8215== HEAP SUMMARY:
==8215== in use at exit: 749,767 bytes in 19,808 blocks
==8215== total heap usage: 631,089 allocs, 611,281 frees, 27,558,234 bytes allocated
==8215==
==8215== Searching for pointers to 19,808 not-freed blocks
--8215-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8215-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8215-- Scanning root segment: 0x4022000..0x402bfff (40960)
--8215-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8215-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8215-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8215-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8215-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8215-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8215-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8215-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8215-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8215-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8215-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8215-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8215-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8215-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8215-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8215-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8215-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8215-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8215-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8215-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8215-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8215-- Scanning root segment: 0x701a000..0x701afff (4096)
--8215-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8215-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8215-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8215-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8215-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8215== Checked 1,044,800 bytes
==8215==
==8215== LEAK SUMMARY:
==8215== definitely lost: 208 bytes in 1 blocks
==8215== indirectly lost: 6,756 bytes in 7 blocks
==8215== possibly lost: 0 bytes in 0 blocks
==8215== still reachable: 742,803 bytes in 19,800 blocks
==8215== suppressed: 0 bytes in 0 blocks
==8215== Rerun with --leak-check=full to see details of leaked memory
==8215==
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFFD2FC, len 4
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005, addr 0xFFEFF4EDC, len 4
==8218== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8218-by-pythonnut-on-???
==8218== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8218-by-pythonnut-on-???
==8218== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8218-by-pythonnut-on-???
==8218==
==8218== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8218== don't want to do, unless you know exactly what you're doing,
==8218== or are doing some strange experiment):
==8218== /usr/lib/valgrind/../../bin/vgdb --pid=8218 ...command...
==8218==
==8218== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8218== /path/to/gdb ./zsh
==8218== and then give GDB the following command
==8218== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8218
==8218== --pid is optional if only one valgrind process is running
==8218==
==8219== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8219-by-pythonnut-on-???
==8219== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8219-by-pythonnut-on-???
==8219== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8219-by-pythonnut-on-???
==8219==
==8219== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8219== don't want to do, unless you know exactly what you're doing,
==8219== or are doing some strange experiment):
==8219== /usr/lib/valgrind/../../bin/vgdb --pid=8219 ...command...
==8219==
==8219== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8219== /path/to/gdb ./zsh
==8219== and then give GDB the following command
==8219== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8219
==8219== --pid is optional if only one valgrind process is running
==8219==
--8219-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF1B4C, len 4
--8219-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8219==
==8219== HEAP SUMMARY:
==8219== in use at exit: 767,979 bytes in 20,157 blocks
==8219== total heap usage: 631,898 allocs, 611,741 frees, 27,681,728 bytes allocated
==8219==
==8219== Searching for pointers to 20,157 not-freed blocks
--8219-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8219-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8219-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8219-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8219-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8219-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8219-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8219-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8219-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8219-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8219-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8219-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8219-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8219-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8219-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8219-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8219-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8219-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8219-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8219-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8219-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8219-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8219-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8219-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8219-- Scanning root segment: 0x701a000..0x701afff (4096)
--8219-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8219-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8219-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8219-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8219-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8219== Checked 1,048,304 bytes
==8219==
==8219== LEAK SUMMARY:
==8219== definitely lost: 208 bytes in 1 blocks
==8219== indirectly lost: 6,756 bytes in 7 blocks
==8219== possibly lost: 0 bytes in 0 blocks
==8219== still reachable: 761,015 bytes in 20,149 blocks
==8219== suppressed: 0 bytes in 0 blocks
==8219== Rerun with --leak-check=full to see details of leaked memory
==8219==
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8218-- Caught __NR_exit; running __libc_freeres()
--8218-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8218==
==8218== HEAP SUMMARY:
==8218== in use at exit: 767,915 bytes in 20,154 blocks
==8218== total heap usage: 631,899 allocs, 611,745 frees, 27,679,296 bytes allocated
==8218==
==8218== Searching for pointers to 20,154 not-freed blocks
--8218-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8218-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8218-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8218-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8218-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8218-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8218-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8218-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8218-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8218-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8218-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8218-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8218-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8218-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8218-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8218-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8218-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8218-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8218-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8218-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8218-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8218-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8218-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8218-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8218-- Scanning root segment: 0x701a000..0x701afff (4096)
--8218-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8218-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8218-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8218-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8218-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8218== Checked 1,047,632 bytes
==8218==
==8218== LEAK SUMMARY:
==8218== definitely lost: 208 bytes in 1 blocks
==8218== indirectly lost: 6,756 bytes in 7 blocks
==8218== possibly lost: 0 bytes in 0 blocks
==8218== still reachable: 760,951 bytes in 20,146 blocks
==8218== suppressed: 0 bytes in 0 blocks
==8218== Rerun with --leak-check=full to see details of leaked memory
==8218==
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8221-by-pythonnut-on-???
==8221== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8221-by-pythonnut-on-???
==8221== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8221-by-pythonnut-on-???
==8221==
==8221== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8221== don't want to do, unless you know exactly what you're doing,
==8221== or are doing some strange experiment):
==8221== /usr/lib/valgrind/../../bin/vgdb --pid=8221 ...command...
==8221==
==8221== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8221== /path/to/gdb ./zsh
==8221== and then give GDB the following command
==8221== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8221
==8221== --pid is optional if only one valgrind process is running
==8221==
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
client request: code 4d430005, addr 0xFFEFF101C, len 4
--8221-- Caught __NR_exit; running __libc_freeres()
--8221-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8221==
==8221== HEAP SUMMARY:
==8221== in use at exit: 795,488 bytes in 20,256 blocks
==8221== total heap usage: 633,053 allocs, 612,797 frees, 27,910,165 bytes allocated
==8221==
==8221== Searching for pointers to 20,256 not-freed blocks
--8221-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8221-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8221-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8221-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8221-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8221-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8221-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8221-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8221-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8221-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8221-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8221-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8221-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8221-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8221-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8221-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8221-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8221-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8221-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8221-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8221-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8221-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8221-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8221-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8221-- Scanning root segment: 0x701a000..0x701afff (4096)
--8221-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8221-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8221-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8221-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8221-- Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8221== Checked 1,080,656 bytes
==8221==
==8221== LEAK SUMMARY:
==8221== definitely lost: 208 bytes in 1 blocks
==8221== indirectly lost: 6,756 bytes in 7 blocks
==8221== possibly lost: 0 bytes in 0 blocks
==8221== still reachable: 788,524 bytes in 20,248 blocks
==8221== suppressed: 0 bytes in 0 blocks
==8221== Rerun with --leak-check=full to see details of leaked memory
==8221==
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF101C, len 4
--8223-- Caught __NR_exit; running __libc_freeres()
==8223== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8223-by-pythonnut-on-???
==8223== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8223-by-pythonnut-on-???
==8223== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8223-by-pythonnut-on-???
==8223==
==8223== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8223== don't want to do, unless you know exactly what you're doing,
==8223== or are doing some strange experiment):
==8223== /usr/lib/valgrind/../../bin/vgdb --pid=8223 ...command...
==8223==
==8223== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8223== /path/to/gdb ./zsh
==8223== and then give GDB the following command
==8223== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8223
==8223== --pid is optional if only one valgrind process is running
==8223==
--8223-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8223==
==8223== HEAP SUMMARY:
==8223== in use at exit: 801,704 bytes in 20,404 blocks
==8223== total heap usage: 633,358 allocs, 612,954 frees, 27,956,293 bytes allocated
==8223==
==8223== Searching for pointers to 20,404 not-freed blocks
--8223-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8223-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8223-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8223-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8223-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8223-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8223-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8223-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8223-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8223-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8223-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8223-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8223-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8223-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8223-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8223-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8223-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8223-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8223-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8223-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8223-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8223-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8223-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8223-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8223-- Scanning root segment: 0x701a000..0x701afff (4096)
--8223-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8223-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8223-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8223-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8223-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8223== Checked 1,081,968 bytes
==8223==
==8223== LEAK SUMMARY:
==8223== definitely lost: 208 bytes in 1 blocks
==8223== indirectly lost: 6,756 bytes in 7 blocks
==8223== possibly lost: 0 bytes in 0 blocks
==8223== still reachable: 794,740 bytes in 20,396 blocks
==8223== suppressed: 0 bytes in 0 blocks
==8223== Rerun with --leak-check=full to see details of leaked memory
==8223==
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/compctl.so
--7806-- svma 0x0000004520, avma 0x000b059520
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zleparameter.so
--7806-- svma 0x0000000c10, avma 0x000b269c10
==8224== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8224-by-pythonnut-on-???
==8224== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8224-by-pythonnut-on-???
==8224== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8224-by-pythonnut-on-???
==8224==
==8224== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8224== don't want to do, unless you know exactly what you're doing,
==8224== or are doing some strange experiment):
==8224== /usr/lib/valgrind/../../bin/vgdb --pid=8224 ...command...
==8224==
==8224== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8224== /path/to/gdb ./zsh
==8224== and then give GDB the following command
==8224== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8224
==8224== --pid is optional if only one valgrind process is running
==8224==
--8224-- Caught __NR_exit; running __libc_freeres()
--8224-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8224==
==8224== HEAP SUMMARY:
==8224== in use at exit: 812,534 bytes in 20,451 blocks
==8224== total heap usage: 633,776 allocs, 613,325 frees, 28,080,935 bytes allocated
==8224==
==8224== Searching for pointers to 20,451 not-freed blocks
--8224-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8224-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8224-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8224-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8224-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8224-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8224-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8224-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8224-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8224-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8224-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8224-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8224-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8224-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8224-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8224-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8224-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8224-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8224-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8224-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8224-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8224-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8224-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8224-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8224-- Scanning root segment: 0x701a000..0x701afff (4096)
--8224-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8224-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8224-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8224-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8224-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8224-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8224-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8224== Checked 1,102,368 bytes
==8224==
==8224== LEAK SUMMARY:
==8224== definitely lost: 208 bytes in 1 blocks
==8224== indirectly lost: 6,756 bytes in 7 blocks
==8224== possibly lost: 0 bytes in 0 blocks
==8224== still reachable: 805,570 bytes in 20,443 blocks
==8224== suppressed: 0 bytes in 0 blocks
==8224== Rerun with --leak-check=full to see details of leaked memory
==8224==
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005, addr 0xFFEFF211C, len 4
--8225-- Caught __NR_exit; running __libc_freeres()
==8225== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8225-by-pythonnut-on-???
==8225== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8225-by-pythonnut-on-???
==8225== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8225-by-pythonnut-on-???
==8225==
==8225== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8225== don't want to do, unless you know exactly what you're doing,
==8225== or are doing some strange experiment):
==8225== /usr/lib/valgrind/../../bin/vgdb --pid=8225 ...command...
==8225==
==8225== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8225== /path/to/gdb ./zsh
==8225== and then give GDB the following command
==8225== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8225
==8225== --pid is optional if only one valgrind process is running
==8225==
--8225-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8225==
==8225== HEAP SUMMARY:
==8225== in use at exit: 915,268 bytes in 22,030 blocks
==8225== total heap usage: 640,170 allocs, 618,140 frees, 29,935,089 bytes allocated
==8225==
==8225== Searching for pointers to 22,030 not-freed blocks
--8225-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8225-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8225-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8225-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8225-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8225-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8225-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8225-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8225-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8225-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8225-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8225-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8225-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8225-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8225-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8225-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8225-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8225-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8225-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8225-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8225-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8225-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8225-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8225-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8225-- Scanning root segment: 0x701a000..0x701afff (4096)
--8225-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8225-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8225-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8225-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8225-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8225-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8225-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8225== Checked 1,195,632 bytes
==8225==
==8225== LEAK SUMMARY:
==8225== definitely lost: 232 bytes in 2 blocks
==8225== indirectly lost: 6,811 bytes in 10 blocks
==8225== possibly lost: 0 bytes in 0 blocks
==8225== still reachable: 908,225 bytes in 22,018 blocks
==8225== suppressed: 0 bytes in 0 blocks
==8225== Rerun with --leak-check=full to see details of leaked memory
==8225==
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8228== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8228-by-pythonnut-on-???
==8228== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8228-by-pythonnut-on-???
==8228== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8228-by-pythonnut-on-???
==8228==
==8228== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8228== don't want to do, unless you know exactly what you're doing,
==8228== or are doing some strange experiment):
==8228== /usr/lib/valgrind/../../bin/vgdb --pid=8228 ...command...
==8228==
==8228== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8228== /path/to/gdb ./zsh
==8228== and then give GDB the following command
==8228== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8228
==8228== --pid is optional if only one valgrind process is running
==8228==
client request: code 4d430005, addr 0xFFEFF211C, len 4
==8227== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8227-by-pythonnut-on-???
==8227== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8227-by-pythonnut-on-???
==8227== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8227-by-pythonnut-on-???
==8227==
==8227== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8227== don't want to do, unless you know exactly what you're doing,
==8227== or are doing some strange experiment):
==8227== /usr/lib/valgrind/../../bin/vgdb --pid=8227 ...command...
==8227==
==8227== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8227== /path/to/gdb ./zsh
==8227== and then give GDB the following command
==8227== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8227
==8227== --pid is optional if only one valgrind process is running
==8227==
--8227-- Caught __NR_exit; running __libc_freeres()
--8227-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8227==
==8227== HEAP SUMMARY:
==8227== in use at exit: 916,266 bytes in 22,042 blocks
==8227== total heap usage: 640,230 allocs, 618,188 frees, 29,947,079 bytes allocated
==8227==
==8227== Searching for pointers to 22,042 not-freed blocks
--8227-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8227-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8227-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8227-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8227-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8227-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8227-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8227-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8227-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8227-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8227-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8227-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8227-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8227-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8227-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8227-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8227-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8227-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8227-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8227-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8227-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8227-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8227-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8227-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8227-- Scanning root segment: 0x701a000..0x701afff (4096)
--8227-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8227-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8227-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8227-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8227-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8227-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8227-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8227== Checked 1,196,536 bytes
==8227==
==8227== LEAK SUMMARY:
==8227== definitely lost: 247 bytes in 3 blocks
==8227== indirectly lost: 6,811 bytes in 10 blocks
==8227== possibly lost: 0 bytes in 0 blocks
==8227== still reachable: 909,208 bytes in 22,029 blocks
==8227== suppressed: 0 bytes in 0 blocks
==8227== Rerun with --leak-check=full to see details of leaked memory
==8227==
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8230== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8230-by-pythonnut-on-???
==8230== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8230-by-pythonnut-on-???
==8230== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8230-by-pythonnut-on-???
==8230==
==8230== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8230== don't want to do, unless you know exactly what you're doing,
==8230== or are doing some strange experiment):
==8230== /usr/lib/valgrind/../../bin/vgdb --pid=8230 ...command...
==8230==
==8230== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8230== /path/to/gdb ./zsh
==8230== and then give GDB the following command
==8230== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8230
==8230== --pid is optional if only one valgrind process is running
==8230==
client request: code 4d430005, addr 0xFFEFF211C, len 4
--8229-- Caught __NR_exit; running __libc_freeres()
==8229== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8229-by-pythonnut-on-???
==8229== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8229-by-pythonnut-on-???
==8229== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8229-by-pythonnut-on-???
==8229==
==8229== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8229== don't want to do, unless you know exactly what you're doing,
==8229== or are doing some strange experiment):
==8229== /usr/lib/valgrind/../../bin/vgdb --pid=8229 ...command...
==8229==
==8229== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8229== /path/to/gdb ./zsh
==8229== and then give GDB the following command
==8229== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8229
==8229== --pid is optional if only one valgrind process is running
==8229==
--8229-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8229==
==8229== HEAP SUMMARY:
==8229== in use at exit: 917,159 bytes in 22,053 blocks
==8229== total heap usage: 640,290 allocs, 618,237 frees, 29,959,130 bytes allocated
==8229==
==8229== Searching for pointers to 22,053 not-freed blocks
--8229-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8229-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8229-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8229-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8229-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8229-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8229-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8229-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8229-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8229-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8229-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8229-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8229-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8229-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8229-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8229-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8229-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8229-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8229-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8229-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8229-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8229-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8229-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8229-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8229-- Scanning root segment: 0x701a000..0x701afff (4096)
--8229-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8229-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8229-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8229-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8229-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8229-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8229-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8229== Checked 1,197,368 bytes
==8229==
==8229== LEAK SUMMARY:
==8229== definitely lost: 262 bytes in 4 blocks
==8229== indirectly lost: 6,811 bytes in 10 blocks
==8229== possibly lost: 0 bytes in 0 blocks
==8229== still reachable: 910,086 bytes in 22,039 blocks
==8229== suppressed: 0 bytes in 0 blocks
==8229== Rerun with --leak-check=full to see details of leaked memory
==8229==
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8232== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8232-by-pythonnut-on-???
==8232== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8232-by-pythonnut-on-???
==8232== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8232-by-pythonnut-on-???
==8232==
==8232== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8232== don't want to do, unless you know exactly what you're doing,
==8232== or are doing some strange experiment):
==8232== /usr/lib/valgrind/../../bin/vgdb --pid=8232 ...command...
==8232==
==8232== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8232== /path/to/gdb ./zsh
==8232== and then give GDB the following command
==8232== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8232
==8232== --pid is optional if only one valgrind process is running
==8232==
client request: code 4d430005, addr 0xFFEFF2C1C, len 4
--8231-- Caught __NR_exit; running __libc_freeres()
==8231== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8231-by-pythonnut-on-???
==8231== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8231-by-pythonnut-on-???
==8231== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8231-by-pythonnut-on-???
==8231==
==8231== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8231== don't want to do, unless you know exactly what you're doing,
==8231== or are doing some strange experiment):
==8231== /usr/lib/valgrind/../../bin/vgdb --pid=8231 ...command...
==8231==
==8231== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8231== /path/to/gdb ./zsh
==8231== and then give GDB the following command
==8231== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8231
==8231== --pid is optional if only one valgrind process is running
==8231==
--8231-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8231==
==8231== HEAP SUMMARY:
==8231== in use at exit: 928,525 bytes in 22,140 blocks
==8231== total heap usage: 640,572 allocs, 618,432 frees, 30,014,567 bytes allocated
==8231==
==8231== Searching for pointers to 22,140 not-freed blocks
--8231-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8231-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8231-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8231-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8231-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8231-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8231-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8231-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8231-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8231-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8231-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8231-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8231-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8231-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8231-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8231-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8231-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8231-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8231-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8231-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8231-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8231-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8231-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8231-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8231-- Scanning root segment: 0x701a000..0x701afff (4096)
--8231-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8231-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8231-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8231-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8231-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8231-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8231-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8231== Checked 1,207,704 bytes
==8231==
==8231== LEAK SUMMARY:
==8231== definitely lost: 253 bytes in 4 blocks
==8231== indirectly lost: 6,756 bytes in 7 blocks
==8231== possibly lost: 0 bytes in 0 blocks
==8231== still reachable: 921,516 bytes in 22,129 blocks
==8231== suppressed: 0 bytes in 0 blocks
==8231== Rerun with --leak-check=full to see details of leaked memory
==8231==
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8234== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8234-by-pythonnut-on-???
==8234== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8234-by-pythonnut-on-???
==8234== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8234-by-pythonnut-on-???
==8234==
==8234== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8234== don't want to do, unless you know exactly what you're doing,
==8234== or are doing some strange experiment):
==8234== /usr/lib/valgrind/../../bin/vgdb --pid=8234 ...command...
==8234==
==8234== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8234== /path/to/gdb ./zsh
==8234== and then give GDB the following command
==8234== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8234
==8234== --pid is optional if only one valgrind process is running
==8234==
client request: code 4d430005, addr 0xFFEFF2C1C, len 4
==8233== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8233-by-pythonnut-on-???
==8233== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8233-by-pythonnut-on-???
==8233== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8233-by-pythonnut-on-???
==8233==
==8233== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8233== don't want to do, unless you know exactly what you're doing,
==8233== or are doing some strange experiment):
==8233== /usr/lib/valgrind/../../bin/vgdb --pid=8233 ...command...
==8233==
==8233== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8233== /path/to/gdb ./zsh
==8233== and then give GDB the following command
==8233== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8233
==8233== --pid is optional if only one valgrind process is running
==8233==
--8233-- Caught __NR_exit; running __libc_freeres()
--8233-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8233==
==8233== HEAP SUMMARY:
==8233== in use at exit: 962,024 bytes in 22,425 blocks
==8233== total heap usage: 641,708 allocs, 619,283 frees, 30,204,805 bytes allocated
==8233==
==8233== Searching for pointers to 22,425 not-freed blocks
--8233-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8233-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8233-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8233-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8233-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8233-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8233-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8233-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8233-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8233-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8233-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8233-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8233-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8233-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8233-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8233-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8233-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8233-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8233-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8233-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8233-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8233-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8233-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8233-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8233-- Scanning root segment: 0x701a000..0x701afff (4096)
--8233-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8233-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8233-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8233-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8233-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8233-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8233-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8233== Checked 1,240,176 bytes
==8233==
==8233== LEAK SUMMARY:
==8233== definitely lost: 253 bytes in 4 blocks
==8233== indirectly lost: 6,756 bytes in 7 blocks
==8233== possibly lost: 0 bytes in 0 blocks
==8233== still reachable: 955,015 bytes in 22,414 blocks
==8233== suppressed: 0 bytes in 0 blocks
==8233== Rerun with --leak-check=full to see details of leaked memory
==8233==
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8236== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8236-by-pythonnut-on-???
==8236== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8236-by-pythonnut-on-???
==8236== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8236-by-pythonnut-on-???
==8236==
==8236== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8236== don't want to do, unless you know exactly what you're doing,
==8236== or are doing some strange experiment):
==8236== /usr/lib/valgrind/../../bin/vgdb --pid=8236 ...command...
==8236==
==8236== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8236== /path/to/gdb ./zsh
==8236== and then give GDB the following command
==8236== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8236
==8236== --pid is optional if only one valgrind process is running
==8236==
client request: code 4d430005, addr 0xFFEFF2C1C, len 4
==8235== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8235-by-pythonnut-on-???
==8235== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8235-by-pythonnut-on-???
==8235== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8235-by-pythonnut-on-???
==8235==
==8235== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8235== don't want to do, unless you know exactly what you're doing,
==8235== or are doing some strange experiment):
==8235== /usr/lib/valgrind/../../bin/vgdb --pid=8235 ...command...
==8235==
==8235== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8235== /path/to/gdb ./zsh
==8235== and then give GDB the following command
==8235== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8235
==8235== --pid is optional if only one valgrind process is running
==8235==
--8235-- Caught __NR_exit; running __libc_freeres()
--8235-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8235==
==8235== HEAP SUMMARY:
==8235== in use at exit: 962,495 bytes in 22,430 blocks
==8235== total heap usage: 641,757 allocs, 619,327 frees, 30,213,406 bytes allocated
==8235==
==8235== Searching for pointers to 22,430 not-freed blocks
--8235-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8235-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8235-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8235-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8235-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8235-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8235-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8235-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8235-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8235-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8235-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8235-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8235-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8235-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8235-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8235-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8235-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8235-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8235-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8235-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8235-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8235-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8235-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8235-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8235-- Scanning root segment: 0x701a000..0x701afff (4096)
--8235-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8235-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8235-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8235-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8235-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8235-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8235-- Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8235== Checked 1,240,608 bytes
==8235==
==8235== LEAK SUMMARY:
==8235== definitely lost: 253 bytes in 4 blocks
==8235== indirectly lost: 6,756 bytes in 7 blocks
==8235== possibly lost: 0 bytes in 0 blocks
==8235== still reachable: 955,486 bytes in 22,419 blocks
==8235== suppressed: 0 bytes in 0 blocks
==8235== Rerun with --leak-check=full to see details of leaked memory
==8235==
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8237-- Caught __NR_exit; running __libc_freeres()
==8237== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8237-by-pythonnut-on-???
==8237== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8237-by-pythonnut-on-???
==8237== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8237-by-pythonnut-on-???
==8237==
==8237== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8237== don't want to do, unless you know exactly what you're doing,
==8237== or are doing some strange experiment):
==8237== /usr/lib/valgrind/../../bin/vgdb --pid=8237 ...command...
==8237==
==8237== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8237== /path/to/gdb ./zsh
==8237== and then give GDB the following command
==8237== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8237
==8237== --pid is optional if only one valgrind process is running
==8237==
--8237-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8237==
==8237== HEAP SUMMARY:
==8237== in use at exit: 1,020,245 bytes in 23,340 blocks
==8237== total heap usage: 645,597 allocs, 622,257 frees, 30,544,478 bytes allocated
==8237==
==8237== Searching for pointers to 23,340 not-freed blocks
--8237-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8237-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8237-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8237-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8237-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8237-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8237-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8237-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8237-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8237-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8237-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8237-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8237-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8237-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8237-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8237-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8237-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8237-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8237-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8237-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8237-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8237-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8237-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8237-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8237-- Scanning root segment: 0x701a000..0x701afff (4096)
--8237-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8237-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8237-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8237-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8237-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8237-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8237-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8237== Checked 1,302,272 bytes
==8237==
==8237== LEAK SUMMARY:
==8237== definitely lost: 253 bytes in 4 blocks
==8237== indirectly lost: 6,756 bytes in 7 blocks
==8237== possibly lost: 0 bytes in 0 blocks
==8237== still reachable: 1,013,236 bytes in 23,329 blocks
==8237== suppressed: 0 bytes in 0 blocks
==8237== Rerun with --leak-check=full to see details of leaked memory
==8237==
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8238-by-pythonnut-on-???
==8238== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8238-by-pythonnut-on-???
==8238== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8238-by-pythonnut-on-???
==8238==
==8238== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8238== don't want to do, unless you know exactly what you're doing,
==8238== or are doing some strange experiment):
==8238== /usr/lib/valgrind/../../bin/vgdb --pid=8238 ...command...
==8238==
==8238== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8238== /path/to/gdb ./zsh
==8238== and then give GDB the following command
==8238== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8238
==8238== --pid is optional if only one valgrind process is running
==8238==
--8238-- Caught __NR_exit; running __libc_freeres()
--8238-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8238==
==8238== HEAP SUMMARY:
==8238== in use at exit: 1,020,615 bytes in 23,345 blocks
==8238== total heap usage: 645,622 allocs, 622,277 frees, 30,550,850 bytes allocated
==8238==
==8238== Searching for pointers to 23,345 not-freed blocks
--8238-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8238-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8238-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8238-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8238-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8238-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8238-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8238-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8238-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8238-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8238-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8238-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8238-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8238-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8238-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8238-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8238-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8238-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8238-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8238-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8238-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8238-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8238-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8238-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8238-- Scanning root segment: 0x701a000..0x701afff (4096)
--8238-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8238-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8238-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8238-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8238-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8238-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8238-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8238== Checked 1,302,624 bytes
==8238==
==8238== LEAK SUMMARY:
==8238== definitely lost: 253 bytes in 4 blocks
==8238== indirectly lost: 6,756 bytes in 7 blocks
==8238== possibly lost: 0 bytes in 0 blocks
==8238== still reachable: 1,013,606 bytes in 23,334 blocks
==8238== suppressed: 0 bytes in 0 blocks
==8238== Rerun with --leak-check=full to see details of leaked memory
==8238==
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8239-- Caught __NR_exit; running __libc_freeres()
==8239== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8239-by-pythonnut-on-???
==8239== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8239-by-pythonnut-on-???
==8239== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8239-by-pythonnut-on-???
==8239==
==8239== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8239== don't want to do, unless you know exactly what you're doing,
==8239== or are doing some strange experiment):
==8239== /usr/lib/valgrind/../../bin/vgdb --pid=8239 ...command...
==8239==
==8239== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8239== /path/to/gdb ./zsh
==8239== and then give GDB the following command
==8239== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8239
==8239== --pid is optional if only one valgrind process is running
==8239==
--8239-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8239==
==8239== HEAP SUMMARY:
==8239== in use at exit: 1,021,010 bytes in 23,350 blocks
==8239== total heap usage: 645,647 allocs, 622,297 frees, 30,557,329 bytes allocated
==8239==
==8239== Searching for pointers to 23,350 not-freed blocks
--8239-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8239-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8239-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8239-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8239-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8239-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8239-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8239-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8239-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8239-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8239-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8239-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8239-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8239-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8239-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8239-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8239-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8239-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8239-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8239-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8239-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8239-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8239-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8239-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8239-- Scanning root segment: 0x701a000..0x701afff (4096)
--8239-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8239-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8239-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8239-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8239-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8239-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8239-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8239== Checked 1,302,160 bytes
==8239==
==8239== LEAK SUMMARY:
==8239== definitely lost: 253 bytes in 4 blocks
==8239== indirectly lost: 6,756 bytes in 7 blocks
==8239== possibly lost: 0 bytes in 0 blocks
==8239== still reachable: 1,014,001 bytes in 23,339 blocks
==8239== suppressed: 0 bytes in 0 blocks
==8239== Rerun with --leak-check=full to see details of leaked memory
==8239==
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8240-- Caught __NR_exit; running __libc_freeres()
==8240== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8240-by-pythonnut-on-???
==8240== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8240-by-pythonnut-on-???
==8240== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8240-by-pythonnut-on-???
==8240==
==8240== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8240== don't want to do, unless you know exactly what you're doing,
==8240== or are doing some strange experiment):
==8240== /usr/lib/valgrind/../../bin/vgdb --pid=8240 ...command...
==8240==
==8240== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8240== /path/to/gdb ./zsh
==8240== and then give GDB the following command
==8240== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8240
==8240== --pid is optional if only one valgrind process is running
==8240==
--8240-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8240==
==8240== HEAP SUMMARY:
==8240== in use at exit: 1,021,390 bytes in 23,355 blocks
==8240== total heap usage: 645,672 allocs, 622,317 frees, 30,563,757 bytes allocated
==8240==
==8240== Searching for pointers to 23,355 not-freed blocks
--8240-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8240-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8240-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8240-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8240-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8240-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8240-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8240-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8240-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8240-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8240-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8240-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8240-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8240-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8240-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8240-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8240-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8240-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8240-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8240-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8240-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8240-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8240-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8240-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8240-- Scanning root segment: 0x701a000..0x701afff (4096)
--8240-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8240-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8240-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8240-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8240-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8240-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8240-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8240== Checked 1,302,520 bytes
==8240==
==8240== LEAK SUMMARY:
==8240== definitely lost: 253 bytes in 4 blocks
==8240== indirectly lost: 6,756 bytes in 7 blocks
==8240== possibly lost: 0 bytes in 0 blocks
==8240== still reachable: 1,014,381 bytes in 23,344 blocks
==8240== suppressed: 0 bytes in 0 blocks
==8240== Rerun with --leak-check=full to see details of leaked memory
==8240==
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8241-- Caught __NR_exit; running __libc_freeres()
==8241== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8241-by-pythonnut-on-???
==8241== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8241-by-pythonnut-on-???
==8241== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8241-by-pythonnut-on-???
==8241==
==8241== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8241== don't want to do, unless you know exactly what you're doing,
==8241== or are doing some strange experiment):
==8241== /usr/lib/valgrind/../../bin/vgdb --pid=8241 ...command...
==8241==
==8241== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8241== /path/to/gdb ./zsh
==8241== and then give GDB the following command
==8241== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8241
==8241== --pid is optional if only one valgrind process is running
==8241==
--8241-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8241==
==8241== HEAP SUMMARY:
==8241== in use at exit: 1,021,749 bytes in 23,360 blocks
==8241== total heap usage: 645,697 allocs, 622,337 frees, 30,570,114 bytes allocated
==8241==
==8241== Searching for pointers to 23,360 not-freed blocks
--8241-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8241-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8241-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8241-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8241-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8241-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8241-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8241-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8241-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8241-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8241-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8241-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8241-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8241-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8241-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8241-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8241-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8241-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8241-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8241-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8241-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8241-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8241-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8241-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8241-- Scanning root segment: 0x701a000..0x701afff (4096)
--8241-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8241-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8241-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8241-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8241-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8241-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8241-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8241== Checked 1,302,864 bytes
==8241==
==8241== LEAK SUMMARY:
==8241== definitely lost: 253 bytes in 4 blocks
==8241== indirectly lost: 6,756 bytes in 7 blocks
==8241== possibly lost: 0 bytes in 0 blocks
==8241== still reachable: 1,014,740 bytes in 23,349 blocks
==8241== suppressed: 0 bytes in 0 blocks
==8241== Rerun with --leak-check=full to see details of leaked memory
==8241==
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8242-- Caught __NR_exit; running __libc_freeres()
==8242== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8242-by-pythonnut-on-???
==8242== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8242-by-pythonnut-on-???
==8242== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8242-by-pythonnut-on-???
==8242==
==8242== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8242== don't want to do, unless you know exactly what you're doing,
==8242== or are doing some strange experiment):
==8242== /usr/lib/valgrind/../../bin/vgdb --pid=8242 ...command...
==8242==
==8242== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8242== /path/to/gdb ./zsh
==8242== and then give GDB the following command
==8242== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8242
==8242== --pid is optional if only one valgrind process is running
==8242==
--8242-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8242==
==8242== HEAP SUMMARY:
==8242== in use at exit: 1,022,120 bytes in 23,365 blocks
==8242== total heap usage: 645,722 allocs, 622,357 frees, 30,576,527 bytes allocated
==8242==
==8242== Searching for pointers to 23,365 not-freed blocks
--8242-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8242-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8242-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8242-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8242-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8242-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8242-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8242-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8242-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8242-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8242-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8242-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8242-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8242-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8242-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8242-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8242-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8242-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8242-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8242-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8242-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8242-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8242-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8242-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8242-- Scanning root segment: 0x701a000..0x701afff (4096)
--8242-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8242-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8242-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8242-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8242-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8242-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8242-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8242== Checked 1,303,216 bytes
==8242==
==8242== LEAK SUMMARY:
==8242== definitely lost: 253 bytes in 4 blocks
==8242== indirectly lost: 6,756 bytes in 7 blocks
==8242== possibly lost: 0 bytes in 0 blocks
==8242== still reachable: 1,015,111 bytes in 23,354 blocks
==8242== suppressed: 0 bytes in 0 blocks
==8242== Rerun with --leak-check=full to see details of leaked memory
==8242==
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8243-by-pythonnut-on-???
==8243== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8243-by-pythonnut-on-???
==8243== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8243-by-pythonnut-on-???
==8243==
==8243== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8243== don't want to do, unless you know exactly what you're doing,
==8243== or are doing some strange experiment):
==8243== /usr/lib/valgrind/../../bin/vgdb --pid=8243 ...command...
==8243==
==8243== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8243== /path/to/gdb ./zsh
==8243== and then give GDB the following command
==8243== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8243
==8243== --pid is optional if only one valgrind process is running
==8243==
--8243-- Caught __NR_exit; running __libc_freeres()
--8243-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8243==
==8243== HEAP SUMMARY:
==8243== in use at exit: 1,022,475 bytes in 23,370 blocks
==8243== total heap usage: 645,747 allocs, 622,377 frees, 30,582,880 bytes allocated
==8243==
==8243== Searching for pointers to 23,370 not-freed blocks
--8243-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8243-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8243-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8243-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8243-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8243-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8243-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8243-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8243-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8243-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8243-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8243-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8243-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8243-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8243-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8243-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8243-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8243-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8243-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8243-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8243-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8243-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8243-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8243-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8243-- Scanning root segment: 0x701a000..0x701afff (4096)
--8243-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8243-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8243-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8243-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8243-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8243-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8243-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8243== Checked 1,303,552 bytes
==8243==
==8243== LEAK SUMMARY:
==8243== definitely lost: 253 bytes in 4 blocks
==8243== indirectly lost: 6,756 bytes in 7 blocks
==8243== possibly lost: 0 bytes in 0 blocks
==8243== still reachable: 1,015,466 bytes in 23,359 blocks
==8243== suppressed: 0 bytes in 0 blocks
==8243== Rerun with --leak-check=full to see details of leaked memory
==8243==
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8244-by-pythonnut-on-???
==8244== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8244-by-pythonnut-on-???
==8244== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8244-by-pythonnut-on-???
==8244==
==8244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8244== don't want to do, unless you know exactly what you're doing,
==8244== or are doing some strange experiment):
==8244== /usr/lib/valgrind/../../bin/vgdb --pid=8244 ...command...
==8244==
==8244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8244== /path/to/gdb ./zsh
==8244== and then give GDB the following command
==8244== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8244
==8244== --pid is optional if only one valgrind process is running
==8244==
--8244-- Caught __NR_exit; running __libc_freeres()
--8244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8244==
==8244== HEAP SUMMARY:
==8244== in use at exit: 1,022,829 bytes in 23,375 blocks
==8244== total heap usage: 645,772 allocs, 622,397 frees, 30,589,236 bytes allocated
==8244==
==8244== Searching for pointers to 23,375 not-freed blocks
--8244-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8244-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8244-- Scanning root segment: 0x4022000..0x4028fff (28672)
--8244-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8244-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8244-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8244-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8244-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8244-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8244-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8244-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8244-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8244-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8244-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8244-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8244-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8244-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8244-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8244-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8244-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8244-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8244-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8244-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8244-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8244-- Scanning root segment: 0x701a000..0x701afff (4096)
--8244-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8244-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8244-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8244-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8244-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8244-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8244-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8244== Checked 1,303,888 bytes
==8244==
==8244== LEAK SUMMARY:
==8244== definitely lost: 253 bytes in 4 blocks
==8244== indirectly lost: 6,756 bytes in 7 blocks
==8244== possibly lost: 0 bytes in 0 blocks
==8244== still reachable: 1,015,820 bytes in 23,364 blocks
==8244== suppressed: 0 bytes in 0 blocks
==8244== Rerun with --leak-check=full to see details of leaked memory
==8244==
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8245-by-pythonnut-on-???
==8245== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8245-by-pythonnut-on-???
==8245== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8245-by-pythonnut-on-???
==8245==
==8245== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8245== don't want to do, unless you know exactly what you're doing,
==8245== or are doing some strange experiment):
==8245== /usr/lib/valgrind/../../bin/vgdb --pid=8245 ...command...
==8245==
==8245== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8245== /path/to/gdb ./zsh
==8245== and then give GDB the following command
==8245== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8245
==8245== --pid is optional if only one valgrind process is running
==8245==
--8245-- Caught __NR_exit; running __libc_freeres()
--8245-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8245==
==8245== HEAP SUMMARY:
==8245== in use at exit: 1,022,166 bytes in 23,346 blocks
==8245== total heap usage: 645,880 allocs, 622,534 frees, 30,596,379 bytes allocated
==8245==
==8245== Searching for pointers to 23,346 not-freed blocks
--8245-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8245-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8245-- Scanning root segment: 0x4022000..0x402cfff (45056)
--8245-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8245-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8245-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8245-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8245-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8245-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8245-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8245-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8245-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8245-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8245-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8245-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8245-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8245-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8245-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8245-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8245-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8245-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8245-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8245-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8245-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8245-- Scanning root segment: 0x701a000..0x701afff (4096)
--8245-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8245-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8245-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8245-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8245-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8245-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8245-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8245== Checked 1,317,568 bytes
==8245==
==8245== LEAK SUMMARY:
==8245== definitely lost: 253 bytes in 4 blocks
==8245== indirectly lost: 6,756 bytes in 7 blocks
==8245== possibly lost: 0 bytes in 0 blocks
==8245== still reachable: 1,015,157 bytes in 23,335 blocks
==8245== suppressed: 0 bytes in 0 blocks
==8245== Rerun with --leak-check=full to see details of leaked memory
==8245==
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8246-- Caught __NR_exit; running __libc_freeres()
==8246== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8246-by-pythonnut-on-???
==8246== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8246-by-pythonnut-on-???
==8246== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8246-by-pythonnut-on-???
==8246==
==8246== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8246== don't want to do, unless you know exactly what you're doing,
==8246== or are doing some strange experiment):
==8246== /usr/lib/valgrind/../../bin/vgdb --pid=8246 ...command...
==8246==
==8246== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8246== /path/to/gdb ./zsh
==8246== and then give GDB the following command
==8246== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8246
==8246== --pid is optional if only one valgrind process is running
==8246==
--8246-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8246==
==8246== HEAP SUMMARY:
==8246== in use at exit: 1,022,143 bytes in 23,346 blocks
==8246== total heap usage: 645,835 allocs, 622,489 frees, 30,597,901 bytes allocated
==8246==
==8246== Searching for pointers to 23,346 not-freed blocks
--8246-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8246-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8246-- Scanning root segment: 0x4022000..0x402cfff (45056)
--8246-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8246-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8246-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8246-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8246-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8246-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8246-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8246-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8246-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8246-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8246-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8246-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8246-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8246-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8246-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8246-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8246-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8246-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8246-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8246-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8246-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8246-- Scanning root segment: 0x701a000..0x701afff (4096)
--8246-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8246-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8246-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8246-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8246-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8246-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8246-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8246== Checked 1,317,576 bytes
==8246==
==8246== LEAK SUMMARY:
==8246== definitely lost: 253 bytes in 4 blocks
==8246== indirectly lost: 6,756 bytes in 7 blocks
==8246== possibly lost: 0 bytes in 0 blocks
==8246== still reachable: 1,015,134 bytes in 23,335 blocks
==8246== suppressed: 0 bytes in 0 blocks
==8246== Rerun with --leak-check=full to see details of leaked memory
==8246==
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430100, addr 0x4C31E1E, len 67288356
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806== by 0x488CD0: stringsubst (subst.c:301)
==7806== by 0x48801B: prefork (subst.c:77)
==7806== by 0x42B318: execcmd (exec.c:2619)
==7806== by 0x428CA0: execpline2 (exec.c:1697)
==7806== by 0x427FD2: execpline (exec.c:1484)
==7806== by 0x427756: execlist (exec.c:1267)
==7806== by 0x42717C: execode (exec.c:1073)
==7806== by 0x431299: runshfunc (exec.c:5040)
==7806== by 0x430E76: doshfunc (exec.c:4920)
==7806== by 0x4302FB: execshfunc (exec.c:4557)
==7806== by 0x42D8C1: execcmd (exec.c:3373)
==7806==
==8247== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8247-by-pythonnut-on-???
==8247== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8247-by-pythonnut-on-???
==8247== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8247-by-pythonnut-on-???
==8247==
==8247== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8247== don't want to do, unless you know exactly what you're doing,
==8247== or are doing some strange experiment):
==8247== /usr/lib/valgrind/../../bin/vgdb --pid=8247 ...command...
==8247==
==8247== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8247== /path/to/gdb ./zsh
==8247== and then give GDB the following command
==8247== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8247
==8247== --pid is optional if only one valgrind process is running
==8247==
--8247-- Caught __NR_exit; running __libc_freeres()
--8247-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8247==
==8247== HEAP SUMMARY:
==8247== in use at exit: 1,049,587 bytes in 23,943 blocks
==8247== total heap usage: 648,207 allocs, 624,264 frees, 30,758,770 bytes allocated
==8247==
==8247== Searching for pointers to 23,943 not-freed blocks
--8247-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8247-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8247-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8247-- Scanning root segment: 0x402a000..0x402efff (20480)
--8247-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8247-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8247-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8247-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8247-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8247-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8247-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8247-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8247-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8247-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8247-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8247-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8247-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8247-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8247-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8247-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8247-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8247-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8247-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8247-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8247-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8247-- Scanning root segment: 0x701a000..0x701afff (4096)
--8247-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8247-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8247-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8247-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8247-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8247-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8247-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8247== Checked 1,339,768 bytes
==8247==
==8247== LEAK SUMMARY:
==8247== definitely lost: 253 bytes in 4 blocks
==8247== indirectly lost: 6,756 bytes in 7 blocks
==8247== possibly lost: 0 bytes in 0 blocks
==8247== still reachable: 1,042,578 bytes in 23,932 blocks
==8247== suppressed: 0 bytes in 0 blocks
==8247== Rerun with --leak-check=full to see details of leaked memory
==8247==
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8247==
==8247== 1 errors in context 1 of 1:
==8247== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8247== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8247== by 0x488CD0: stringsubst (subst.c:301)
==8247== by 0x48801B: prefork (subst.c:77)
==8247== by 0x42B318: execcmd (exec.c:2619)
==8247== by 0x428CA0: execpline2 (exec.c:1697)
==8247== by 0x427FD2: execpline (exec.c:1484)
==8247== by 0x427756: execlist (exec.c:1267)
==8247== by 0x42717C: execode (exec.c:1073)
==8247== by 0x431299: runshfunc (exec.c:5040)
==8247== by 0x430E76: doshfunc (exec.c:4920)
==8247== by 0x4302FB: execshfunc (exec.c:4557)
==8247== by 0x42D8C1: execcmd (exec.c:3373)
==8247==
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF328C, len 4
==8249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8249-by-pythonnut-on-???
==8249== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8249-by-pythonnut-on-???
==8249== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8249-by-pythonnut-on-???
==8249==
==8249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8249== don't want to do, unless you know exactly what you're doing,
==8249== or are doing some strange experiment):
==8249== /usr/lib/valgrind/../../bin/vgdb --pid=8249 ...command...
==8249==
==8249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8249== /path/to/gdb ./zsh
==8249== and then give GDB the following command
==8249== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8249
==8249== --pid is optional if only one valgrind process is running
==8249==
--8248-- Caught __NR_exit; running __libc_freeres()
==8248== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8248-by-pythonnut-on-???
==8248== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8248-by-pythonnut-on-???
==8248== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8248-by-pythonnut-on-???
==8248==
==8248== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8248== don't want to do, unless you know exactly what you're doing,
==8248== or are doing some strange experiment):
==8248== /usr/lib/valgrind/../../bin/vgdb --pid=8248 ...command...
==8248==
==8248== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8248== /path/to/gdb ./zsh
==8248== and then give GDB the following command
==8248== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8248
==8248== --pid is optional if only one valgrind process is running
==8248==
--8248-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8248==
==8248== HEAP SUMMARY:
==8248== in use at exit: 1,059,265 bytes in 24,034 blocks
==8248== total heap usage: 648,836 allocs, 624,802 frees, 30,848,298 bytes allocated
==8248==
==8248== Searching for pointers to 24,034 not-freed blocks
--8248-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8248-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8248-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8248-- Scanning root segment: 0x402a000..0x402afff (4096)
--8248-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8248-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8248-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8248-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8248-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8248-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8248-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8248-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8248-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8248-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8248-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8248-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8248-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8248-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8248-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8248-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8248-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8248-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8248-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8248-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8248-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8248-- Scanning root segment: 0x701a000..0x701afff (4096)
--8248-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8248-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8248-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8248-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8248-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8248-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8248-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8248== Checked 1,331,856 bytes
==8248==
==8248== LEAK SUMMARY:
==8248== definitely lost: 253 bytes in 4 blocks
==8248== indirectly lost: 6,756 bytes in 7 blocks
==8248== possibly lost: 0 bytes in 0 blocks
==8248== still reachable: 1,052,256 bytes in 24,023 blocks
==8248== suppressed: 0 bytes in 0 blocks
==8248== Rerun with --leak-check=full to see details of leaked memory
==8248==
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8248==
==8248== 1 errors in context 1 of 1:
==8248== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8248== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8248== by 0x488CD0: stringsubst (subst.c:301)
==8248== by 0x48801B: prefork (subst.c:77)
==8248== by 0x42B318: execcmd (exec.c:2619)
==8248== by 0x428CA0: execpline2 (exec.c:1697)
==8248== by 0x427FD2: execpline (exec.c:1484)
==8248== by 0x427756: execlist (exec.c:1267)
==8248== by 0x42717C: execode (exec.c:1073)
==8248== by 0x431299: runshfunc (exec.c:5040)
==8248== by 0x430E76: doshfunc (exec.c:4920)
==8248== by 0x4302FB: execshfunc (exec.c:4557)
==8248== by 0x42D8C1: execcmd (exec.c:3373)
==8248==
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8251== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8251-by-pythonnut-on-???
==8251== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8251-by-pythonnut-on-???
==8251== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8251-by-pythonnut-on-???
==8251==
==8251== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8251== don't want to do, unless you know exactly what you're doing,
==8251== or are doing some strange experiment):
==8251== /usr/lib/valgrind/../../bin/vgdb --pid=8251 ...command...
==8251==
==8251== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8251== /path/to/gdb ./zsh
==8251== and then give GDB the following command
==8251== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8251
==8251== --pid is optional if only one valgrind process is running
==8251==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8250-- Caught __NR_exit; running __libc_freeres()
==8250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8250-by-pythonnut-on-???
==8250== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8250-by-pythonnut-on-???
==8250== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8250-by-pythonnut-on-???
==8250==
==8250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8250== don't want to do, unless you know exactly what you're doing,
==8250== or are doing some strange experiment):
==8250== /usr/lib/valgrind/../../bin/vgdb --pid=8250 ...command...
==8250==
==8250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8250== /path/to/gdb ./zsh
==8250== and then give GDB the following command
==8250== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8250
==8250== --pid is optional if only one valgrind process is running
==8250==
--8250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8250==
==8250== HEAP SUMMARY:
==8250== in use at exit: 1,059,633 bytes in 24,043 blocks
==8250== total heap usage: 648,870 allocs, 624,827 frees, 30,854,873 bytes allocated
==8250==
==8250== Searching for pointers to 24,043 not-freed blocks
--8250-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8250-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8250-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8250-- Scanning root segment: 0x402a000..0x402afff (4096)
--8250-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8250-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8250-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8250-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8250-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8250-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8250-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8250-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8250-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8250-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8250-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8250-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8250-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8250-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8250-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8250-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8250-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8250-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8250-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8250-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8250-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8250-- Scanning root segment: 0x701a000..0x701afff (4096)
--8250-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8250-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8250-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8250-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8250-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8250-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8250-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8250== Checked 1,332,200 bytes
==8250==
==8250== LEAK SUMMARY:
==8250== definitely lost: 253 bytes in 4 blocks
==8250== indirectly lost: 6,756 bytes in 7 blocks
==8250== possibly lost: 0 bytes in 0 blocks
==8250== still reachable: 1,052,624 bytes in 24,032 blocks
==8250== suppressed: 0 bytes in 0 blocks
==8250== Rerun with --leak-check=full to see details of leaked memory
==8250==
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8250==
==8250== 1 errors in context 1 of 1:
==8250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8250== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8250== by 0x488CD0: stringsubst (subst.c:301)
==8250== by 0x48801B: prefork (subst.c:77)
==8250== by 0x42B318: execcmd (exec.c:2619)
==8250== by 0x428CA0: execpline2 (exec.c:1697)
==8250== by 0x427FD2: execpline (exec.c:1484)
==8250== by 0x427756: execlist (exec.c:1267)
==8250== by 0x42717C: execode (exec.c:1073)
==8250== by 0x431299: runshfunc (exec.c:5040)
==8250== by 0x430E76: doshfunc (exec.c:4920)
==8250== by 0x4302FB: execshfunc (exec.c:4557)
==8250== by 0x42D8C1: execcmd (exec.c:3373)
==8250==
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8253-by-pythonnut-on-???
==8253== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8253-by-pythonnut-on-???
==8253== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8253-by-pythonnut-on-???
==8253==
==8253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8253== don't want to do, unless you know exactly what you're doing,
==8253== or are doing some strange experiment):
==8253== /usr/lib/valgrind/../../bin/vgdb --pid=8253 ...command...
==8253==
==8253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8253== /path/to/gdb ./zsh
==8253== and then give GDB the following command
==8253== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8253
==8253== --pid is optional if only one valgrind process is running
==8253==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8252-- Caught __NR_exit; running __libc_freeres()
==8252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8252-by-pythonnut-on-???
==8252== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8252-by-pythonnut-on-???
==8252== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8252-by-pythonnut-on-???
==8252==
==8252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8252== don't want to do, unless you know exactly what you're doing,
==8252== or are doing some strange experiment):
==8252== /usr/lib/valgrind/../../bin/vgdb --pid=8252 ...command...
==8252==
==8252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8252== /path/to/gdb ./zsh
==8252== and then give GDB the following command
==8252== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8252
==8252== --pid is optional if only one valgrind process is running
==8252==
--8252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8252==
==8252== HEAP SUMMARY:
==8252== in use at exit: 1,060,067 bytes in 24,052 blocks
==8252== total heap usage: 648,904 allocs, 624,852 frees, 30,861,449 bytes allocated
==8252==
==8252== Searching for pointers to 24,052 not-freed blocks
--8252-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8252-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8252-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8252-- Scanning root segment: 0x402a000..0x402afff (4096)
--8252-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8252-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8252-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8252-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8252-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8252-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8252-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8252-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8252-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8252-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8252-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8252-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8252-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8252-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8252-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8252-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8252-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8252-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8252-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8252-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8252-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8252-- Scanning root segment: 0x701a000..0x701afff (4096)
--8252-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8252-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8252-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8252-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8252-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8252-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8252-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8252== Checked 1,332,568 bytes
==8252==
==8252== LEAK SUMMARY:
==8252== definitely lost: 253 bytes in 4 blocks
==8252== indirectly lost: 6,756 bytes in 7 blocks
==8252== possibly lost: 0 bytes in 0 blocks
==8252== still reachable: 1,053,058 bytes in 24,041 blocks
==8252== suppressed: 0 bytes in 0 blocks
==8252== Rerun with --leak-check=full to see details of leaked memory
==8252==
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8252==
==8252== 1 errors in context 1 of 1:
==8252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8252== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8252== by 0x488CD0: stringsubst (subst.c:301)
==8252== by 0x48801B: prefork (subst.c:77)
==8252== by 0x42B318: execcmd (exec.c:2619)
==8252== by 0x428CA0: execpline2 (exec.c:1697)
==8252== by 0x427FD2: execpline (exec.c:1484)
==8252== by 0x427756: execlist (exec.c:1267)
==8252== by 0x42717C: execode (exec.c:1073)
==8252== by 0x431299: runshfunc (exec.c:5040)
==8252== by 0x430E76: doshfunc (exec.c:4920)
==8252== by 0x4302FB: execshfunc (exec.c:4557)
==8252== by 0x42D8C1: execcmd (exec.c:3373)
==8252==
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8255-by-pythonnut-on-???
==8255== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8255-by-pythonnut-on-???
==8255== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8255-by-pythonnut-on-???
==8255==
==8255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8255== don't want to do, unless you know exactly what you're doing,
==8255== or are doing some strange experiment):
==8255== /usr/lib/valgrind/../../bin/vgdb --pid=8255 ...command...
==8255==
==8255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8255== /path/to/gdb ./zsh
==8255== and then give GDB the following command
==8255== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8255
==8255== --pid is optional if only one valgrind process is running
==8255==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8254-- Caught __NR_exit; running __libc_freeres()
==8254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8254-by-pythonnut-on-???
==8254== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8254-by-pythonnut-on-???
==8254== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8254-by-pythonnut-on-???
==8254==
==8254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8254== don't want to do, unless you know exactly what you're doing,
==8254== or are doing some strange experiment):
==8254== /usr/lib/valgrind/../../bin/vgdb --pid=8254 ...command...
==8254==
==8254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8254== /path/to/gdb ./zsh
==8254== and then give GDB the following command
==8254== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8254
==8254== --pid is optional if only one valgrind process is running
==8254==
--8254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8254==
==8254== HEAP SUMMARY:
==8254== in use at exit: 1,060,500 bytes in 24,061 blocks
==8254== total heap usage: 648,938 allocs, 624,877 frees, 30,868,028 bytes allocated
==8254==
==8254== Searching for pointers to 24,061 not-freed blocks
--8254-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8254-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8254-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8254-- Scanning root segment: 0x402a000..0x402afff (4096)
--8254-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8254-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8254-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8254-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8254-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8254-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8254-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8254-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8254-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8254-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8254-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8254-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8254-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8254-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8254-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8254-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8254-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8254-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8254-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8254-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8254-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8254-- Scanning root segment: 0x701a000..0x701afff (4096)
--8254-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8254-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8254-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8254-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8254-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8254-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8254-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8254== Checked 1,332,960 bytes
==8254==
==8254== LEAK SUMMARY:
==8254== definitely lost: 253 bytes in 4 blocks
==8254== indirectly lost: 6,756 bytes in 7 blocks
==8254== possibly lost: 0 bytes in 0 blocks
==8254== still reachable: 1,053,491 bytes in 24,050 blocks
==8254== suppressed: 0 bytes in 0 blocks
==8254== Rerun with --leak-check=full to see details of leaked memory
==8254==
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8254==
==8254== 1 errors in context 1 of 1:
==8254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8254== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8254== by 0x488CD0: stringsubst (subst.c:301)
==8254== by 0x48801B: prefork (subst.c:77)
==8254== by 0x42B318: execcmd (exec.c:2619)
==8254== by 0x428CA0: execpline2 (exec.c:1697)
==8254== by 0x427FD2: execpline (exec.c:1484)
==8254== by 0x427756: execlist (exec.c:1267)
==8254== by 0x42717C: execode (exec.c:1073)
==8254== by 0x431299: runshfunc (exec.c:5040)
==8254== by 0x430E76: doshfunc (exec.c:4920)
==8254== by 0x4302FB: execshfunc (exec.c:4557)
==8254== by 0x42D8C1: execcmd (exec.c:3373)
==8254==
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8257-by-pythonnut-on-???
==8257== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8257-by-pythonnut-on-???
==8257== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8257-by-pythonnut-on-???
==8257==
==8257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8257== don't want to do, unless you know exactly what you're doing,
==8257== or are doing some strange experiment):
==8257== /usr/lib/valgrind/../../bin/vgdb --pid=8257 ...command...
==8257==
==8257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8257== /path/to/gdb ./zsh
==8257== and then give GDB the following command
==8257== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8257
==8257== --pid is optional if only one valgrind process is running
==8257==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8256-- Caught __NR_exit; running __libc_freeres()
==8256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8256-by-pythonnut-on-???
==8256== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8256-by-pythonnut-on-???
==8256== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8256-by-pythonnut-on-???
==8256==
==8256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8256== don't want to do, unless you know exactly what you're doing,
==8256== or are doing some strange experiment):
==8256== /usr/lib/valgrind/../../bin/vgdb --pid=8256 ...command...
==8256==
==8256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8256== /path/to/gdb ./zsh
==8256== and then give GDB the following command
==8256== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8256
==8256== --pid is optional if only one valgrind process is running
==8256==
--8256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8256==
==8256== HEAP SUMMARY:
==8256== in use at exit: 1,060,941 bytes in 24,070 blocks
==8256== total heap usage: 648,972 allocs, 624,902 frees, 30,874,614 bytes allocated
==8256==
==8256== Searching for pointers to 24,070 not-freed blocks
--8256-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8256-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8256-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8256-- Scanning root segment: 0x402a000..0x402afff (4096)
--8256-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8256-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8256-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8256-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8256-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8256-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8256-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8256-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8256-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8256-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8256-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8256-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8256-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8256-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8256-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8256-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8256-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8256-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8256-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8256-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8256-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8256-- Scanning root segment: 0x701a000..0x701afff (4096)
--8256-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8256-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8256-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8256-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8256-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8256-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8256-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8256== Checked 1,333,352 bytes
==8256==
==8256== LEAK SUMMARY:
==8256== definitely lost: 253 bytes in 4 blocks
==8256== indirectly lost: 6,756 bytes in 7 blocks
==8256== possibly lost: 0 bytes in 0 blocks
==8256== still reachable: 1,053,932 bytes in 24,059 blocks
==8256== suppressed: 0 bytes in 0 blocks
==8256== Rerun with --leak-check=full to see details of leaked memory
==8256==
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8256==
==8256== 1 errors in context 1 of 1:
==8256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8256== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8256== by 0x488CD0: stringsubst (subst.c:301)
==8256== by 0x48801B: prefork (subst.c:77)
==8256== by 0x42B318: execcmd (exec.c:2619)
==8256== by 0x428CA0: execpline2 (exec.c:1697)
==8256== by 0x427FD2: execpline (exec.c:1484)
==8256== by 0x427756: execlist (exec.c:1267)
==8256== by 0x42717C: execode (exec.c:1073)
==8256== by 0x431299: runshfunc (exec.c:5040)
==8256== by 0x430E76: doshfunc (exec.c:4920)
==8256== by 0x4302FB: execshfunc (exec.c:4557)
==8256== by 0x42D8C1: execcmd (exec.c:3373)
==8256==
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8259-by-pythonnut-on-???
==8259== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8259-by-pythonnut-on-???
==8259== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8259-by-pythonnut-on-???
==8259==
==8259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8259== don't want to do, unless you know exactly what you're doing,
==8259== or are doing some strange experiment):
==8259== /usr/lib/valgrind/../../bin/vgdb --pid=8259 ...command...
==8259==
==8259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8259== /path/to/gdb ./zsh
==8259== and then give GDB the following command
==8259== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8259
==8259== --pid is optional if only one valgrind process is running
==8259==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8258-- Caught __NR_exit; running __libc_freeres()
==8258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8258-by-pythonnut-on-???
==8258== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8258-by-pythonnut-on-???
==8258== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8258-by-pythonnut-on-???
==8258==
==8258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8258== don't want to do, unless you know exactly what you're doing,
==8258== or are doing some strange experiment):
==8258== /usr/lib/valgrind/../../bin/vgdb --pid=8258 ...command...
==8258==
==8258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8258== /path/to/gdb ./zsh
==8258== and then give GDB the following command
==8258== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8258
==8258== --pid is optional if only one valgrind process is running
==8258==
--8258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8258==
==8258== HEAP SUMMARY:
==8258== in use at exit: 1,061,377 bytes in 24,079 blocks
==8258== total heap usage: 649,006 allocs, 624,927 frees, 30,881,205 bytes allocated
==8258==
==8258== Searching for pointers to 24,079 not-freed blocks
--8258-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8258-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8258-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8258-- Scanning root segment: 0x402a000..0x402afff (4096)
--8258-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8258-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8258-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8258-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8258-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8258-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8258-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8258-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8258-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8258-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8258-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8258-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8258-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8258-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8258-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8258-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8258-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8258-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8258-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8258-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8258-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8258-- Scanning root segment: 0x701a000..0x701afff (4096)
--8258-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8258-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8258-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8258-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8258-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8258-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8258-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8258== Checked 1,333,752 bytes
==8258==
==8258== LEAK SUMMARY:
==8258== definitely lost: 253 bytes in 4 blocks
==8258== indirectly lost: 6,756 bytes in 7 blocks
==8258== possibly lost: 0 bytes in 0 blocks
==8258== still reachable: 1,054,368 bytes in 24,068 blocks
==8258== suppressed: 0 bytes in 0 blocks
==8258== Rerun with --leak-check=full to see details of leaked memory
==8258==
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8258==
==8258== 1 errors in context 1 of 1:
==8258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8258== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8258== by 0x488CD0: stringsubst (subst.c:301)
==8258== by 0x48801B: prefork (subst.c:77)
==8258== by 0x42B318: execcmd (exec.c:2619)
==8258== by 0x428CA0: execpline2 (exec.c:1697)
==8258== by 0x427FD2: execpline (exec.c:1484)
==8258== by 0x427756: execlist (exec.c:1267)
==8258== by 0x42717C: execode (exec.c:1073)
==8258== by 0x431299: runshfunc (exec.c:5040)
==8258== by 0x430E76: doshfunc (exec.c:4920)
==8258== by 0x4302FB: execshfunc (exec.c:4557)
==8258== by 0x42D8C1: execcmd (exec.c:3373)
==8258==
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8261-by-pythonnut-on-???
==8261== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8261-by-pythonnut-on-???
==8261== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8261-by-pythonnut-on-???
==8261==
==8261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8261== don't want to do, unless you know exactly what you're doing,
==8261== or are doing some strange experiment):
==8261== /usr/lib/valgrind/../../bin/vgdb --pid=8261 ...command...
==8261==
==8261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8261== /path/to/gdb ./zsh
==8261== and then give GDB the following command
==8261== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8261
==8261== --pid is optional if only one valgrind process is running
==8261==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8260-- Caught __NR_exit; running __libc_freeres()
==8260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8260-by-pythonnut-on-???
==8260== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8260-by-pythonnut-on-???
==8260== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8260-by-pythonnut-on-???
==8260==
==8260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8260== don't want to do, unless you know exactly what you're doing,
==8260== or are doing some strange experiment):
==8260== /usr/lib/valgrind/../../bin/vgdb --pid=8260 ...command...
==8260==
==8260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8260== /path/to/gdb ./zsh
==8260== and then give GDB the following command
==8260== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8260
==8260== --pid is optional if only one valgrind process is running
==8260==
--8260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8260==
==8260== HEAP SUMMARY:
==8260== in use at exit: 1,061,829 bytes in 24,088 blocks
==8260== total heap usage: 649,040 allocs, 624,952 frees, 30,887,811 bytes allocated
==8260==
==8260== Searching for pointers to 24,088 not-freed blocks
--8260-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8260-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8260-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8260-- Scanning root segment: 0x402a000..0x402afff (4096)
--8260-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8260-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8260-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8260-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8260-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8260-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8260-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8260-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8260-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8260-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8260-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8260-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8260-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8260-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8260-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8260-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8260-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8260-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8260-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8260-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8260-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8260-- Scanning root segment: 0x701a000..0x701afff (4096)
--8260-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8260-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8260-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8260-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8260-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8260-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8260-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8260== Checked 1,334,128 bytes
==8260==
==8260== LEAK SUMMARY:
==8260== definitely lost: 253 bytes in 4 blocks
==8260== indirectly lost: 6,756 bytes in 7 blocks
==8260== possibly lost: 0 bytes in 0 blocks
==8260== still reachable: 1,054,820 bytes in 24,077 blocks
==8260== suppressed: 0 bytes in 0 blocks
==8260== Rerun with --leak-check=full to see details of leaked memory
==8260==
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8260==
==8260== 1 errors in context 1 of 1:
==8260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8260== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8260== by 0x488CD0: stringsubst (subst.c:301)
==8260== by 0x48801B: prefork (subst.c:77)
==8260== by 0x42B318: execcmd (exec.c:2619)
==8260== by 0x428CA0: execpline2 (exec.c:1697)
==8260== by 0x427FD2: execpline (exec.c:1484)
==8260== by 0x427756: execlist (exec.c:1267)
==8260== by 0x42717C: execode (exec.c:1073)
==8260== by 0x431299: runshfunc (exec.c:5040)
==8260== by 0x430E76: doshfunc (exec.c:4920)
==8260== by 0x4302FB: execshfunc (exec.c:4557)
==8260== by 0x42D8C1: execcmd (exec.c:3373)
==8260==
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8263-by-pythonnut-on-???
==8263== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8263-by-pythonnut-on-???
==8263== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8263-by-pythonnut-on-???
==8263==
==8263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8263== don't want to do, unless you know exactly what you're doing,
==8263== or are doing some strange experiment):
==8263== /usr/lib/valgrind/../../bin/vgdb --pid=8263 ...command...
==8263==
==8263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8263== /path/to/gdb ./zsh
==8263== and then give GDB the following command
==8263== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8263
==8263== --pid is optional if only one valgrind process is running
==8263==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8262-- Caught __NR_exit; running __libc_freeres()
==8262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8262-by-pythonnut-on-???
==8262== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8262-by-pythonnut-on-???
==8262== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8262-by-pythonnut-on-???
==8262==
==8262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8262== don't want to do, unless you know exactly what you're doing,
==8262== or are doing some strange experiment):
==8262== /usr/lib/valgrind/../../bin/vgdb --pid=8262 ...command...
==8262==
==8262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8262== /path/to/gdb ./zsh
==8262== and then give GDB the following command
==8262== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8262
==8262== --pid is optional if only one valgrind process is running
==8262==
--8262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8262==
==8262== HEAP SUMMARY:
==8262== in use at exit: 1,062,276 bytes in 24,097 blocks
==8262== total heap usage: 649,074 allocs, 624,977 frees, 30,894,430 bytes allocated
==8262==
==8262== Searching for pointers to 24,097 not-freed blocks
--8262-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8262-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8262-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8262-- Scanning root segment: 0x402a000..0x402afff (4096)
--8262-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8262-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8262-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8262-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8262-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8262-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8262-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8262-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8262-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8262-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8262-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8262-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8262-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8262-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8262-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8262-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8262-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8262-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8262-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8262-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8262-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8262-- Scanning root segment: 0x701a000..0x701afff (4096)
--8262-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8262-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8262-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8262-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8262-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8262-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8262-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8262== Checked 1,334,536 bytes
==8262==
==8262== LEAK SUMMARY:
==8262== definitely lost: 253 bytes in 4 blocks
==8262== indirectly lost: 6,756 bytes in 7 blocks
==8262== possibly lost: 0 bytes in 0 blocks
==8262== still reachable: 1,055,267 bytes in 24,086 blocks
==8262== suppressed: 0 bytes in 0 blocks
==8262== Rerun with --leak-check=full to see details of leaked memory
==8262==
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8262==
==8262== 1 errors in context 1 of 1:
==8262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8262== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8262== by 0x488CD0: stringsubst (subst.c:301)
==8262== by 0x48801B: prefork (subst.c:77)
==8262== by 0x42B318: execcmd (exec.c:2619)
==8262== by 0x428CA0: execpline2 (exec.c:1697)
==8262== by 0x427FD2: execpline (exec.c:1484)
==8262== by 0x427756: execlist (exec.c:1267)
==8262== by 0x42717C: execode (exec.c:1073)
==8262== by 0x431299: runshfunc (exec.c:5040)
==8262== by 0x430E76: doshfunc (exec.c:4920)
==8262== by 0x4302FB: execshfunc (exec.c:4557)
==8262== by 0x42D8C1: execcmd (exec.c:3373)
==8262==
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8264-by-pythonnut-on-???
==8264== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8264-by-pythonnut-on-???
==8264== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8264-by-pythonnut-on-???
==8264==
==8264== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8264== don't want to do, unless you know exactly what you're doing,
==8264== or are doing some strange experiment):
==8264== /usr/lib/valgrind/../../bin/vgdb --pid=8264 ...command...
==8264==
==8264== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8264== /path/to/gdb ./zsh
==8264== and then give GDB the following command
==8264== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8264
==8264== --pid is optional if only one valgrind process is running
==8264==
==8265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8265-by-pythonnut-on-???
==8265== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8265-by-pythonnut-on-???
==8265== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8265-by-pythonnut-on-???
==8265==
==8265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8265== don't want to do, unless you know exactly what you're doing,
==8265== or are doing some strange experiment):
==8265== /usr/lib/valgrind/../../bin/vgdb --pid=8265 ...command...
==8265==
==8265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8265== /path/to/gdb ./zsh
==8265== and then give GDB the following command
==8265== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8265
==8265== --pid is optional if only one valgrind process is running
==8265==
client request: code 4d430005, addr 0xFFEFF230C, len 4
--8264-- Caught __NR_exit; running __libc_freeres()
--8264-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8264==
==8264== HEAP SUMMARY:
==8264== in use at exit: 1,071,976 bytes in 24,211 blocks
==8264== total heap usage: 649,502 allocs, 625,291 frees, 30,944,986 bytes allocated
==8264==
==8264== Searching for pointers to 24,211 not-freed blocks
--8264-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8264-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8264-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8264-- Scanning root segment: 0x402a000..0x402efff (20480)
--8264-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8264-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8264-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8264-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8264-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8264-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8264-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8264-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8264-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8264-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8264-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8264-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8264-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8264-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8264-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8264-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8264-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8264-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8264-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8264-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8264-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8264-- Scanning root segment: 0x701a000..0x701afff (4096)
--8264-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8264-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8264-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8264-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8264-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8264-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8264-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8264== Checked 1,361,544 bytes
==8264==
==8264== LEAK SUMMARY:
==8264== definitely lost: 253 bytes in 4 blocks
==8264== indirectly lost: 6,756 bytes in 7 blocks
==8264== possibly lost: 0 bytes in 0 blocks
==8264== still reachable: 1,064,967 bytes in 24,200 blocks
==8264== suppressed: 0 bytes in 0 blocks
==8264== Rerun with --leak-check=full to see details of leaked memory
==8264==
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264==
==8264== 1 errors in context 1 of 1:
==8264== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8264== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8264== by 0x488CD0: stringsubst (subst.c:301)
==8264== by 0x48801B: prefork (subst.c:77)
==8264== by 0x42B318: execcmd (exec.c:2619)
==8264== by 0x428CA0: execpline2 (exec.c:1697)
==8264== by 0x427FD2: execpline (exec.c:1484)
==8264== by 0x427756: execlist (exec.c:1267)
==8264== by 0x42717C: execode (exec.c:1073)
==8264== by 0x431299: runshfunc (exec.c:5040)
==8264== by 0x430E76: doshfunc (exec.c:4920)
==8264== by 0x4302FB: execshfunc (exec.c:4557)
==8264== by 0x42D8C1: execcmd (exec.c:3373)
==8264==
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8266-by-pythonnut-on-???
==8266== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8266-by-pythonnut-on-???
==8266== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8266-by-pythonnut-on-???
==8266==
==8266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8266== don't want to do, unless you know exactly what you're doing,
==8266== or are doing some strange experiment):
==8266== /usr/lib/valgrind/../../bin/vgdb --pid=8266 ...command...
==8266==
==8266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8266== /path/to/gdb ./zsh
==8266== and then give GDB the following command
==8266== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8266
==8266== --pid is optional if only one valgrind process is running
==8266==
==8267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8267-by-pythonnut-on-???
==8267== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8267-by-pythonnut-on-???
==8267== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8267-by-pythonnut-on-???
==8267==
==8267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8267== don't want to do, unless you know exactly what you're doing,
==8267== or are doing some strange experiment):
==8267== /usr/lib/valgrind/../../bin/vgdb --pid=8267 ...command...
==8267==
==8267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8267== /path/to/gdb ./zsh
==8267== and then give GDB the following command
==8267== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8267
==8267== --pid is optional if only one valgrind process is running
==8267==
client request: code 4d430005, addr 0xFFEFF230C, len 4
--8266-- Caught __NR_exit; running __libc_freeres()
--8266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8266==
==8266== HEAP SUMMARY:
==8266== in use at exit: 1,075,241 bytes in 24,288 blocks
==8266== total heap usage: 649,725 allocs, 625,437 frees, 30,960,698 bytes allocated
==8266==
==8266== Searching for pointers to 24,288 not-freed blocks
--8266-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8266-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8266-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8266-- Scanning root segment: 0x402a000..0x402efff (20480)
--8266-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8266-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8266-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8266-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8266-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8266-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8266-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8266-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8266-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8266-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8266-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8266-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8266-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8266-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8266-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8266-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8266-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8266-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8266-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8266-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8266-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8266-- Scanning root segment: 0x701a000..0x701afff (4096)
--8266-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8266-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8266-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8266-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8266-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8266-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8266-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8266== Checked 1,364,512 bytes
==8266==
==8266== LEAK SUMMARY:
==8266== definitely lost: 253 bytes in 4 blocks
==8266== indirectly lost: 6,756 bytes in 7 blocks
==8266== possibly lost: 0 bytes in 0 blocks
==8266== still reachable: 1,068,232 bytes in 24,277 blocks
==8266== suppressed: 0 bytes in 0 blocks
==8266== Rerun with --leak-check=full to see details of leaked memory
==8266==
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266==
==8266== 1 errors in context 1 of 1:
==8266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8266== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8266== by 0x488CD0: stringsubst (subst.c:301)
==8266== by 0x48801B: prefork (subst.c:77)
==8266== by 0x42B318: execcmd (exec.c:2619)
==8266== by 0x428CA0: execpline2 (exec.c:1697)
==8266== by 0x427FD2: execpline (exec.c:1484)
==8266== by 0x427756: execlist (exec.c:1267)
==8266== by 0x42717C: execode (exec.c:1073)
==8266== by 0x431299: runshfunc (exec.c:5040)
==8266== by 0x430E76: doshfunc (exec.c:4920)
==8266== by 0x4302FB: execshfunc (exec.c:4557)
==8266== by 0x42D8C1: execcmd (exec.c:3373)
==8266==
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8268-by-pythonnut-on-???
==8268== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8268-by-pythonnut-on-???
==8268== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8268-by-pythonnut-on-???
==8268==
==8268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8268== don't want to do, unless you know exactly what you're doing,
==8268== or are doing some strange experiment):
==8268== /usr/lib/valgrind/../../bin/vgdb --pid=8268 ...command...
==8268==
==8268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8268== /path/to/gdb ./zsh
==8268== and then give GDB the following command
==8268== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8268
==8268== --pid is optional if only one valgrind process is running
==8268==
==8269== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8269-by-pythonnut-on-???
==8269== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8269-by-pythonnut-on-???
==8269== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8269-by-pythonnut-on-???
==8269==
==8269== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8269== don't want to do, unless you know exactly what you're doing,
==8269== or are doing some strange experiment):
==8269== /usr/lib/valgrind/../../bin/vgdb --pid=8269 ...command...
==8269==
==8269== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8269== /path/to/gdb ./zsh
==8269== and then give GDB the following command
==8269== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8269
==8269== --pid is optional if only one valgrind process is running
==8269==
client request: code 4d430005, addr 0xFFEFF230C, len 4
--8268-- Caught __NR_exit; running __libc_freeres()
--8268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8268==
==8268== HEAP SUMMARY:
==8268== in use at exit: 1,077,748 bytes in 24,347 blocks
==8268== total heap usage: 649,895 allocs, 625,548 frees, 30,974,459 bytes allocated
==8268==
==8268== Searching for pointers to 24,347 not-freed blocks
--8268-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8268-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8268-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8268-- Scanning root segment: 0x402a000..0x402efff (20480)
--8268-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8268-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8268-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8268-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8268-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8268-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8268-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8268-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8268-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8268-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8268-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8268-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8268-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8268-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8268-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8268-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8268-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8268-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8268-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8268-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8268-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8268-- Scanning root segment: 0x701a000..0x701afff (4096)
--8268-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8268-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8268-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8268-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8268-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8268-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8268-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8268== Checked 1,366,792 bytes
==8268==
==8268== LEAK SUMMARY:
==8268== definitely lost: 253 bytes in 4 blocks
==8268== indirectly lost: 6,756 bytes in 7 blocks
==8268== possibly lost: 0 bytes in 0 blocks
==8268== still reachable: 1,070,739 bytes in 24,336 blocks
==8268== suppressed: 0 bytes in 0 blocks
==8268== Rerun with --leak-check=full to see details of leaked memory
==8268==
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268==
==8268== 1 errors in context 1 of 1:
==8268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8268== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8268== by 0x488CD0: stringsubst (subst.c:301)
==8268== by 0x48801B: prefork (subst.c:77)
==8268== by 0x42B318: execcmd (exec.c:2619)
==8268== by 0x428CA0: execpline2 (exec.c:1697)
==8268== by 0x427FD2: execpline (exec.c:1484)
==8268== by 0x427756: execlist (exec.c:1267)
==8268== by 0x42717C: execode (exec.c:1073)
==8268== by 0x431299: runshfunc (exec.c:5040)
==8268== by 0x430E76: doshfunc (exec.c:4920)
==8268== by 0x4302FB: execshfunc (exec.c:4557)
==8268== by 0x42D8C1: execcmd (exec.c:3373)
==8268==
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8270-by-pythonnut-on-???
==8270== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8270-by-pythonnut-on-???
==8270== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8270-by-pythonnut-on-???
==8270==
==8270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8270== don't want to do, unless you know exactly what you're doing,
==8270== or are doing some strange experiment):
==8270== /usr/lib/valgrind/../../bin/vgdb --pid=8270 ...command...
==8270==
==8270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8270== /path/to/gdb ./zsh
==8270== and then give GDB the following command
==8270== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8270
==8270== --pid is optional if only one valgrind process is running
==8270==
==8271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8271-by-pythonnut-on-???
==8271== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8271-by-pythonnut-on-???
==8271== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8271-by-pythonnut-on-???
==8271==
==8271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8271== don't want to do, unless you know exactly what you're doing,
==8271== or are doing some strange experiment):
==8271== /usr/lib/valgrind/../../bin/vgdb --pid=8271 ...command...
==8271==
==8271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8271== /path/to/gdb ./zsh
==8271== and then give GDB the following command
==8271== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8271
==8271== --pid is optional if only one valgrind process is running
==8271==
client request: code 4d430005, addr 0xFFEFF230C, len 4
--8270-- Caught __NR_exit; running __libc_freeres()
--8270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8270==
==8270== HEAP SUMMARY:
==8270== in use at exit: 1,081,028 bytes in 24,425 blocks
==8270== total heap usage: 650,119 allocs, 625,694 frees, 30,990,186 bytes allocated
==8270==
==8270== Searching for pointers to 24,425 not-freed blocks
--8270-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8270-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8270-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8270-- Scanning root segment: 0x402a000..0x402efff (20480)
--8270-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8270-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8270-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8270-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8270-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8270-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8270-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8270-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8270-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8270-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8270-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8270-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8270-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8270-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8270-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8270-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8270-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8270-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8270-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8270-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8270-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8270-- Scanning root segment: 0x701a000..0x701afff (4096)
--8270-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8270-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8270-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8270-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8270-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8270-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8270-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8270== Checked 1,369,784 bytes
==8270==
==8270== LEAK SUMMARY:
==8270== definitely lost: 253 bytes in 4 blocks
==8270== indirectly lost: 6,756 bytes in 7 blocks
==8270== possibly lost: 0 bytes in 0 blocks
==8270== still reachable: 1,074,019 bytes in 24,414 blocks
==8270== suppressed: 0 bytes in 0 blocks
==8270== Rerun with --leak-check=full to see details of leaked memory
==8270==
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270==
==8270== 1 errors in context 1 of 1:
==8270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8270== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8270== by 0x488CD0: stringsubst (subst.c:301)
==8270== by 0x48801B: prefork (subst.c:77)
==8270== by 0x42B318: execcmd (exec.c:2619)
==8270== by 0x428CA0: execpline2 (exec.c:1697)
==8270== by 0x427FD2: execpline (exec.c:1484)
==8270== by 0x427756: execlist (exec.c:1267)
==8270== by 0x42717C: execode (exec.c:1073)
==8270== by 0x431299: runshfunc (exec.c:5040)
==8270== by 0x430E76: doshfunc (exec.c:4920)
==8270== by 0x4302FB: execshfunc (exec.c:4557)
==8270== by 0x42D8C1: execcmd (exec.c:3373)
==8270==
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8273-by-pythonnut-on-???
==8273== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8273-by-pythonnut-on-???
==8273== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8273-by-pythonnut-on-???
==8273==
==8273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8273== don't want to do, unless you know exactly what you're doing,
==8273== or are doing some strange experiment):
==8273== /usr/lib/valgrind/../../bin/vgdb --pid=8273 ...command...
==8273==
==8273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8273== /path/to/gdb ./zsh
==8273== and then give GDB the following command
==8273== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8273
==8273== --pid is optional if only one valgrind process is running
==8273==
client request: code 4d430005, addr 0xFFEFF19BC, len 4
--8272-- Caught __NR_exit; running __libc_freeres()
==8272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8272-by-pythonnut-on-???
==8272== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8272-by-pythonnut-on-???
==8272== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8272-by-pythonnut-on-???
==8272==
==8272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8272== don't want to do, unless you know exactly what you're doing,
==8272== or are doing some strange experiment):
==8272== /usr/lib/valgrind/../../bin/vgdb --pid=8272 ...command...
==8272==
==8272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8272== /path/to/gdb ./zsh
==8272== and then give GDB the following command
==8272== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8272
==8272== --pid is optional if only one valgrind process is running
==8272==
--8272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8272==
==8272== HEAP SUMMARY:
==8272== in use at exit: 1,088,028 bytes in 24,535 blocks
==8272== total heap usage: 650,478 allocs, 625,943 frees, 31,021,020 bytes allocated
==8272==
==8272== Searching for pointers to 24,535 not-freed blocks
--8272-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8272-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8272-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8272-- Scanning root segment: 0x402a000..0x402efff (20480)
--8272-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8272-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8272-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8272-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8272-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8272-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8272-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8272-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8272-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8272-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8272-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8272-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8272-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8272-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8272-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8272-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8272-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8272-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8272-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8272-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8272-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8272-- Scanning root segment: 0x701a000..0x701afff (4096)
--8272-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8272-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8272-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8272-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8272-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8272-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8272-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8272== Checked 1,377,312 bytes
==8272==
==8272== LEAK SUMMARY:
==8272== definitely lost: 253 bytes in 4 blocks
==8272== indirectly lost: 6,756 bytes in 7 blocks
==8272== possibly lost: 0 bytes in 0 blocks
==8272== still reachable: 1,081,019 bytes in 24,524 blocks
==8272== suppressed: 0 bytes in 0 blocks
==8272== Rerun with --leak-check=full to see details of leaked memory
==8272==
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8272==
==8272== 1 errors in context 1 of 1:
==8272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8272== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8272== by 0x488CD0: stringsubst (subst.c:301)
==8272== by 0x48801B: prefork (subst.c:77)
==8272== by 0x42B318: execcmd (exec.c:2619)
==8272== by 0x428CA0: execpline2 (exec.c:1697)
==8272== by 0x427FD2: execpline (exec.c:1484)
==8272== by 0x427756: execlist (exec.c:1267)
==8272== by 0x42717C: execode (exec.c:1073)
==8272== by 0x431299: runshfunc (exec.c:5040)
==8272== by 0x430E76: doshfunc (exec.c:4920)
==8272== by 0x4302FB: execshfunc (exec.c:4557)
==8272== by 0x42D8C1: execcmd (exec.c:3373)
==8272==
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8274-by-pythonnut-on-???
==8274== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8274-by-pythonnut-on-???
==8274== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8274-by-pythonnut-on-???
==8274==
==8274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8274== don't want to do, unless you know exactly what you're doing,
==8274== or are doing some strange experiment):
==8274== /usr/lib/valgrind/../../bin/vgdb --pid=8274 ...command...
==8274==
==8274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8274== /path/to/gdb ./zsh
==8274== and then give GDB the following command
==8274== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8274
==8274== --pid is optional if only one valgrind process is running
==8274==
==8275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8275-by-pythonnut-on-???
==8275== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8275-by-pythonnut-on-???
==8275== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8275-by-pythonnut-on-???
==8275==
==8275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8275== don't want to do, unless you know exactly what you're doing,
==8275== or are doing some strange experiment):
==8275== /usr/lib/valgrind/../../bin/vgdb --pid=8275 ...command...
==8275==
==8275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8275== /path/to/gdb ./zsh
==8275== and then give GDB the following command
==8275== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8275
==8275== --pid is optional if only one valgrind process is running
==8275==
client request: code 4d430005, addr 0xFFEFF19BC, len 4
--8274-- Caught __NR_exit; running __libc_freeres()
--8274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8274==
==8274== HEAP SUMMARY:
==8274== in use at exit: 1,090,207 bytes in 24,578 blocks
==8274== total heap usage: 650,601 allocs, 626,023 frees, 31,032,284 bytes allocated
==8274==
==8274== Searching for pointers to 24,578 not-freed blocks
--8274-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8274-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8274-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8274-- Scanning root segment: 0x402a000..0x402efff (20480)
--8274-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8274-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8274-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8274-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8274-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8274-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8274-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8274-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8274-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8274-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8274-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8274-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8274-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8274-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8274-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8274-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8274-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8274-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8274-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8274-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8274-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8274-- Scanning root segment: 0x701a000..0x701afff (4096)
--8274-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8274-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8274-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8274-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8274-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8274-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8274-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8274== Checked 1,379,288 bytes
==8274==
==8274== LEAK SUMMARY:
==8274== definitely lost: 253 bytes in 4 blocks
==8274== indirectly lost: 6,756 bytes in 7 blocks
==8274== possibly lost: 0 bytes in 0 blocks
==8274== still reachable: 1,083,198 bytes in 24,567 blocks
==8274== suppressed: 0 bytes in 0 blocks
==8274== Rerun with --leak-check=full to see details of leaked memory
==8274==
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274==
==8274== 1 errors in context 1 of 1:
==8274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8274== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8274== by 0x488CD0: stringsubst (subst.c:301)
==8274== by 0x48801B: prefork (subst.c:77)
==8274== by 0x42B318: execcmd (exec.c:2619)
==8274== by 0x428CA0: execpline2 (exec.c:1697)
==8274== by 0x427FD2: execpline (exec.c:1484)
==8274== by 0x427756: execlist (exec.c:1267)
==8274== by 0x42717C: execode (exec.c:1073)
==8274== by 0x431299: runshfunc (exec.c:5040)
==8274== by 0x430E76: doshfunc (exec.c:4920)
==8274== by 0x4302FB: execshfunc (exec.c:4557)
==8274== by 0x42D8C1: execcmd (exec.c:3373)
==8274==
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8276-by-pythonnut-on-???
==8276== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8276-by-pythonnut-on-???
==8276== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8276-by-pythonnut-on-???
==8276==
==8276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8276== don't want to do, unless you know exactly what you're doing,
==8276== or are doing some strange experiment):
==8276== /usr/lib/valgrind/../../bin/vgdb --pid=8276 ...command...
==8276==
==8276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8276== /path/to/gdb ./zsh
==8276== and then give GDB the following command
==8276== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8276
==8276== --pid is optional if only one valgrind process is running
==8276==
==8277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8277-by-pythonnut-on-???
==8277== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8277-by-pythonnut-on-???
==8277== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8277-by-pythonnut-on-???
==8277==
==8277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8277== don't want to do, unless you know exactly what you're doing,
==8277== or are doing some strange experiment):
==8277== /usr/lib/valgrind/../../bin/vgdb --pid=8277 ...command...
==8277==
==8277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8277== /path/to/gdb ./zsh
==8277== and then give GDB the following command
==8277== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8277
==8277== --pid is optional if only one valgrind process is running
==8277==
client request: code 4d430005, addr 0xFFEFF19BC, len 4
--8276-- Caught __NR_exit; running __libc_freeres()
--8276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8276==
==8276== HEAP SUMMARY:
==8276== in use at exit: 1,092,386 bytes in 24,621 blocks
==8276== total heap usage: 650,724 allocs, 626,103 frees, 31,043,548 bytes allocated
==8276==
==8276== Searching for pointers to 24,621 not-freed blocks
--8276-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8276-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8276-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8276-- Scanning root segment: 0x402a000..0x402efff (20480)
--8276-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8276-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8276-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8276-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8276-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8276-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8276-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8276-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8276-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8276-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8276-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8276-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8276-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8276-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8276-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8276-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8276-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8276-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8276-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8276-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8276-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8276-- Scanning root segment: 0x701a000..0x701afff (4096)
--8276-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8276-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8276-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8276-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8276-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8276-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8276-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8276== Checked 1,381,280 bytes
==8276==
==8276== LEAK SUMMARY:
==8276== definitely lost: 253 bytes in 4 blocks
==8276== indirectly lost: 6,756 bytes in 7 blocks
==8276== possibly lost: 0 bytes in 0 blocks
==8276== still reachable: 1,085,377 bytes in 24,610 blocks
==8276== suppressed: 0 bytes in 0 blocks
==8276== Rerun with --leak-check=full to see details of leaked memory
==8276==
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276==
==8276== 1 errors in context 1 of 1:
==8276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8276== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8276== by 0x488CD0: stringsubst (subst.c:301)
==8276== by 0x48801B: prefork (subst.c:77)
==8276== by 0x42B318: execcmd (exec.c:2619)
==8276== by 0x428CA0: execpline2 (exec.c:1697)
==8276== by 0x427FD2: execpline (exec.c:1484)
==8276== by 0x427756: execlist (exec.c:1267)
==8276== by 0x42717C: execode (exec.c:1073)
==8276== by 0x431299: runshfunc (exec.c:5040)
==8276== by 0x430E76: doshfunc (exec.c:4920)
==8276== by 0x4302FB: execshfunc (exec.c:4557)
==8276== by 0x42D8C1: execcmd (exec.c:3373)
==8276==
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8279-by-pythonnut-on-???
==8279== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8279-by-pythonnut-on-???
==8279== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8279-by-pythonnut-on-???
==8279==
==8279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8279== don't want to do, unless you know exactly what you're doing,
==8279== or are doing some strange experiment):
==8279== /usr/lib/valgrind/../../bin/vgdb --pid=8279 ...command...
==8279==
==8279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8279== /path/to/gdb ./zsh
==8279== and then give GDB the following command
==8279== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8279
==8279== --pid is optional if only one valgrind process is running
==8279==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8278-- Caught __NR_exit; running __libc_freeres()
==8278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8278-by-pythonnut-on-???
==8278== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8278-by-pythonnut-on-???
==8278== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8278-by-pythonnut-on-???
==8278==
==8278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8278== don't want to do, unless you know exactly what you're doing,
==8278== or are doing some strange experiment):
==8278== /usr/lib/valgrind/../../bin/vgdb --pid=8278 ...command...
==8278==
==8278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8278== /path/to/gdb ./zsh
==8278== and then give GDB the following command
==8278== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8278
==8278== --pid is optional if only one valgrind process is running
==8278==
--8278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8278==
==8278== HEAP SUMMARY:
==8278== in use at exit: 1,105,102 bytes in 24,785 blocks
==8278== total heap usage: 651,324 allocs, 626,539 frees, 31,127,303 bytes allocated
==8278==
==8278== Searching for pointers to 24,785 not-freed blocks
--8278-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8278-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8278-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8278-- Scanning root segment: 0x402a000..0x402afff (4096)
--8278-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8278-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8278-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8278-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8278-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8278-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8278-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8278-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8278-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8278-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8278-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8278-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8278-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8278-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8278-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8278-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8278-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8278-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8278-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8278-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8278-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8278-- Scanning root segment: 0x701a000..0x701afff (4096)
--8278-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8278-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8278-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8278-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8278-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8278-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8278-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8278== Checked 1,374,592 bytes
==8278==
==8278== LEAK SUMMARY:
==8278== definitely lost: 253 bytes in 4 blocks
==8278== indirectly lost: 6,756 bytes in 7 blocks
==8278== possibly lost: 0 bytes in 0 blocks
==8278== still reachable: 1,098,093 bytes in 24,774 blocks
==8278== suppressed: 0 bytes in 0 blocks
==8278== Rerun with --leak-check=full to see details of leaked memory
==8278==
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8278==
==8278== 1 errors in context 1 of 1:
==8278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8278== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8278== by 0x488CD0: stringsubst (subst.c:301)
==8278== by 0x48801B: prefork (subst.c:77)
==8278== by 0x42B318: execcmd (exec.c:2619)
==8278== by 0x428CA0: execpline2 (exec.c:1697)
==8278== by 0x427FD2: execpline (exec.c:1484)
==8278== by 0x427756: execlist (exec.c:1267)
==8278== by 0x42717C: execode (exec.c:1073)
==8278== by 0x431299: runshfunc (exec.c:5040)
==8278== by 0x430E76: doshfunc (exec.c:4920)
==8278== by 0x4302FB: execshfunc (exec.c:4557)
==8278== by 0x42D8C1: execcmd (exec.c:3373)
==8278==
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8281-by-pythonnut-on-???
==8281== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8281-by-pythonnut-on-???
==8281== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8281-by-pythonnut-on-???
==8281==
==8281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8281== don't want to do, unless you know exactly what you're doing,
==8281== or are doing some strange experiment):
==8281== /usr/lib/valgrind/../../bin/vgdb --pid=8281 ...command...
==8281==
==8281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8281== /path/to/gdb ./zsh
==8281== and then give GDB the following command
==8281== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8281
==8281== --pid is optional if only one valgrind process is running
==8281==
client request: code 4d430005, addr 0xFFEFF328C, len 4
--8280-- Caught __NR_exit; running __libc_freeres()
==8280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8280-by-pythonnut-on-???
==8280== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8280-by-pythonnut-on-???
==8280== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8280-by-pythonnut-on-???
==8280==
==8280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8280== don't want to do, unless you know exactly what you're doing,
==8280== or are doing some strange experiment):
==8280== /usr/lib/valgrind/../../bin/vgdb --pid=8280 ...command...
==8280==
==8280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8280== /path/to/gdb ./zsh
==8280== and then give GDB the following command
==8280== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8280
==8280== --pid is optional if only one valgrind process is running
==8280==
--8280-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8280==
==8280== HEAP SUMMARY:
==8280== in use at exit: 1,106,139 bytes in 24,808 blocks
==8280== total heap usage: 651,404 allocs, 626,596 frees, 31,137,884 bytes allocated
==8280==
==8280== Searching for pointers to 24,808 not-freed blocks
--8280-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8280-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8280-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8280-- Scanning root segment: 0x402a000..0x402afff (4096)
--8280-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8280-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8280-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8280-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8280-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8280-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8280-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8280-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8280-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8280-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8280-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8280-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8280-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8280-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8280-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8280-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8280-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8280-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8280-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8280-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8280-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8280-- Scanning root segment: 0x701a000..0x701afff (4096)
--8280-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8280-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8280-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8280-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8280-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8280-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8280-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8280== Checked 1,375,520 bytes
==8280==
==8280== LEAK SUMMARY:
==8280== definitely lost: 253 bytes in 4 blocks
==8280== indirectly lost: 6,756 bytes in 7 blocks
==8280== possibly lost: 0 bytes in 0 blocks
==8280== still reachable: 1,099,130 bytes in 24,797 blocks
==8280== suppressed: 0 bytes in 0 blocks
==8280== Rerun with --leak-check=full to see details of leaked memory
==8280==
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8280==
==8280== 1 errors in context 1 of 1:
==8280== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8280== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8280== by 0x488CD0: stringsubst (subst.c:301)
==8280== by 0x48801B: prefork (subst.c:77)
==8280== by 0x42B318: execcmd (exec.c:2619)
==8280== by 0x428CA0: execpline2 (exec.c:1697)
==8280== by 0x427FD2: execpline (exec.c:1484)
==8280== by 0x427756: execlist (exec.c:1267)
==8280== by 0x42717C: execode (exec.c:1073)
==8280== by 0x431299: runshfunc (exec.c:5040)
==8280== by 0x430E76: doshfunc (exec.c:4920)
==8280== by 0x4302FB: execshfunc (exec.c:4557)
==8280== by 0x42D8C1: execcmd (exec.c:3373)
==8280==
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8282-- Caught __NR_exit; running __libc_freeres()
==8282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8282-by-pythonnut-on-???
==8282== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8282-by-pythonnut-on-???
==8282== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8282-by-pythonnut-on-???
==8282==
==8282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8282== don't want to do, unless you know exactly what you're doing,
==8282== or are doing some strange experiment):
==8282== /usr/lib/valgrind/../../bin/vgdb --pid=8282 ...command...
==8282==
==8282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8282== /path/to/gdb ./zsh
==8282== and then give GDB the following command
==8282== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8282
==8282== --pid is optional if only one valgrind process is running
==8282==
--8282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8282==
==8282== HEAP SUMMARY:
==8282== in use at exit: 1,131,951 bytes in 25,095 blocks
==8282== total heap usage: 652,467 allocs, 627,372 frees, 31,313,535 bytes allocated
==8282==
==8282== Searching for pointers to 25,095 not-freed blocks
--8282-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8282-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8282-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8282-- Scanning root segment: 0x402a000..0x402efff (20480)
--8282-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8282-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8282-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8282-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8282-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8282-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8282-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8282-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8282-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8282-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8282-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8282-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8282-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8282-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8282-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8282-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8282-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8282-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8282-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8282-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8282-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8282-- Scanning root segment: 0x701a000..0x701afff (4096)
--8282-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8282-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8282-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8282-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8282-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8282-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8282-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8282== Checked 1,421,936 bytes
==8282==
==8282== LEAK SUMMARY:
==8282== definitely lost: 253 bytes in 4 blocks
==8282== indirectly lost: 6,756 bytes in 7 blocks
==8282== possibly lost: 0 bytes in 0 blocks
==8282== still reachable: 1,124,942 bytes in 25,084 blocks
==8282== suppressed: 0 bytes in 0 blocks
==8282== Rerun with --leak-check=full to see details of leaked memory
==8282==
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8282==
==8282== 1 errors in context 1 of 1:
==8282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8282== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8282== by 0x488CD0: stringsubst (subst.c:301)
==8282== by 0x48801B: prefork (subst.c:77)
==8282== by 0x42B318: execcmd (exec.c:2619)
==8282== by 0x428CA0: execpline2 (exec.c:1697)
==8282== by 0x427FD2: execpline (exec.c:1484)
==8282== by 0x427756: execlist (exec.c:1267)
==8282== by 0x42717C: execode (exec.c:1073)
==8282== by 0x431299: runshfunc (exec.c:5040)
==8282== by 0x430E76: doshfunc (exec.c:4920)
==8282== by 0x4302FB: execshfunc (exec.c:4557)
==8282== by 0x42D8C1: execcmd (exec.c:3373)
==8282==
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8284-by-pythonnut-on-???
==8284== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8284-by-pythonnut-on-???
==8284== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8284-by-pythonnut-on-???
==8284==
==8284== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8284== don't want to do, unless you know exactly what you're doing,
==8284== or are doing some strange experiment):
==8284== /usr/lib/valgrind/../../bin/vgdb --pid=8284 ...command...
==8284==
==8284== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8284== /path/to/gdb ./zsh
==8284== and then give GDB the following command
==8284== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8284
==8284== --pid is optional if only one valgrind process is running
==8284==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8284-- Caught __NR_exit; running __libc_freeres()
--8284-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8284==
==8284== HEAP SUMMARY:
==8284== in use at exit: 1,132,259 bytes in 25,096 blocks
==8284== total heap usage: 652,570 allocs, 627,474 frees, 31,321,123 bytes allocated
==8284==
==8284== Searching for pointers to 25,096 not-freed blocks
--8284-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8284-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8284-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8284-- Scanning root segment: 0x402a000..0x402efff (20480)
--8284-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8284-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8284-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8284-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8284-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8284-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8284-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8284-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8284-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8284-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8284-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8284-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8284-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8284-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8284-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8284-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8284-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8284-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8284-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8284-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8284-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8284-- Scanning root segment: 0x701a000..0x701afff (4096)
--8284-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8284-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8284-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8284-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8284-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8284-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8284-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8284== Checked 1,422,216 bytes
==8284==
==8284== LEAK SUMMARY:
==8284== definitely lost: 253 bytes in 4 blocks
==8284== indirectly lost: 6,756 bytes in 7 blocks
==8284== possibly lost: 0 bytes in 0 blocks
==8284== still reachable: 1,125,250 bytes in 25,085 blocks
==8284== suppressed: 0 bytes in 0 blocks
==8284== Rerun with --leak-check=full to see details of leaked memory
==8284==
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284==
==8284== 1 errors in context 1 of 1:
==8284== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8284== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8284== by 0x488CD0: stringsubst (subst.c:301)
==8284== by 0x48801B: prefork (subst.c:77)
==8284== by 0x42B318: execcmd (exec.c:2619)
==8284== by 0x428CA0: execpline2 (exec.c:1697)
==8284== by 0x427FD2: execpline (exec.c:1484)
==8284== by 0x427756: execlist (exec.c:1267)
==8284== by 0x42717C: execode (exec.c:1073)
==8284== by 0x431299: runshfunc (exec.c:5040)
==8284== by 0x430E76: doshfunc (exec.c:4920)
==8284== by 0x4302FB: execshfunc (exec.c:4557)
==8284== by 0x42D8C1: execcmd (exec.c:3373)
==8284==
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8287== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8287-by-pythonnut-on-???
==8287== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8287-by-pythonnut-on-???
==8287== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8287-by-pythonnut-on-???
==8287==
==8287== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8287== don't want to do, unless you know exactly what you're doing,
==8287== or are doing some strange experiment):
==8287== /usr/lib/valgrind/../../bin/vgdb --pid=8287 ...command...
==8287==
==8287== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8287== /path/to/gdb ./zsh
==8287== and then give GDB the following command
==8287== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8287
==8287== --pid is optional if only one valgrind process is running
==8287==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8286-- Caught __NR_exit; running __libc_freeres()
==8286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8286-by-pythonnut-on-???
==8286== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8286-by-pythonnut-on-???
==8286== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8286-by-pythonnut-on-???
==8286==
==8286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8286== don't want to do, unless you know exactly what you're doing,
==8286== or are doing some strange experiment):
==8286== /usr/lib/valgrind/../../bin/vgdb --pid=8286 ...command...
==8286==
==8286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8286== /path/to/gdb ./zsh
==8286== and then give GDB the following command
==8286== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8286
==8286== --pid is optional if only one valgrind process is running
==8286==
--8286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8286==
==8286== HEAP SUMMARY:
==8286== in use at exit: 1,132,681 bytes in 25,104 blocks
==8286== total heap usage: 652,672 allocs, 627,568 frees, 31,328,589 bytes allocated
==8286==
==8286== Searching for pointers to 25,104 not-freed blocks
--8286-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8286-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8286-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8286-- Scanning root segment: 0x402a000..0x402efff (20480)
--8286-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8286-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8286-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8286-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8286-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8286-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8286-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8286-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8286-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8286-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8286-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8286-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8286-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8286-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8286-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8286-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8286-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8286-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8286-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8286-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8286-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8286-- Scanning root segment: 0x701a000..0x701afff (4096)
--8286-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8286-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8286-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8286-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8286-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8286-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8286-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8286== Checked 1,422,600 bytes
==8286==
==8286== LEAK SUMMARY:
==8286== definitely lost: 253 bytes in 4 blocks
==8286== indirectly lost: 6,756 bytes in 7 blocks
==8286== possibly lost: 0 bytes in 0 blocks
==8286== still reachable: 1,125,672 bytes in 25,093 blocks
==8286== suppressed: 0 bytes in 0 blocks
==8286== Rerun with --leak-check=full to see details of leaked memory
==8286==
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8286==
==8286== 1 errors in context 1 of 1:
==8286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8286== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8286== by 0x488CD0: stringsubst (subst.c:301)
==8286== by 0x48801B: prefork (subst.c:77)
==8286== by 0x42B318: execcmd (exec.c:2619)
==8286== by 0x428CA0: execpline2 (exec.c:1697)
==8286== by 0x427FD2: execpline (exec.c:1484)
==8286== by 0x427756: execlist (exec.c:1267)
==8286== by 0x42717C: execode (exec.c:1073)
==8286== by 0x431299: runshfunc (exec.c:5040)
==8286== by 0x430E76: doshfunc (exec.c:4920)
==8286== by 0x4302FB: execshfunc (exec.c:4557)
==8286== by 0x42D8C1: execcmd (exec.c:3373)
==8286==
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8288-- Caught __NR_exit; running __libc_freeres()
==8288== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8288-by-pythonnut-on-???
==8288== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8288-by-pythonnut-on-???
==8288== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8288-by-pythonnut-on-???
==8288==
==8288== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8288== don't want to do, unless you know exactly what you're doing,
==8288== or are doing some strange experiment):
==8288== /usr/lib/valgrind/../../bin/vgdb --pid=8288 ...command...
==8288==
==8288== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8288== /path/to/gdb ./zsh
==8288== and then give GDB the following command
==8288== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8288
==8288== --pid is optional if only one valgrind process is running
==8288==
--8288-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8288==
==8288== HEAP SUMMARY:
==8288== in use at exit: 1,133,042 bytes in 25,118 blocks
==8288== total heap usage: 652,808 allocs, 627,690 frees, 31,338,338 bytes allocated
==8288==
==8288== Searching for pointers to 25,118 not-freed blocks
--8288-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8288-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8288-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8288-- Scanning root segment: 0x402a000..0x402efff (20480)
--8288-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8288-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8288-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8288-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8288-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8288-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8288-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8288-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8288-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8288-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8288-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8288-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8288-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8288-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8288-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8288-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8288-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8288-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8288-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8288-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8288-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8288-- Scanning root segment: 0x701a000..0x701afff (4096)
--8288-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8288-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8288-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8288-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8288-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8288-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8288-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8288== Checked 1,422,984 bytes
==8288==
==8288== LEAK SUMMARY:
==8288== definitely lost: 253 bytes in 4 blocks
==8288== indirectly lost: 6,756 bytes in 7 blocks
==8288== possibly lost: 0 bytes in 0 blocks
==8288== still reachable: 1,126,033 bytes in 25,107 blocks
==8288== suppressed: 0 bytes in 0 blocks
==8288== Rerun with --leak-check=full to see details of leaked memory
==8288==
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8288==
==8288== 1 errors in context 1 of 1:
==8288== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8288== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8288== by 0x488CD0: stringsubst (subst.c:301)
==8288== by 0x48801B: prefork (subst.c:77)
==8288== by 0x42B318: execcmd (exec.c:2619)
==8288== by 0x428CA0: execpline2 (exec.c:1697)
==8288== by 0x427FD2: execpline (exec.c:1484)
==8288== by 0x427756: execlist (exec.c:1267)
==8288== by 0x42717C: execode (exec.c:1073)
==8288== by 0x431299: runshfunc (exec.c:5040)
==8288== by 0x430E76: doshfunc (exec.c:4920)
==8288== by 0x4302FB: execshfunc (exec.c:4557)
==8288== by 0x42D8C1: execcmd (exec.c:3373)
==8288==
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8290-by-pythonnut-on-???
==8290== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8290-by-pythonnut-on-???
==8290== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8290-by-pythonnut-on-???
==8290==
==8290== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8290== don't want to do, unless you know exactly what you're doing,
==8290== or are doing some strange experiment):
==8290== /usr/lib/valgrind/../../bin/vgdb --pid=8290 ...command...
==8290==
==8290== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8290== /path/to/gdb ./zsh
==8290== and then give GDB the following command
==8290== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8290
==8290== --pid is optional if only one valgrind process is running
==8290==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8290-- Caught __NR_exit; running __libc_freeres()
--8290-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8290==
==8290== HEAP SUMMARY:
==8290== in use at exit: 1,133,318 bytes in 25,119 blocks
==8290== total heap usage: 652,910 allocs, 627,791 frees, 31,345,902 bytes allocated
==8290==
==8290== Searching for pointers to 25,119 not-freed blocks
--8290-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8290-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8290-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8290-- Scanning root segment: 0x402a000..0x402efff (20480)
--8290-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8290-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8290-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8290-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8290-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8290-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8290-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8290-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8290-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8290-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8290-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8290-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8290-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8290-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8290-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8290-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8290-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8290-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8290-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8290-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8290-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8290-- Scanning root segment: 0x701a000..0x701afff (4096)
--8290-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8290-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8290-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8290-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8290-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8290-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8290-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8290== Checked 1,423,248 bytes
==8290==
==8290== LEAK SUMMARY:
==8290== definitely lost: 253 bytes in 4 blocks
==8290== indirectly lost: 6,756 bytes in 7 blocks
==8290== possibly lost: 0 bytes in 0 blocks
==8290== still reachable: 1,126,309 bytes in 25,108 blocks
==8290== suppressed: 0 bytes in 0 blocks
==8290== Rerun with --leak-check=full to see details of leaked memory
==8290==
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290==
==8290== 1 errors in context 1 of 1:
==8290== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8290== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8290== by 0x488CD0: stringsubst (subst.c:301)
==8290== by 0x48801B: prefork (subst.c:77)
==8290== by 0x42B318: execcmd (exec.c:2619)
==8290== by 0x428CA0: execpline2 (exec.c:1697)
==8290== by 0x427FD2: execpline (exec.c:1484)
==8290== by 0x427756: execlist (exec.c:1267)
==8290== by 0x42717C: execode (exec.c:1073)
==8290== by 0x431299: runshfunc (exec.c:5040)
==8290== by 0x430E76: doshfunc (exec.c:4920)
==8290== by 0x4302FB: execshfunc (exec.c:4557)
==8290== by 0x42D8C1: execcmd (exec.c:3373)
==8290==
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8293-by-pythonnut-on-???
==8293== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8293-by-pythonnut-on-???
==8293== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8293-by-pythonnut-on-???
==8293==
==8293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8293== don't want to do, unless you know exactly what you're doing,
==8293== or are doing some strange experiment):
==8293== /usr/lib/valgrind/../../bin/vgdb --pid=8293 ...command...
==8293==
==8293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8293== /path/to/gdb ./zsh
==8293== and then give GDB the following command
==8293== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8293
==8293== --pid is optional if only one valgrind process is running
==8293==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
==8292== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8292-by-pythonnut-on-???
==8292== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8292-by-pythonnut-on-???
==8292== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8292-by-pythonnut-on-???
==8292==
==8292== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8292== don't want to do, unless you know exactly what you're doing,
==8292== or are doing some strange experiment):
==8292== /usr/lib/valgrind/../../bin/vgdb --pid=8292 ...command...
==8292==
==8292== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8292== /path/to/gdb ./zsh
==8292== and then give GDB the following command
==8292== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8292
==8292== --pid is optional if only one valgrind process is running
==8292==
--8292-- Caught __NR_exit; running __libc_freeres()
--8292-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8292==
==8292== HEAP SUMMARY:
==8292== in use at exit: 1,133,889 bytes in 25,135 blocks
==8292== total heap usage: 653,048 allocs, 627,913 frees, 31,355,820 bytes allocated
==8292==
==8292== Searching for pointers to 25,135 not-freed blocks
--8292-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8292-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8292-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8292-- Scanning root segment: 0x402a000..0x402efff (20480)
--8292-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8292-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8292-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8292-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8292-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8292-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8292-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8292-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8292-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8292-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8292-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8292-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8292-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8292-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8292-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8292-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8292-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8292-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8292-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8292-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8292-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8292-- Scanning root segment: 0x701a000..0x701afff (4096)
--8292-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8292-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8292-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8292-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8292-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8292-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8292-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8292== Checked 1,423,704 bytes
==8292==
==8292== LEAK SUMMARY:
==8292== definitely lost: 253 bytes in 4 blocks
==8292== indirectly lost: 6,756 bytes in 7 blocks
==8292== possibly lost: 0 bytes in 0 blocks
==8292== still reachable: 1,126,880 bytes in 25,124 blocks
==8292== suppressed: 0 bytes in 0 blocks
==8292== Rerun with --leak-check=full to see details of leaked memory
==8292==
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8292==
==8292== 1 errors in context 1 of 1:
==8292== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8292== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8292== by 0x488CD0: stringsubst (subst.c:301)
==8292== by 0x48801B: prefork (subst.c:77)
==8292== by 0x42B318: execcmd (exec.c:2619)
==8292== by 0x428CA0: execpline2 (exec.c:1697)
==8292== by 0x427FD2: execpline (exec.c:1484)
==8292== by 0x427756: execlist (exec.c:1267)
==8292== by 0x42717C: execode (exec.c:1073)
==8292== by 0x431299: runshfunc (exec.c:5040)
==8292== by 0x430E76: doshfunc (exec.c:4920)
==8292== by 0x4302FB: execshfunc (exec.c:4557)
==8292== by 0x42D8C1: execcmd (exec.c:3373)
==8292==
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8295== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8295-by-pythonnut-on-???
==8295== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8295-by-pythonnut-on-???
==8295== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8295-by-pythonnut-on-???
==8295==
==8295== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8295== don't want to do, unless you know exactly what you're doing,
==8295== or are doing some strange experiment):
==8295== /usr/lib/valgrind/../../bin/vgdb --pid=8295 ...command...
==8295==
==8295== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8295== /path/to/gdb ./zsh
==8295== and then give GDB the following command
==8295== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8295
==8295== --pid is optional if only one valgrind process is running
==8295==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8294-- Caught __NR_exit; running __libc_freeres()
==8294== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8294-by-pythonnut-on-???
==8294== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8294-by-pythonnut-on-???
==8294== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8294-by-pythonnut-on-???
==8294==
==8294== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8294== don't want to do, unless you know exactly what you're doing,
==8294== or are doing some strange experiment):
==8294== /usr/lib/valgrind/../../bin/vgdb --pid=8294 ...command...
==8294==
==8294== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8294== /path/to/gdb ./zsh
==8294== and then give GDB the following command
==8294== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8294
==8294== --pid is optional if only one valgrind process is running
==8294==
--8294-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8294==
==8294== HEAP SUMMARY:
==8294== in use at exit: 1,134,165 bytes in 25,136 blocks
==8294== total heap usage: 653,151 allocs, 628,015 frees, 31,363,408 bytes allocated
==8294==
==8294== Searching for pointers to 25,136 not-freed blocks
--8294-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8294-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8294-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8294-- Scanning root segment: 0x402a000..0x402efff (20480)
--8294-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8294-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8294-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8294-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8294-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8294-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8294-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8294-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8294-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8294-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8294-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8294-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8294-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8294-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8294-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8294-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8294-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8294-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8294-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8294-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8294-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8294-- Scanning root segment: 0x701a000..0x701afff (4096)
--8294-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8294-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8294-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8294-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8294-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8294-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8294-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8294== Checked 1,423,968 bytes
==8294==
==8294== LEAK SUMMARY:
==8294== definitely lost: 253 bytes in 4 blocks
==8294== indirectly lost: 6,756 bytes in 7 blocks
==8294== possibly lost: 0 bytes in 0 blocks
==8294== still reachable: 1,127,156 bytes in 25,125 blocks
==8294== suppressed: 0 bytes in 0 blocks
==8294== Rerun with --leak-check=full to see details of leaked memory
==8294==
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8294==
==8294== 1 errors in context 1 of 1:
==8294== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8294== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8294== by 0x488CD0: stringsubst (subst.c:301)
==8294== by 0x48801B: prefork (subst.c:77)
==8294== by 0x42B318: execcmd (exec.c:2619)
==8294== by 0x428CA0: execpline2 (exec.c:1697)
==8294== by 0x427FD2: execpline (exec.c:1484)
==8294== by 0x427756: execlist (exec.c:1267)
==8294== by 0x42717C: execode (exec.c:1073)
==8294== by 0x431299: runshfunc (exec.c:5040)
==8294== by 0x430E76: doshfunc (exec.c:4920)
==8294== by 0x4302FB: execshfunc (exec.c:4557)
==8294== by 0x42D8C1: execcmd (exec.c:3373)
==8294==
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8296-- Caught __NR_exit; running __libc_freeres()
==8296== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8296-by-pythonnut-on-???
==8296== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8296-by-pythonnut-on-???
==8296== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8296-by-pythonnut-on-???
==8296==
==8296== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8296== don't want to do, unless you know exactly what you're doing,
==8296== or are doing some strange experiment):
==8296== /usr/lib/valgrind/../../bin/vgdb --pid=8296 ...command...
==8296==
==8296== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8296== /path/to/gdb ./zsh
==8296== and then give GDB the following command
==8296== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8296
==8296== --pid is optional if only one valgrind process is running
==8296==
--8296-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8296==
==8296== HEAP SUMMARY:
==8296== in use at exit: 1,134,587 bytes in 25,144 blocks
==8296== total heap usage: 653,253 allocs, 628,109 frees, 31,370,874 bytes allocated
==8296==
==8296== Searching for pointers to 25,144 not-freed blocks
--8296-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8296-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8296-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8296-- Scanning root segment: 0x402a000..0x402efff (20480)
--8296-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8296-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8296-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8296-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8296-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8296-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8296-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8296-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8296-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8296-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8296-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8296-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8296-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8296-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8296-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8296-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8296-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8296-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8296-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8296-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8296-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8296-- Scanning root segment: 0x701a000..0x701afff (4096)
--8296-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8296-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8296-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8296-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8296-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8296-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8296-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8296== Checked 1,424,352 bytes
==8296==
==8296== LEAK SUMMARY:
==8296== definitely lost: 253 bytes in 4 blocks
==8296== indirectly lost: 6,756 bytes in 7 blocks
==8296== possibly lost: 0 bytes in 0 blocks
==8296== still reachable: 1,127,578 bytes in 25,133 blocks
==8296== suppressed: 0 bytes in 0 blocks
==8296== Rerun with --leak-check=full to see details of leaked memory
==8296==
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8296==
==8296== 1 errors in context 1 of 1:
==8296== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8296== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8296== by 0x488CD0: stringsubst (subst.c:301)
==8296== by 0x48801B: prefork (subst.c:77)
==8296== by 0x42B318: execcmd (exec.c:2619)
==8296== by 0x428CA0: execpline2 (exec.c:1697)
==8296== by 0x427FD2: execpline (exec.c:1484)
==8296== by 0x427756: execlist (exec.c:1267)
==8296== by 0x42717C: execode (exec.c:1073)
==8296== by 0x431299: runshfunc (exec.c:5040)
==8296== by 0x430E76: doshfunc (exec.c:4920)
==8296== by 0x4302FB: execshfunc (exec.c:4557)
==8296== by 0x42D8C1: execcmd (exec.c:3373)
==8296==
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8298-- Caught __NR_exit; running __libc_freeres()
==8298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8298-by-pythonnut-on-???
==8298== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8298-by-pythonnut-on-???
==8298== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8298-by-pythonnut-on-???
==8298==
==8298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8298== don't want to do, unless you know exactly what you're doing,
==8298== or are doing some strange experiment):
==8298== /usr/lib/valgrind/../../bin/vgdb --pid=8298 ...command...
==8298==
==8298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8298== /path/to/gdb ./zsh
==8298== and then give GDB the following command
==8298== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8298
==8298== --pid is optional if only one valgrind process is running
==8298==
--8298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8298==
==8298== HEAP SUMMARY:
==8298== in use at exit: 1,135,021 bytes in 25,159 blocks
==8298== total heap usage: 653,390 allocs, 628,231 frees, 31,380,696 bytes allocated
==8298==
==8298== Searching for pointers to 25,159 not-freed blocks
--8298-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8298-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8298-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8298-- Scanning root segment: 0x402a000..0x402efff (20480)
--8298-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8298-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8298-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8298-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8298-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8298-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8298-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8298-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8298-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8298-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8298-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8298-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8298-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8298-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8298-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8298-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8298-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8298-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8298-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8298-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8298-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8298-- Scanning root segment: 0x701a000..0x701afff (4096)
--8298-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8298-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8298-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8298-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8298-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8298-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8298-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8298== Checked 1,424,744 bytes
==8298==
==8298== LEAK SUMMARY:
==8298== definitely lost: 253 bytes in 4 blocks
==8298== indirectly lost: 6,756 bytes in 7 blocks
==8298== possibly lost: 0 bytes in 0 blocks
==8298== still reachable: 1,128,012 bytes in 25,148 blocks
==8298== suppressed: 0 bytes in 0 blocks
==8298== Rerun with --leak-check=full to see details of leaked memory
==8298==
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8298==
==8298== 1 errors in context 1 of 1:
==8298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8298== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8298== by 0x488CD0: stringsubst (subst.c:301)
==8298== by 0x48801B: prefork (subst.c:77)
==8298== by 0x42B318: execcmd (exec.c:2619)
==8298== by 0x428CA0: execpline2 (exec.c:1697)
==8298== by 0x427FD2: execpline (exec.c:1484)
==8298== by 0x427756: execlist (exec.c:1267)
==8298== by 0x42717C: execode (exec.c:1073)
==8298== by 0x431299: runshfunc (exec.c:5040)
==8298== by 0x430E76: doshfunc (exec.c:4920)
==8298== by 0x4302FB: execshfunc (exec.c:4557)
==8298== by 0x42D8C1: execcmd (exec.c:3373)
==8298==
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8300-by-pythonnut-on-???
==8300== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8300-by-pythonnut-on-???
==8300== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8300-by-pythonnut-on-???
==8300==
==8300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8300== don't want to do, unless you know exactly what you're doing,
==8300== or are doing some strange experiment):
==8300== /usr/lib/valgrind/../../bin/vgdb --pid=8300 ...command...
==8300==
==8300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8300== /path/to/gdb ./zsh
==8300== and then give GDB the following command
==8300== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8300
==8300== --pid is optional if only one valgrind process is running
==8300==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8300-- Caught __NR_exit; running __libc_freeres()
--8300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8300==
==8300== HEAP SUMMARY:
==8300== in use at exit: 1,135,297 bytes in 25,160 blocks
==8300== total heap usage: 653,493 allocs, 628,333 frees, 31,388,284 bytes allocated
==8300==
==8300== Searching for pointers to 25,160 not-freed blocks
--8300-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8300-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8300-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8300-- Scanning root segment: 0x402a000..0x402efff (20480)
--8300-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8300-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8300-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8300-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8300-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8300-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8300-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8300-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8300-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8300-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8300-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8300-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8300-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8300-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8300-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8300-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8300-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8300-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8300-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8300-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8300-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8300-- Scanning root segment: 0x701a000..0x701afff (4096)
--8300-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8300-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8300-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8300-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8300-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8300-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8300-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8300== Checked 1,425,008 bytes
==8300==
==8300== LEAK SUMMARY:
==8300== definitely lost: 253 bytes in 4 blocks
==8300== indirectly lost: 6,756 bytes in 7 blocks
==8300== possibly lost: 0 bytes in 0 blocks
==8300== still reachable: 1,128,288 bytes in 25,149 blocks
==8300== suppressed: 0 bytes in 0 blocks
==8300== Rerun with --leak-check=full to see details of leaked memory
==8300==
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300==
==8300== 1 errors in context 1 of 1:
==8300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8300== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8300== by 0x488CD0: stringsubst (subst.c:301)
==8300== by 0x48801B: prefork (subst.c:77)
==8300== by 0x42B318: execcmd (exec.c:2619)
==8300== by 0x428CA0: execpline2 (exec.c:1697)
==8300== by 0x427FD2: execpline (exec.c:1484)
==8300== by 0x427756: execlist (exec.c:1267)
==8300== by 0x42717C: execode (exec.c:1073)
==8300== by 0x431299: runshfunc (exec.c:5040)
==8300== by 0x430E76: doshfunc (exec.c:4920)
==8300== by 0x4302FB: execshfunc (exec.c:4557)
==8300== by 0x42D8C1: execcmd (exec.c:3373)
==8300==
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8303-by-pythonnut-on-???
==8303== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8303-by-pythonnut-on-???
==8303== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8303-by-pythonnut-on-???
==8303==
==8303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8303== don't want to do, unless you know exactly what you're doing,
==8303== or are doing some strange experiment):
==8303== /usr/lib/valgrind/../../bin/vgdb --pid=8303 ...command...
==8303==
==8303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8303== /path/to/gdb ./zsh
==8303== and then give GDB the following command
==8303== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8303
==8303== --pid is optional if only one valgrind process is running
==8303==
client request: code 4d430005, addr 0xFFEFEF49C, len 4
--8302-- Caught __NR_exit; running __libc_freeres()
==8302== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8302-by-pythonnut-on-???
==8302== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8302-by-pythonnut-on-???
==8302== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8302-by-pythonnut-on-???
==8302==
==8302== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8302== don't want to do, unless you know exactly what you're doing,
==8302== or are doing some strange experiment):
==8302== /usr/lib/valgrind/../../bin/vgdb --pid=8302 ...command...
==8302==
==8302== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8302== /path/to/gdb ./zsh
==8302== and then give GDB the following command
==8302== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8302
==8302== --pid is optional if only one valgrind process is running
==8302==
--8302-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8302==
==8302== HEAP SUMMARY:
==8302== in use at exit: 1,135,719 bytes in 25,168 blocks
==8302== total heap usage: 653,595 allocs, 628,427 frees, 31,395,750 bytes allocated
==8302==
==8302== Searching for pointers to 25,168 not-freed blocks
--8302-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8302-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8302-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8302-- Scanning root segment: 0x402a000..0x402efff (20480)
--8302-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8302-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8302-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8302-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8302-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8302-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8302-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8302-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8302-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8302-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8302-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8302-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8302-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8302-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8302-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8302-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8302-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8302-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8302-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8302-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8302-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8302-- Scanning root segment: 0x701a000..0x701afff (4096)
--8302-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8302-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8302-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8302-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8302-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8302-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8302-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8302== Checked 1,425,392 bytes
==8302==
==8302== LEAK SUMMARY:
==8302== definitely lost: 253 bytes in 4 blocks
==8302== indirectly lost: 6,756 bytes in 7 blocks
==8302== possibly lost: 0 bytes in 0 blocks
==8302== still reachable: 1,128,710 bytes in 25,157 blocks
==8302== suppressed: 0 bytes in 0 blocks
==8302== Rerun with --leak-check=full to see details of leaked memory
==8302==
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8302==
==8302== 1 errors in context 1 of 1:
==8302== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8302== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8302== by 0x488CD0: stringsubst (subst.c:301)
==8302== by 0x48801B: prefork (subst.c:77)
==8302== by 0x42B318: execcmd (exec.c:2619)
==8302== by 0x428CA0: execpline2 (exec.c:1697)
==8302== by 0x427FD2: execpline (exec.c:1484)
==8302== by 0x427756: execlist (exec.c:1267)
==8302== by 0x42717C: execode (exec.c:1073)
==8302== by 0x431299: runshfunc (exec.c:5040)
==8302== by 0x430E76: doshfunc (exec.c:4920)
==8302== by 0x4302FB: execshfunc (exec.c:4557)
==8302== by 0x42D8C1: execcmd (exec.c:3373)
==8302==
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8304-by-pythonnut-on-???
==8304== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8304-by-pythonnut-on-???
==8304== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8304-by-pythonnut-on-???
==8304==
==8304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8304== don't want to do, unless you know exactly what you're doing,
==8304== or are doing some strange experiment):
==8304== /usr/lib/valgrind/../../bin/vgdb --pid=8304 ...command...
==8304==
==8304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8304== /path/to/gdb ./zsh
==8304== and then give GDB the following command
==8304== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8304
==8304== --pid is optional if only one valgrind process is running
==8304==
client request: code 4d430005, addr 0xFFEFF10CC, len 4
--8304-- Caught __NR_exit; running __libc_freeres()
--8304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8304==
==8304== HEAP SUMMARY:
==8304== in use at exit: 1,135,001 bytes in 25,161 blocks
==8304== total heap usage: 653,729 allocs, 628,568 frees, 31,408,086 bytes allocated
==8304==
==8304== Searching for pointers to 25,161 not-freed blocks
--8304-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8304-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8304-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8304-- Scanning root segment: 0x402a000..0x402afff (4096)
--8304-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8304-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8304-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8304-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8304-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8304-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8304-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8304-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8304-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8304-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8304-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8304-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8304-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8304-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8304-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8304-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8304-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8304-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8304-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8304-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8304-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8304-- Scanning root segment: 0x701a000..0x701afff (4096)
--8304-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8304-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8304-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8304-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8304-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8304-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8304-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8304== Checked 1,406,216 bytes
==8304==
==8304== LEAK SUMMARY:
==8304== definitely lost: 253 bytes in 4 blocks
==8304== indirectly lost: 6,756 bytes in 7 blocks
==8304== possibly lost: 0 bytes in 0 blocks
==8304== still reachable: 1,127,992 bytes in 25,150 blocks
==8304== suppressed: 0 bytes in 0 blocks
==8304== Rerun with --leak-check=full to see details of leaked memory
==8304==
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304==
==8304== 1 errors in context 1 of 1:
==8304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8304== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8304== by 0x488CD0: stringsubst (subst.c:301)
==8304== by 0x48801B: prefork (subst.c:77)
==8304== by 0x42B318: execcmd (exec.c:2619)
==8304== by 0x428CA0: execpline2 (exec.c:1697)
==8304== by 0x427FD2: execpline (exec.c:1484)
==8304== by 0x427756: execlist (exec.c:1267)
==8304== by 0x42717C: execode (exec.c:1073)
==8304== by 0x431299: runshfunc (exec.c:5040)
==8304== by 0x430E76: doshfunc (exec.c:4920)
==8304== by 0x4302FB: execshfunc (exec.c:4557)
==8304== by 0x42D8C1: execcmd (exec.c:3373)
==8304==
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8307-by-pythonnut-on-???
==8307== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8307-by-pythonnut-on-???
==8307== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8307-by-pythonnut-on-???
==8307==
==8307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8307== don't want to do, unless you know exactly what you're doing,
==8307== or are doing some strange experiment):
==8307== /usr/lib/valgrind/../../bin/vgdb --pid=8307 ...command...
==8307==
==8307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8307== /path/to/gdb ./zsh
==8307== and then give GDB the following command
==8307== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8307
==8307== --pid is optional if only one valgrind process is running
==8307==
client request: code 4d430005, addr 0xFFEFF10CC, len 4
--8306-- Caught __NR_exit; running __libc_freeres()
==8306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8306-by-pythonnut-on-???
==8306== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8306-by-pythonnut-on-???
==8306== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8306-by-pythonnut-on-???
==8306==
==8306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8306== don't want to do, unless you know exactly what you're doing,
==8306== or are doing some strange experiment):
==8306== /usr/lib/valgrind/../../bin/vgdb --pid=8306 ...command...
==8306==
==8306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8306== /path/to/gdb ./zsh
==8306== and then give GDB the following command
==8306== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8306
==8306== --pid is optional if only one valgrind process is running
==8306==
--8306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8306==
==8306== HEAP SUMMARY:
==8306== in use at exit: 1,135,359 bytes in 25,169 blocks
==8306== total heap usage: 653,830 allocs, 628,661 frees, 31,415,434 bytes allocated
==8306==
==8306== Searching for pointers to 25,169 not-freed blocks
--8306-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8306-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8306-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8306-- Scanning root segment: 0x402a000..0x402afff (4096)
--8306-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8306-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8306-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8306-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8306-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8306-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8306-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8306-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8306-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8306-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8306-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8306-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8306-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8306-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8306-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8306-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8306-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8306-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8306-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8306-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8306-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8306-- Scanning root segment: 0x701a000..0x701afff (4096)
--8306-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8306-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8306-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8306-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8306-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8306-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8306-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8306== Checked 1,406,544 bytes
==8306==
==8306== LEAK SUMMARY:
==8306== definitely lost: 253 bytes in 4 blocks
==8306== indirectly lost: 6,756 bytes in 7 blocks
==8306== possibly lost: 0 bytes in 0 blocks
==8306== still reachable: 1,128,350 bytes in 25,158 blocks
==8306== suppressed: 0 bytes in 0 blocks
==8306== Rerun with --leak-check=full to see details of leaked memory
==8306==
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8306==
==8306== 1 errors in context 1 of 1:
==8306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8306== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8306== by 0x488CD0: stringsubst (subst.c:301)
==8306== by 0x48801B: prefork (subst.c:77)
==8306== by 0x42B318: execcmd (exec.c:2619)
==8306== by 0x428CA0: execpline2 (exec.c:1697)
==8306== by 0x427FD2: execpline (exec.c:1484)
==8306== by 0x427756: execlist (exec.c:1267)
==8306== by 0x42717C: execode (exec.c:1073)
==8306== by 0x431299: runshfunc (exec.c:5040)
==8306== by 0x430E76: doshfunc (exec.c:4920)
==8306== by 0x4302FB: execshfunc (exec.c:4557)
==8306== by 0x42D8C1: execcmd (exec.c:3373)
==8306==
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF10CC, len 4
--8308-- Caught __NR_exit; running __libc_freeres()
==8308== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8308-by-pythonnut-on-???
==8308== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8308-by-pythonnut-on-???
==8308== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8308-by-pythonnut-on-???
==8308==
==8308== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8308== don't want to do, unless you know exactly what you're doing,
==8308== or are doing some strange experiment):
==8308== /usr/lib/valgrind/../../bin/vgdb --pid=8308 ...command...
==8308==
==8308== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8308== /path/to/gdb ./zsh
==8308== and then give GDB the following command
==8308== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8308
==8308== --pid is optional if only one valgrind process is running
==8308==
--8308-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8308==
==8308== HEAP SUMMARY:
==8308== in use at exit: 1,135,717 bytes in 25,177 blocks
==8308== total heap usage: 653,931 allocs, 628,754 frees, 31,422,782 bytes allocated
==8308==
==8308== Searching for pointers to 25,177 not-freed blocks
--8308-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8308-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8308-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8308-- Scanning root segment: 0x402a000..0x402afff (4096)
--8308-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8308-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8308-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8308-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8308-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8308-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8308-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8308-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8308-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8308-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8308-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8308-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8308-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8308-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8308-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8308-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8308-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8308-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8308-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8308-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8308-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8308-- Scanning root segment: 0x701a000..0x701afff (4096)
--8308-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8308-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8308-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8308-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8308-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8308-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8308-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8308== Checked 1,406,872 bytes
==8308==
==8308== LEAK SUMMARY:
==8308== definitely lost: 253 bytes in 4 blocks
==8308== indirectly lost: 6,756 bytes in 7 blocks
==8308== possibly lost: 0 bytes in 0 blocks
==8308== still reachable: 1,128,708 bytes in 25,166 blocks
==8308== suppressed: 0 bytes in 0 blocks
==8308== Rerun with --leak-check=full to see details of leaked memory
==8308==
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8308==
==8308== 1 errors in context 1 of 1:
==8308== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8308== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8308== by 0x488CD0: stringsubst (subst.c:301)
==8308== by 0x48801B: prefork (subst.c:77)
==8308== by 0x42B318: execcmd (exec.c:2619)
==8308== by 0x428CA0: execpline2 (exec.c:1697)
==8308== by 0x427FD2: execpline (exec.c:1484)
==8308== by 0x427756: execlist (exec.c:1267)
==8308== by 0x42717C: execode (exec.c:1073)
==8308== by 0x431299: runshfunc (exec.c:5040)
==8308== by 0x430E76: doshfunc (exec.c:4920)
==8308== by 0x4302FB: execshfunc (exec.c:4557)
==8308== by 0x42D8C1: execcmd (exec.c:3373)
==8308==
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF3F6C, len 4
--8311-- Caught __NR_exit; running __libc_freeres()
==8311== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8311-by-pythonnut-on-???
==8311== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8311-by-pythonnut-on-???
==8311== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8311-by-pythonnut-on-???
==8311==
==8311== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8311== don't want to do, unless you know exactly what you're doing,
==8311== or are doing some strange experiment):
==8311== /usr/lib/valgrind/../../bin/vgdb --pid=8311 ...command...
==8311==
==8311== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8311== /path/to/gdb ./zsh
==8311== and then give GDB the following command
==8311== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8311
==8311== --pid is optional if only one valgrind process is running
==8311==
client request: code 4d430005, addr 0xFFEFF375C, len 4
--8311-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8311==
==8311== HEAP SUMMARY:
==8311== in use at exit: 1,161,355 bytes in 25,415 blocks
==8311== total heap usage: 655,635 allocs, 630,220 frees, 31,716,937 bytes allocated
==8311==
==8311== Searching for pointers to 25,415 not-freed blocks
--8311-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8311-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8311-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8311-- Scanning root segment: 0x402c000..0x402cfff (4096)
--8311-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8311-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8311-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8311-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8311-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8311-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8311-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8311-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8311-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8311-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8311-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8311-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8311-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8311-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8311-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8311-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8311-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8311-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8311-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8311-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8311-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8311-- Scanning root segment: 0x701a000..0x701afff (4096)
--8311-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8311-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8311-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8311-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8311-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8311-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8311-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8311== Checked 1,430,560 bytes
==8311==
==8311== LEAK SUMMARY:
==8311== definitely lost: 253 bytes in 4 blocks
==8311== indirectly lost: 6,756 bytes in 7 blocks
==8311== possibly lost: 0 bytes in 0 blocks
==8311== still reachable: 1,154,346 bytes in 25,404 blocks
==8311== suppressed: 0 bytes in 0 blocks
==8311== Rerun with --leak-check=full to see details of leaked memory
==8311==
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8311==
==8311== 1 errors in context 1 of 1:
==8311== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8311== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8311== by 0x488CD0: stringsubst (subst.c:301)
==8311== by 0x48801B: prefork (subst.c:77)
==8311== by 0x42B318: execcmd (exec.c:2619)
==8311== by 0x428CA0: execpline2 (exec.c:1697)
==8311== by 0x427FD2: execpline (exec.c:1484)
==8311== by 0x427756: execlist (exec.c:1267)
==8311== by 0x42717C: execode (exec.c:1073)
==8311== by 0x431299: runshfunc (exec.c:5040)
==8311== by 0x430E76: doshfunc (exec.c:4920)
==8311== by 0x4302FB: execshfunc (exec.c:4557)
==8311== by 0x42D8C1: execcmd (exec.c:3373)
==8311==
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8313-by-pythonnut-on-???
==8313== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8313-by-pythonnut-on-???
==8313== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8313-by-pythonnut-on-???
==8313==
==8313== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8313== don't want to do, unless you know exactly what you're doing,
==8313== or are doing some strange experiment):
==8313== /usr/lib/valgrind/../../bin/vgdb --pid=8313 ...command...
==8313==
==8313== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8313== /path/to/gdb ./zsh
==8313== and then give GDB the following command
==8313== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8313
==8313== --pid is optional if only one valgrind process is running
==8313==
--8313-- Caught __NR_exit; running __libc_freeres()
--8313-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8313==
==8313== HEAP SUMMARY:
==8313== in use at exit: 1,326,069 bytes in 29,207 blocks
==8313== total heap usage: 715,401 allocs, 686,194 frees, 38,075,421 bytes allocated
==8313==
==8313== Searching for pointers to 29,207 not-freed blocks
--8313-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8313-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8313-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8313-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8313-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8313-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8313-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8313-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8313-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8313-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8313-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8313-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8313-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8313-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8313-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8313-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8313-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8313-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8313-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8313-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8313-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8313-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8313-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8313-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8313-- Scanning root segment: 0x701a000..0x701afff (4096)
--8313-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8313-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8313-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8313-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8313-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8313-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8313-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8313== Checked 1,579,368 bytes
==8313==
==8313== LEAK SUMMARY:
==8313== definitely lost: 253 bytes in 4 blocks
==8313== indirectly lost: 6,756 bytes in 7 blocks
==8313== possibly lost: 0 bytes in 0 blocks
==8313== still reachable: 1,319,060 bytes in 29,196 blocks
==8313== suppressed: 0 bytes in 0 blocks
==8313== Rerun with --leak-check=full to see details of leaked memory
==8313==
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313==
==8313== 1 errors in context 1 of 1:
==8313== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8313== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8313== by 0x488CD0: stringsubst (subst.c:301)
==8313== by 0x48801B: prefork (subst.c:77)
==8313== by 0x42B318: execcmd (exec.c:2619)
==8313== by 0x428CA0: execpline2 (exec.c:1697)
==8313== by 0x427FD2: execpline (exec.c:1484)
==8313== by 0x427756: execlist (exec.c:1267)
==8313== by 0x42717C: execode (exec.c:1073)
==8313== by 0x431299: runshfunc (exec.c:5040)
==8313== by 0x430E76: doshfunc (exec.c:4920)
==8313== by 0x4302FB: execshfunc (exec.c:4557)
==8313== by 0x42D8C1: execcmd (exec.c:3373)
==8313==
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8314-- Caught __NR_exit; running __libc_freeres()
==8314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8314-by-pythonnut-on-???
==8314== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8314-by-pythonnut-on-???
==8314== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8314-by-pythonnut-on-???
==8314==
==8314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8314== don't want to do, unless you know exactly what you're doing,
==8314== or are doing some strange experiment):
==8314== /usr/lib/valgrind/../../bin/vgdb --pid=8314 ...command...
==8314==
==8314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8314== /path/to/gdb ./zsh
==8314== and then give GDB the following command
==8314== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8314
==8314== --pid is optional if only one valgrind process is running
==8314==
--8314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8314==
==8314== HEAP SUMMARY:
==8314== in use at exit: 1,298,980 bytes in 27,997 blocks
==8314== total heap usage: 778,783 allocs, 750,786 frees, 44,652,824 bytes allocated
==8314==
==8314== Searching for pointers to 27,997 not-freed blocks
--8314-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8314-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8314-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8314-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8314-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8314-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8314-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8314-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8314-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8314-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8314-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8314-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8314-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8314-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8314-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8314-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8314-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8314-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8314-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8314-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8314-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8314-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8314-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8314-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8314-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8314-- Scanning root segment: 0x701a000..0x701afff (4096)
--8314-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8314-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8314-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8314-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8314-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8314-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8314-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8314== Checked 1,583,896 bytes
==8314==
==8314== LEAK SUMMARY:
==8314== definitely lost: 253 bytes in 4 blocks
==8314== indirectly lost: 6,756 bytes in 7 blocks
==8314== possibly lost: 0 bytes in 0 blocks
==8314== still reachable: 1,291,971 bytes in 27,986 blocks
==8314== suppressed: 0 bytes in 0 blocks
==8314== Rerun with --leak-check=full to see details of leaked memory
==8314==
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8314==
==8314== 1 errors in context 1 of 1:
==8314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8314== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8314== by 0x488CD0: stringsubst (subst.c:301)
==8314== by 0x48801B: prefork (subst.c:77)
==8314== by 0x42B318: execcmd (exec.c:2619)
==8314== by 0x428CA0: execpline2 (exec.c:1697)
==8314== by 0x427FD2: execpline (exec.c:1484)
==8314== by 0x427756: execlist (exec.c:1267)
==8314== by 0x42717C: execode (exec.c:1073)
==8314== by 0x431299: runshfunc (exec.c:5040)
==8314== by 0x430E76: doshfunc (exec.c:4920)
==8314== by 0x4302FB: execshfunc (exec.c:4557)
==8314== by 0x42D8C1: execcmd (exec.c:3373)
==8314==
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8315-- Caught __NR_exit; running __libc_freeres()
==8315== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8315-by-pythonnut-on-???
==8315== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8315-by-pythonnut-on-???
==8315== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8315-by-pythonnut-on-???
==8315==
==8315== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8315== don't want to do, unless you know exactly what you're doing,
==8315== or are doing some strange experiment):
==8315== /usr/lib/valgrind/../../bin/vgdb --pid=8315 ...command...
==8315==
==8315== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8315== /path/to/gdb ./zsh
==8315== and then give GDB the following command
==8315== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8315
==8315== --pid is optional if only one valgrind process is running
==8315==
--8315-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8315==
==8315== HEAP SUMMARY:
==8315== in use at exit: 1,299,104 bytes in 27,998 blocks
==8315== total heap usage: 778,890 allocs, 750,892 frees, 45,003,296 bytes allocated
==8315==
==8315== Searching for pointers to 27,998 not-freed blocks
--8315-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8315-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8315-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8315-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8315-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8315-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8315-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8315-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8315-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8315-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8315-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8315-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8315-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8315-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8315-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8315-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8315-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8315-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8315-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8315-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8315-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8315-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8315-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8315-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8315-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8315-- Scanning root segment: 0x701a000..0x701afff (4096)
--8315-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8315-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8315-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8315-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8315-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8315-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8315-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8315== Checked 1,584,024 bytes
==8315==
==8315== LEAK SUMMARY:
==8315== definitely lost: 253 bytes in 4 blocks
==8315== indirectly lost: 6,756 bytes in 7 blocks
==8315== possibly lost: 0 bytes in 0 blocks
==8315== still reachable: 1,292,095 bytes in 27,987 blocks
==8315== suppressed: 0 bytes in 0 blocks
==8315== Rerun with --leak-check=full to see details of leaked memory
==8315==
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8315==
==8315== 1 errors in context 1 of 1:
==8315== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8315== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8315== by 0x488CD0: stringsubst (subst.c:301)
==8315== by 0x48801B: prefork (subst.c:77)
==8315== by 0x42B318: execcmd (exec.c:2619)
==8315== by 0x428CA0: execpline2 (exec.c:1697)
==8315== by 0x427FD2: execpline (exec.c:1484)
==8315== by 0x427756: execlist (exec.c:1267)
==8315== by 0x42717C: execode (exec.c:1073)
==8315== by 0x431299: runshfunc (exec.c:5040)
==8315== by 0x430E76: doshfunc (exec.c:4920)
==8315== by 0x4302FB: execshfunc (exec.c:4557)
==8315== by 0x42D8C1: execcmd (exec.c:3373)
==8315==
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8316-- Caught __NR_exit; running __libc_freeres()
==8316== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8316-by-pythonnut-on-???
==8316== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8316-by-pythonnut-on-???
==8316== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8316-by-pythonnut-on-???
==8316==
==8316== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8316== don't want to do, unless you know exactly what you're doing,
==8316== or are doing some strange experiment):
==8316== /usr/lib/valgrind/../../bin/vgdb --pid=8316 ...command...
==8316==
==8316== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8316== /path/to/gdb ./zsh
==8316== and then give GDB the following command
==8316== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8316
==8316== --pid is optional if only one valgrind process is running
==8316==
--8316-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8316==
==8316== HEAP SUMMARY:
==8316== in use at exit: 1,299,068 bytes in 27,998 blocks
==8316== total heap usage: 778,996 allocs, 750,998 frees, 45,353,616 bytes allocated
==8316==
==8316== Searching for pointers to 27,998 not-freed blocks
--8316-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8316-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8316-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8316-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8316-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8316-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8316-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8316-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8316-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8316-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8316-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8316-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8316-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8316-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8316-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8316-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8316-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8316-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8316-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8316-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8316-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8316-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8316-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8316-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8316-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8316-- Scanning root segment: 0x701a000..0x701afff (4096)
--8316-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8316-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8316-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8316-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8316-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8316-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8316-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8316== Checked 1,583,976 bytes
==8316==
==8316== LEAK SUMMARY:
==8316== definitely lost: 253 bytes in 4 blocks
==8316== indirectly lost: 6,756 bytes in 7 blocks
==8316== possibly lost: 0 bytes in 0 blocks
==8316== still reachable: 1,292,059 bytes in 27,987 blocks
==8316== suppressed: 0 bytes in 0 blocks
==8316== Rerun with --leak-check=full to see details of leaked memory
==8316==
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8316==
==8316== 1 errors in context 1 of 1:
==8316== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8316== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8316== by 0x488CD0: stringsubst (subst.c:301)
==8316== by 0x48801B: prefork (subst.c:77)
==8316== by 0x42B318: execcmd (exec.c:2619)
==8316== by 0x428CA0: execpline2 (exec.c:1697)
==8316== by 0x427FD2: execpline (exec.c:1484)
==8316== by 0x427756: execlist (exec.c:1267)
==8316== by 0x42717C: execode (exec.c:1073)
==8316== by 0x431299: runshfunc (exec.c:5040)
==8316== by 0x430E76: doshfunc (exec.c:4920)
==8316== by 0x4302FB: execshfunc (exec.c:4557)
==8316== by 0x42D8C1: execcmd (exec.c:3373)
==8316==
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8317-- Caught __NR_exit; running __libc_freeres()
==8317== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8317-by-pythonnut-on-???
==8317== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8317-by-pythonnut-on-???
==8317== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8317-by-pythonnut-on-???
==8317==
==8317== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8317== don't want to do, unless you know exactly what you're doing,
==8317== or are doing some strange experiment):
==8317== /usr/lib/valgrind/../../bin/vgdb --pid=8317 ...command...
==8317==
==8317== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8317== /path/to/gdb ./zsh
==8317== and then give GDB the following command
==8317== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8317
==8317== --pid is optional if only one valgrind process is running
==8317==
--8317-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8317==
==8317== HEAP SUMMARY:
==8317== in use at exit: 1,299,074 bytes in 27,998 blocks
==8317== total heap usage: 779,102 allocs, 751,104 frees, 45,703,920 bytes allocated
==8317==
==8317== Searching for pointers to 27,998 not-freed blocks
--8317-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8317-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8317-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8317-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8317-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8317-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8317-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8317-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8317-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8317-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8317-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8317-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8317-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8317-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8317-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8317-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8317-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8317-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8317-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8317-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8317-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8317-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8317-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8317-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8317-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8317-- Scanning root segment: 0x701a000..0x701afff (4096)
--8317-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8317-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8317-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8317-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8317-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8317-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8317-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8317== Checked 1,583,976 bytes
==8317==
==8317== LEAK SUMMARY:
==8317== definitely lost: 253 bytes in 4 blocks
==8317== indirectly lost: 6,756 bytes in 7 blocks
==8317== possibly lost: 0 bytes in 0 blocks
==8317== still reachable: 1,292,065 bytes in 27,987 blocks
==8317== suppressed: 0 bytes in 0 blocks
==8317== Rerun with --leak-check=full to see details of leaked memory
==8317==
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8317==
==8317== 1 errors in context 1 of 1:
==8317== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8317== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8317== by 0x488CD0: stringsubst (subst.c:301)
==8317== by 0x48801B: prefork (subst.c:77)
==8317== by 0x42B318: execcmd (exec.c:2619)
==8317== by 0x428CA0: execpline2 (exec.c:1697)
==8317== by 0x427FD2: execpline (exec.c:1484)
==8317== by 0x427756: execlist (exec.c:1267)
==8317== by 0x42717C: execode (exec.c:1073)
==8317== by 0x431299: runshfunc (exec.c:5040)
==8317== by 0x430E76: doshfunc (exec.c:4920)
==8317== by 0x4302FB: execshfunc (exec.c:4557)
==8317== by 0x42D8C1: execcmd (exec.c:3373)
==8317==
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8318-- Caught __NR_exit; running __libc_freeres()
==8318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8318-by-pythonnut-on-???
==8318== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8318-by-pythonnut-on-???
==8318== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8318-by-pythonnut-on-???
==8318==
==8318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8318== don't want to do, unless you know exactly what you're doing,
==8318== or are doing some strange experiment):
==8318== /usr/lib/valgrind/../../bin/vgdb --pid=8318 ...command...
==8318==
==8318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8318== /path/to/gdb ./zsh
==8318== and then give GDB the following command
==8318== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8318
==8318== --pid is optional if only one valgrind process is running
==8318==
--8318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8318==
==8318== HEAP SUMMARY:
==8318== in use at exit: 1,299,074 bytes in 27,998 blocks
==8318== total heap usage: 779,208 allocs, 751,210 frees, 46,054,228 bytes allocated
==8318==
==8318== Searching for pointers to 27,998 not-freed blocks
--8318-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8318-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8318-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8318-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8318-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8318-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8318-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8318-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8318-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8318-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8318-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8318-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8318-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8318-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8318-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8318-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8318-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8318-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8318-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8318-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8318-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8318-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8318-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8318-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8318-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8318-- Scanning root segment: 0x701a000..0x701afff (4096)
--8318-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8318-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8318-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8318-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8318-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8318-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8318-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8318== Checked 1,583,976 bytes
==8318==
==8318== LEAK SUMMARY:
==8318== definitely lost: 253 bytes in 4 blocks
==8318== indirectly lost: 6,756 bytes in 7 blocks
==8318== possibly lost: 0 bytes in 0 blocks
==8318== still reachable: 1,292,065 bytes in 27,987 blocks
==8318== suppressed: 0 bytes in 0 blocks
==8318== Rerun with --leak-check=full to see details of leaked memory
==8318==
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8318==
==8318== 1 errors in context 1 of 1:
==8318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8318== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8318== by 0x488CD0: stringsubst (subst.c:301)
==8318== by 0x48801B: prefork (subst.c:77)
==8318== by 0x42B318: execcmd (exec.c:2619)
==8318== by 0x428CA0: execpline2 (exec.c:1697)
==8318== by 0x427FD2: execpline (exec.c:1484)
==8318== by 0x427756: execlist (exec.c:1267)
==8318== by 0x42717C: execode (exec.c:1073)
==8318== by 0x431299: runshfunc (exec.c:5040)
==8318== by 0x430E76: doshfunc (exec.c:4920)
==8318== by 0x4302FB: execshfunc (exec.c:4557)
==8318== by 0x42D8C1: execcmd (exec.c:3373)
==8318==
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8319-- Caught __NR_exit; running __libc_freeres()
==8319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8319-by-pythonnut-on-???
==8319== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8319-by-pythonnut-on-???
==8319== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8319-by-pythonnut-on-???
==8319==
==8319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8319== don't want to do, unless you know exactly what you're doing,
==8319== or are doing some strange experiment):
==8319== /usr/lib/valgrind/../../bin/vgdb --pid=8319 ...command...
==8319==
==8319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8319== /path/to/gdb ./zsh
==8319== and then give GDB the following command
==8319== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8319
==8319== --pid is optional if only one valgrind process is running
==8319==
--8319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8319==
==8319== HEAP SUMMARY:
==8319== in use at exit: 1,299,164 bytes in 27,998 blocks
==8319== total heap usage: 779,314 allocs, 751,316 frees, 46,404,656 bytes allocated
==8319==
==8319== Searching for pointers to 27,998 not-freed blocks
--8319-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8319-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8319-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8319-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8319-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8319-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8319-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8319-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8319-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8319-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8319-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8319-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8319-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8319-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8319-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8319-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8319-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8319-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8319-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8319-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8319-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8319-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8319-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8319-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8319-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8319-- Scanning root segment: 0x701a000..0x701afff (4096)
--8319-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8319-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8319-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8319-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8319-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8319-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8319-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8319== Checked 1,584,064 bytes
==8319==
==8319== LEAK SUMMARY:
==8319== definitely lost: 253 bytes in 4 blocks
==8319== indirectly lost: 6,756 bytes in 7 blocks
==8319== possibly lost: 0 bytes in 0 blocks
==8319== still reachable: 1,292,155 bytes in 27,987 blocks
==8319== suppressed: 0 bytes in 0 blocks
==8319== Rerun with --leak-check=full to see details of leaked memory
==8319==
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8319==
==8319== 1 errors in context 1 of 1:
==8319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8319== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8319== by 0x488CD0: stringsubst (subst.c:301)
==8319== by 0x48801B: prefork (subst.c:77)
==8319== by 0x42B318: execcmd (exec.c:2619)
==8319== by 0x428CA0: execpline2 (exec.c:1697)
==8319== by 0x427FD2: execpline (exec.c:1484)
==8319== by 0x427756: execlist (exec.c:1267)
==8319== by 0x42717C: execode (exec.c:1073)
==8319== by 0x431299: runshfunc (exec.c:5040)
==8319== by 0x430E76: doshfunc (exec.c:4920)
==8319== by 0x4302FB: execshfunc (exec.c:4557)
==8319== by 0x42D8C1: execcmd (exec.c:3373)
==8319==
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8320-by-pythonnut-on-???
==8320== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8320-by-pythonnut-on-???
==8320== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8320-by-pythonnut-on-???
==8320==
==8320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8320== don't want to do, unless you know exactly what you're doing,
==8320== or are doing some strange experiment):
==8320== /usr/lib/valgrind/../../bin/vgdb --pid=8320 ...command...
==8320==
==8320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8320== /path/to/gdb ./zsh
==8320== and then give GDB the following command
==8320== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8320
==8320== --pid is optional if only one valgrind process is running
==8320==
--8320-- Caught __NR_exit; running __libc_freeres()
--8320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8320==
==8320== HEAP SUMMARY:
==8320== in use at exit: 1,299,092 bytes in 27,998 blocks
==8320== total heap usage: 779,420 allocs, 751,422 frees, 46,755,048 bytes allocated
==8320==
==8320== Searching for pointers to 27,998 not-freed blocks
--8320-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8320-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8320-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8320-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8320-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8320-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8320-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8320-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8320-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8320-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8320-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8320-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8320-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8320-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8320-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8320-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8320-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8320-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8320-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8320-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8320-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8320-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8320-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8320-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8320-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8320-- Scanning root segment: 0x701a000..0x701afff (4096)
--8320-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8320-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8320-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8320-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8320-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8320-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8320-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8320== Checked 1,583,992 bytes
==8320==
==8320== LEAK SUMMARY:
==8320== definitely lost: 253 bytes in 4 blocks
==8320== indirectly lost: 6,756 bytes in 7 blocks
==8320== possibly lost: 0 bytes in 0 blocks
==8320== still reachable: 1,292,083 bytes in 27,987 blocks
==8320== suppressed: 0 bytes in 0 blocks
==8320== Rerun with --leak-check=full to see details of leaked memory
==8320==
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320==
==8320== 1 errors in context 1 of 1:
==8320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8320== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8320== by 0x488CD0: stringsubst (subst.c:301)
==8320== by 0x48801B: prefork (subst.c:77)
==8320== by 0x42B318: execcmd (exec.c:2619)
==8320== by 0x428CA0: execpline2 (exec.c:1697)
==8320== by 0x427FD2: execpline (exec.c:1484)
==8320== by 0x427756: execlist (exec.c:1267)
==8320== by 0x42717C: execode (exec.c:1073)
==8320== by 0x431299: runshfunc (exec.c:5040)
==8320== by 0x430E76: doshfunc (exec.c:4920)
==8320== by 0x4302FB: execshfunc (exec.c:4557)
==8320== by 0x42D8C1: execcmd (exec.c:3373)
==8320==
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8321-- Caught __NR_exit; running __libc_freeres()
==8321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8321-by-pythonnut-on-???
==8321== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8321-by-pythonnut-on-???
==8321== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8321-by-pythonnut-on-???
==8321==
==8321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8321== don't want to do, unless you know exactly what you're doing,
==8321== or are doing some strange experiment):
==8321== /usr/lib/valgrind/../../bin/vgdb --pid=8321 ...command...
==8321==
==8321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8321== /path/to/gdb ./zsh
==8321== and then give GDB the following command
==8321== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8321
==8321== --pid is optional if only one valgrind process is running
==8321==
--8321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8321==
==8321== HEAP SUMMARY:
==8321== in use at exit: 1,299,092 bytes in 27,998 blocks
==8321== total heap usage: 779,526 allocs, 751,528 frees, 47,105,392 bytes allocated
==8321==
==8321== Searching for pointers to 27,998 not-freed blocks
--8321-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8321-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8321-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8321-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8321-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8321-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8321-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8321-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8321-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8321-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8321-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8321-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8321-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8321-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8321-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8321-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8321-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8321-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8321-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8321-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8321-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8321-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8321-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8321-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8321-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8321-- Scanning root segment: 0x701a000..0x701afff (4096)
--8321-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8321-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8321-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8321-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8321-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8321-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8321-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8321== Checked 1,583,992 bytes
==8321==
==8321== LEAK SUMMARY:
==8321== definitely lost: 253 bytes in 4 blocks
==8321== indirectly lost: 6,756 bytes in 7 blocks
==8321== possibly lost: 0 bytes in 0 blocks
==8321== still reachable: 1,292,083 bytes in 27,987 blocks
==8321== suppressed: 0 bytes in 0 blocks
==8321== Rerun with --leak-check=full to see details of leaked memory
==8321==
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8321==
==8321== 1 errors in context 1 of 1:
==8321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8321== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8321== by 0x488CD0: stringsubst (subst.c:301)
==8321== by 0x48801B: prefork (subst.c:77)
==8321== by 0x42B318: execcmd (exec.c:2619)
==8321== by 0x428CA0: execpline2 (exec.c:1697)
==8321== by 0x427FD2: execpline (exec.c:1484)
==8321== by 0x427756: execlist (exec.c:1267)
==8321== by 0x42717C: execode (exec.c:1073)
==8321== by 0x431299: runshfunc (exec.c:5040)
==8321== by 0x430E76: doshfunc (exec.c:4920)
==8321== by 0x4302FB: execshfunc (exec.c:4557)
==8321== by 0x42D8C1: execcmd (exec.c:3373)
==8321==
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8322-- Caught __NR_exit; running __libc_freeres()
==8322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8322-by-pythonnut-on-???
==8322== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8322-by-pythonnut-on-???
==8322== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8322-by-pythonnut-on-???
==8322==
==8322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8322== don't want to do, unless you know exactly what you're doing,
==8322== or are doing some strange experiment):
==8322== /usr/lib/valgrind/../../bin/vgdb --pid=8322 ...command...
==8322==
==8322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8322== /path/to/gdb ./zsh
==8322== and then give GDB the following command
==8322== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8322
==8322== --pid is optional if only one valgrind process is running
==8322==
--8322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8322==
==8322== HEAP SUMMARY:
==8322== in use at exit: 1,299,068 bytes in 27,998 blocks
==8322== total heap usage: 779,632 allocs, 751,634 frees, 47,455,718 bytes allocated
==8322==
==8322== Searching for pointers to 27,998 not-freed blocks
--8322-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8322-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8322-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8322-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8322-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8322-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8322-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8322-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8322-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8322-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8322-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8322-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8322-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8322-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8322-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8322-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8322-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8322-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8322-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8322-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8322-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8322-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8322-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8322-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8322-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8322-- Scanning root segment: 0x701a000..0x701afff (4096)
--8322-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8322-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8322-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8322-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8322-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8322-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8322-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8322== Checked 1,583,976 bytes
==8322==
==8322== LEAK SUMMARY:
==8322== definitely lost: 253 bytes in 4 blocks
==8322== indirectly lost: 6,756 bytes in 7 blocks
==8322== possibly lost: 0 bytes in 0 blocks
==8322== still reachable: 1,292,059 bytes in 27,987 blocks
==8322== suppressed: 0 bytes in 0 blocks
==8322== Rerun with --leak-check=full to see details of leaked memory
==8322==
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8322==
==8322== 1 errors in context 1 of 1:
==8322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8322== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8322== by 0x488CD0: stringsubst (subst.c:301)
==8322== by 0x48801B: prefork (subst.c:77)
==8322== by 0x42B318: execcmd (exec.c:2619)
==8322== by 0x428CA0: execpline2 (exec.c:1697)
==8322== by 0x427FD2: execpline (exec.c:1484)
==8322== by 0x427756: execlist (exec.c:1267)
==8322== by 0x42717C: execode (exec.c:1073)
==8322== by 0x431299: runshfunc (exec.c:5040)
==8322== by 0x430E76: doshfunc (exec.c:4920)
==8322== by 0x4302FB: execshfunc (exec.c:4557)
==8322== by 0x42D8C1: execcmd (exec.c:3373)
==8322==
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8323-- Caught __NR_exit; running __libc_freeres()
==8323== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8323-by-pythonnut-on-???
==8323== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8323-by-pythonnut-on-???
==8323== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8323-by-pythonnut-on-???
==8323==
==8323== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8323== don't want to do, unless you know exactly what you're doing,
==8323== or are doing some strange experiment):
==8323== /usr/lib/valgrind/../../bin/vgdb --pid=8323 ...command...
==8323==
==8323== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8323== /path/to/gdb ./zsh
==8323== and then give GDB the following command
==8323== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8323
==8323== --pid is optional if only one valgrind process is running
==8323==
--8323-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8323==
==8323== HEAP SUMMARY:
==8323== in use at exit: 1,299,140 bytes in 27,998 blocks
==8323== total heap usage: 779,738 allocs, 751,740 frees, 47,806,110 bytes allocated
==8323==
==8323== Searching for pointers to 27,998 not-freed blocks
--8323-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8323-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8323-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8323-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8323-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8323-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8323-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8323-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8323-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8323-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8323-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8323-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8323-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8323-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8323-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8323-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8323-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8323-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8323-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8323-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8323-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8323-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8323-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8323-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8323-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8323-- Scanning root segment: 0x701a000..0x701afff (4096)
--8323-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8323-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8323-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8323-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8323-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8323-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8323-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8323== Checked 1,584,040 bytes
==8323==
==8323== LEAK SUMMARY:
==8323== definitely lost: 253 bytes in 4 blocks
==8323== indirectly lost: 6,756 bytes in 7 blocks
==8323== possibly lost: 0 bytes in 0 blocks
==8323== still reachable: 1,292,131 bytes in 27,987 blocks
==8323== suppressed: 0 bytes in 0 blocks
==8323== Rerun with --leak-check=full to see details of leaked memory
==8323==
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8323==
==8323== 1 errors in context 1 of 1:
==8323== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8323== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8323== by 0x488CD0: stringsubst (subst.c:301)
==8323== by 0x48801B: prefork (subst.c:77)
==8323== by 0x42B318: execcmd (exec.c:2619)
==8323== by 0x428CA0: execpline2 (exec.c:1697)
==8323== by 0x427FD2: execpline (exec.c:1484)
==8323== by 0x427756: execlist (exec.c:1267)
==8323== by 0x42717C: execode (exec.c:1073)
==8323== by 0x431299: runshfunc (exec.c:5040)
==8323== by 0x430E76: doshfunc (exec.c:4920)
==8323== by 0x4302FB: execshfunc (exec.c:4557)
==8323== by 0x42D8C1: execcmd (exec.c:3373)
==8323==
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8324-- Caught __NR_exit; running __libc_freeres()
==8324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8324-by-pythonnut-on-???
==8324== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8324-by-pythonnut-on-???
==8324== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8324-by-pythonnut-on-???
==8324==
==8324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8324== don't want to do, unless you know exactly what you're doing,
==8324== or are doing some strange experiment):
==8324== /usr/lib/valgrind/../../bin/vgdb --pid=8324 ...command...
==8324==
==8324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8324== /path/to/gdb ./zsh
==8324== and then give GDB the following command
==8324== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8324
==8324== --pid is optional if only one valgrind process is running
==8324==
--8324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8324==
==8324== HEAP SUMMARY:
==8324== in use at exit: 1,299,134 bytes in 27,998 blocks
==8324== total heap usage: 779,844 allocs, 751,846 frees, 48,156,542 bytes allocated
==8324==
==8324== Searching for pointers to 27,998 not-freed blocks
--8324-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8324-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8324-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8324-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8324-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8324-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8324-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8324-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8324-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8324-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8324-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8324-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8324-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8324-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8324-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8324-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8324-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8324-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8324-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8324-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8324-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8324-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8324-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8324-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8324-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8324-- Scanning root segment: 0x701a000..0x701afff (4096)
--8324-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8324-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8324-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8324-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8324-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8324-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8324-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8324== Checked 1,584,040 bytes
==8324==
==8324== LEAK SUMMARY:
==8324== definitely lost: 253 bytes in 4 blocks
==8324== indirectly lost: 6,756 bytes in 7 blocks
==8324== possibly lost: 0 bytes in 0 blocks
==8324== still reachable: 1,292,125 bytes in 27,987 blocks
==8324== suppressed: 0 bytes in 0 blocks
==8324== Rerun with --leak-check=full to see details of leaked memory
==8324==
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8324==
==8324== 1 errors in context 1 of 1:
==8324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8324== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8324== by 0x488CD0: stringsubst (subst.c:301)
==8324== by 0x48801B: prefork (subst.c:77)
==8324== by 0x42B318: execcmd (exec.c:2619)
==8324== by 0x428CA0: execpline2 (exec.c:1697)
==8324== by 0x427FD2: execpline (exec.c:1484)
==8324== by 0x427756: execlist (exec.c:1267)
==8324== by 0x42717C: execode (exec.c:1073)
==8324== by 0x431299: runshfunc (exec.c:5040)
==8324== by 0x430E76: doshfunc (exec.c:4920)
==8324== by 0x4302FB: execshfunc (exec.c:4557)
==8324== by 0x42D8C1: execcmd (exec.c:3373)
==8324==
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8325-- Caught __NR_exit; running __libc_freeres()
==8325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8325-by-pythonnut-on-???
==8325== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8325-by-pythonnut-on-???
==8325== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8325-by-pythonnut-on-???
==8325==
==8325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8325== don't want to do, unless you know exactly what you're doing,
==8325== or are doing some strange experiment):
==8325== /usr/lib/valgrind/../../bin/vgdb --pid=8325 ...command...
==8325==
==8325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8325== /path/to/gdb ./zsh
==8325== and then give GDB the following command
==8325== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8325
==8325== --pid is optional if only one valgrind process is running
==8325==
--8325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8325==
==8325== HEAP SUMMARY:
==8325== in use at exit: 1,299,140 bytes in 27,998 blocks
==8325== total heap usage: 779,950 allocs, 751,952 frees, 48,506,978 bytes allocated
==8325==
==8325== Searching for pointers to 27,998 not-freed blocks
--8325-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8325-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8325-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8325-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8325-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8325-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8325-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8325-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8325-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8325-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8325-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8325-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8325-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8325-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8325-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8325-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8325-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8325-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8325-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8325-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8325-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8325-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8325-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8325-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8325-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8325-- Scanning root segment: 0x701a000..0x701afff (4096)
--8325-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8325-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8325-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8325-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8325-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8325-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8325-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8325== Checked 1,584,040 bytes
==8325==
==8325== LEAK SUMMARY:
==8325== definitely lost: 253 bytes in 4 blocks
==8325== indirectly lost: 6,756 bytes in 7 blocks
==8325== possibly lost: 0 bytes in 0 blocks
==8325== still reachable: 1,292,131 bytes in 27,987 blocks
==8325== suppressed: 0 bytes in 0 blocks
==8325== Rerun with --leak-check=full to see details of leaked memory
==8325==
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8325==
==8325== 1 errors in context 1 of 1:
==8325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8325== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8325== by 0x488CD0: stringsubst (subst.c:301)
==8325== by 0x48801B: prefork (subst.c:77)
==8325== by 0x42B318: execcmd (exec.c:2619)
==8325== by 0x428CA0: execpline2 (exec.c:1697)
==8325== by 0x427FD2: execpline (exec.c:1484)
==8325== by 0x427756: execlist (exec.c:1267)
==8325== by 0x42717C: execode (exec.c:1073)
==8325== by 0x431299: runshfunc (exec.c:5040)
==8325== by 0x430E76: doshfunc (exec.c:4920)
==8325== by 0x4302FB: execshfunc (exec.c:4557)
==8325== by 0x42D8C1: execcmd (exec.c:3373)
==8325==
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8326-- Caught __NR_exit; running __libc_freeres()
==8326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8326-by-pythonnut-on-???
==8326== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8326-by-pythonnut-on-???
==8326== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8326-by-pythonnut-on-???
==8326==
==8326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8326== don't want to do, unless you know exactly what you're doing,
==8326== or are doing some strange experiment):
==8326== /usr/lib/valgrind/../../bin/vgdb --pid=8326 ...command...
==8326==
==8326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8326== /path/to/gdb ./zsh
==8326== and then give GDB the following command
==8326== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8326
==8326== --pid is optional if only one valgrind process is running
==8326==
--8326-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8326==
==8326== HEAP SUMMARY:
==8326== in use at exit: 1,299,092 bytes in 27,998 blocks
==8326== total heap usage: 780,056 allocs, 752,058 frees, 48,857,368 bytes allocated
==8326==
==8326== Searching for pointers to 27,998 not-freed blocks
--8326-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8326-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8326-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8326-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8326-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8326-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8326-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8326-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8326-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8326-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8326-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8326-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8326-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8326-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8326-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8326-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8326-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8326-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8326-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8326-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8326-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8326-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8326-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8326-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8326-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8326-- Scanning root segment: 0x701a000..0x701afff (4096)
--8326-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8326-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8326-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8326-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8326-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8326-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8326-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8326== Checked 1,583,976 bytes
==8326==
==8326== LEAK SUMMARY:
==8326== definitely lost: 253 bytes in 4 blocks
==8326== indirectly lost: 6,756 bytes in 7 blocks
==8326== possibly lost: 0 bytes in 0 blocks
==8326== still reachable: 1,292,083 bytes in 27,987 blocks
==8326== suppressed: 0 bytes in 0 blocks
==8326== Rerun with --leak-check=full to see details of leaked memory
==8326==
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8326==
==8326== 1 errors in context 1 of 1:
==8326== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8326== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8326== by 0x488CD0: stringsubst (subst.c:301)
==8326== by 0x48801B: prefork (subst.c:77)
==8326== by 0x42B318: execcmd (exec.c:2619)
==8326== by 0x428CA0: execpline2 (exec.c:1697)
==8326== by 0x427FD2: execpline (exec.c:1484)
==8326== by 0x427756: execlist (exec.c:1267)
==8326== by 0x42717C: execode (exec.c:1073)
==8326== by 0x431299: runshfunc (exec.c:5040)
==8326== by 0x430E76: doshfunc (exec.c:4920)
==8326== by 0x4302FB: execshfunc (exec.c:4557)
==8326== by 0x42D8C1: execcmd (exec.c:3373)
==8326==
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8327-- Caught __NR_exit; running __libc_freeres()
==8327== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8327-by-pythonnut-on-???
==8327== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8327-by-pythonnut-on-???
==8327== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8327-by-pythonnut-on-???
==8327==
==8327== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8327== don't want to do, unless you know exactly what you're doing,
==8327== or are doing some strange experiment):
==8327== /usr/lib/valgrind/../../bin/vgdb --pid=8327 ...command...
==8327==
==8327== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8327== /path/to/gdb ./zsh
==8327== and then give GDB the following command
==8327== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8327
==8327== --pid is optional if only one valgrind process is running
==8327==
--8327-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8327==
==8327== HEAP SUMMARY:
==8327== in use at exit: 1,299,146 bytes in 27,998 blocks
==8327== total heap usage: 780,162 allocs, 752,164 frees, 49,207,784 bytes allocated
==8327==
==8327== Searching for pointers to 27,998 not-freed blocks
--8327-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8327-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8327-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8327-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8327-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8327-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8327-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8327-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8327-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8327-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8327-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8327-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8327-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8327-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8327-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8327-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8327-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8327-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8327-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8327-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8327-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8327-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8327-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8327-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8327-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8327-- Scanning root segment: 0x701a000..0x701afff (4096)
--8327-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8327-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8327-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8327-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8327-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8327-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8327-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8327== Checked 1,584,048 bytes
==8327==
==8327== LEAK SUMMARY:
==8327== definitely lost: 253 bytes in 4 blocks
==8327== indirectly lost: 6,756 bytes in 7 blocks
==8327== possibly lost: 0 bytes in 0 blocks
==8327== still reachable: 1,292,137 bytes in 27,987 blocks
==8327== suppressed: 0 bytes in 0 blocks
==8327== Rerun with --leak-check=full to see details of leaked memory
==8327==
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8327==
==8327== 1 errors in context 1 of 1:
==8327== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8327== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8327== by 0x488CD0: stringsubst (subst.c:301)
==8327== by 0x48801B: prefork (subst.c:77)
==8327== by 0x42B318: execcmd (exec.c:2619)
==8327== by 0x428CA0: execpline2 (exec.c:1697)
==8327== by 0x427FD2: execpline (exec.c:1484)
==8327== by 0x427756: execlist (exec.c:1267)
==8327== by 0x42717C: execode (exec.c:1073)
==8327== by 0x431299: runshfunc (exec.c:5040)
==8327== by 0x430E76: doshfunc (exec.c:4920)
==8327== by 0x4302FB: execshfunc (exec.c:4557)
==8327== by 0x42D8C1: execcmd (exec.c:3373)
==8327==
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8328-by-pythonnut-on-???
==8328== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8328-by-pythonnut-on-???
==8328== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8328-by-pythonnut-on-???
==8328==
==8328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8328== don't want to do, unless you know exactly what you're doing,
==8328== or are doing some strange experiment):
==8328== /usr/lib/valgrind/../../bin/vgdb --pid=8328 ...command...
==8328==
==8328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8328== /path/to/gdb ./zsh
==8328== and then give GDB the following command
==8328== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8328
==8328== --pid is optional if only one valgrind process is running
==8328==
--8328-- Caught __NR_exit; running __libc_freeres()
--8328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8328==
==8328== HEAP SUMMARY:
==8328== in use at exit: 1,299,080 bytes in 27,998 blocks
==8328== total heap usage: 780,268 allocs, 752,270 frees, 49,558,162 bytes allocated
==8328==
==8328== Searching for pointers to 27,998 not-freed blocks
--8328-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8328-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8328-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8328-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8328-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8328-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8328-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8328-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8328-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8328-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8328-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8328-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8328-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8328-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8328-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8328-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8328-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8328-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8328-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8328-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8328-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8328-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8328-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8328-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8328-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8328-- Scanning root segment: 0x701a000..0x701afff (4096)
--8328-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8328-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8328-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8328-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8328-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8328-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8328-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8328== Checked 1,583,968 bytes
==8328==
==8328== LEAK SUMMARY:
==8328== definitely lost: 253 bytes in 4 blocks
==8328== indirectly lost: 6,756 bytes in 7 blocks
==8328== possibly lost: 0 bytes in 0 blocks
==8328== still reachable: 1,292,071 bytes in 27,987 blocks
==8328== suppressed: 0 bytes in 0 blocks
==8328== Rerun with --leak-check=full to see details of leaked memory
==8328==
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328==
==8328== 1 errors in context 1 of 1:
==8328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8328== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8328== by 0x488CD0: stringsubst (subst.c:301)
==8328== by 0x48801B: prefork (subst.c:77)
==8328== by 0x42B318: execcmd (exec.c:2619)
==8328== by 0x428CA0: execpline2 (exec.c:1697)
==8328== by 0x427FD2: execpline (exec.c:1484)
==8328== by 0x427756: execlist (exec.c:1267)
==8328== by 0x42717C: execode (exec.c:1073)
==8328== by 0x431299: runshfunc (exec.c:5040)
==8328== by 0x430E76: doshfunc (exec.c:4920)
==8328== by 0x4302FB: execshfunc (exec.c:4557)
==8328== by 0x42D8C1: execcmd (exec.c:3373)
==8328==
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8329-by-pythonnut-on-???
==8329== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8329-by-pythonnut-on-???
==8329== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8329-by-pythonnut-on-???
==8329==
==8329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8329== don't want to do, unless you know exactly what you're doing,
==8329== or are doing some strange experiment):
==8329== /usr/lib/valgrind/../../bin/vgdb --pid=8329 ...command...
==8329==
==8329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8329== /path/to/gdb ./zsh
==8329== and then give GDB the following command
==8329== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8329
==8329== --pid is optional if only one valgrind process is running
==8329==
--8329-- Caught __NR_exit; running __libc_freeres()
--8329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8329==
==8329== HEAP SUMMARY:
==8329== in use at exit: 1,299,086 bytes in 27,998 blocks
==8329== total heap usage: 780,374 allocs, 752,376 frees, 49,908,490 bytes allocated
==8329==
==8329== Searching for pointers to 27,998 not-freed blocks
--8329-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8329-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8329-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8329-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8329-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8329-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8329-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8329-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8329-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8329-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8329-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8329-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8329-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8329-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8329-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8329-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8329-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8329-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8329-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8329-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8329-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8329-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8329-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8329-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8329-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8329-- Scanning root segment: 0x701a000..0x701afff (4096)
--8329-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8329-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8329-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8329-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8329-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8329-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8329-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8329== Checked 1,583,968 bytes
==8329==
==8329== LEAK SUMMARY:
==8329== definitely lost: 253 bytes in 4 blocks
==8329== indirectly lost: 6,756 bytes in 7 blocks
==8329== possibly lost: 0 bytes in 0 blocks
==8329== still reachable: 1,292,077 bytes in 27,987 blocks
==8329== suppressed: 0 bytes in 0 blocks
==8329== Rerun with --leak-check=full to see details of leaked memory
==8329==
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329==
==8329== 1 errors in context 1 of 1:
==8329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8329== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8329== by 0x488CD0: stringsubst (subst.c:301)
==8329== by 0x48801B: prefork (subst.c:77)
==8329== by 0x42B318: execcmd (exec.c:2619)
==8329== by 0x428CA0: execpline2 (exec.c:1697)
==8329== by 0x427FD2: execpline (exec.c:1484)
==8329== by 0x427756: execlist (exec.c:1267)
==8329== by 0x42717C: execode (exec.c:1073)
==8329== by 0x431299: runshfunc (exec.c:5040)
==8329== by 0x430E76: doshfunc (exec.c:4920)
==8329== by 0x4302FB: execshfunc (exec.c:4557)
==8329== by 0x42D8C1: execcmd (exec.c:3373)
==8329==
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8330-- Caught __NR_exit; running __libc_freeres()
==8330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8330-by-pythonnut-on-???
==8330== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8330-by-pythonnut-on-???
==8330== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8330-by-pythonnut-on-???
==8330==
==8330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8330== don't want to do, unless you know exactly what you're doing,
==8330== or are doing some strange experiment):
==8330== /usr/lib/valgrind/../../bin/vgdb --pid=8330 ...command...
==8330==
==8330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8330== /path/to/gdb ./zsh
==8330== and then give GDB the following command
==8330== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8330
==8330== --pid is optional if only one valgrind process is running
==8330==
--8330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8330==
==8330== HEAP SUMMARY:
==8330== in use at exit: 1,299,068 bytes in 27,998 blocks
==8330== total heap usage: 780,480 allocs, 752,482 frees, 50,258,812 bytes allocated
==8330==
==8330== Searching for pointers to 27,998 not-freed blocks
--8330-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8330-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8330-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8330-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8330-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8330-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8330-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8330-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8330-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8330-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8330-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8330-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8330-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8330-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8330-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8330-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8330-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8330-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8330-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8330-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8330-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8330-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8330-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8330-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8330-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8330-- Scanning root segment: 0x701a000..0x701afff (4096)
--8330-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8330-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8330-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8330-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8330-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8330-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8330-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8330== Checked 1,583,944 bytes
==8330==
==8330== LEAK SUMMARY:
==8330== definitely lost: 253 bytes in 4 blocks
==8330== indirectly lost: 6,756 bytes in 7 blocks
==8330== possibly lost: 0 bytes in 0 blocks
==8330== still reachable: 1,292,059 bytes in 27,987 blocks
==8330== suppressed: 0 bytes in 0 blocks
==8330== Rerun with --leak-check=full to see details of leaked memory
==8330==
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8330==
==8330== 1 errors in context 1 of 1:
==8330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8330== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8330== by 0x488CD0: stringsubst (subst.c:301)
==8330== by 0x48801B: prefork (subst.c:77)
==8330== by 0x42B318: execcmd (exec.c:2619)
==8330== by 0x428CA0: execpline2 (exec.c:1697)
==8330== by 0x427FD2: execpline (exec.c:1484)
==8330== by 0x427756: execlist (exec.c:1267)
==8330== by 0x42717C: execode (exec.c:1073)
==8330== by 0x431299: runshfunc (exec.c:5040)
==8330== by 0x430E76: doshfunc (exec.c:4920)
==8330== by 0x4302FB: execshfunc (exec.c:4557)
==8330== by 0x42D8C1: execcmd (exec.c:3373)
==8330==
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8331-by-pythonnut-on-???
==8331== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8331-by-pythonnut-on-???
==8331== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8331-by-pythonnut-on-???
==8331==
==8331== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8331== don't want to do, unless you know exactly what you're doing,
==8331== or are doing some strange experiment):
==8331== /usr/lib/valgrind/../../bin/vgdb --pid=8331 ...command...
==8331==
==8331== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8331== /path/to/gdb ./zsh
==8331== and then give GDB the following command
==8331== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8331
==8331== --pid is optional if only one valgrind process is running
==8331==
--8331-- Caught __NR_exit; running __libc_freeres()
--8331-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8331==
==8331== HEAP SUMMARY:
==8331== in use at exit: 1,299,086 bytes in 27,998 blocks
==8331== total heap usage: 780,586 allocs, 752,588 frees, 50,609,146 bytes allocated
==8331==
==8331== Searching for pointers to 27,998 not-freed blocks
--8331-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8331-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8331-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8331-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8331-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8331-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8331-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8331-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8331-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8331-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8331-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8331-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8331-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8331-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8331-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8331-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8331-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8331-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8331-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8331-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8331-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8331-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8331-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8331-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8331-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8331-- Scanning root segment: 0x701a000..0x701afff (4096)
--8331-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8331-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8331-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8331-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8331-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8331-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8331-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8331== Checked 1,583,968 bytes
==8331==
==8331== LEAK SUMMARY:
==8331== definitely lost: 253 bytes in 4 blocks
==8331== indirectly lost: 6,756 bytes in 7 blocks
==8331== possibly lost: 0 bytes in 0 blocks
==8331== still reachable: 1,292,077 bytes in 27,987 blocks
==8331== suppressed: 0 bytes in 0 blocks
==8331== Rerun with --leak-check=full to see details of leaked memory
==8331==
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331==
==8331== 1 errors in context 1 of 1:
==8331== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8331== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8331== by 0x488CD0: stringsubst (subst.c:301)
==8331== by 0x48801B: prefork (subst.c:77)
==8331== by 0x42B318: execcmd (exec.c:2619)
==8331== by 0x428CA0: execpline2 (exec.c:1697)
==8331== by 0x427FD2: execpline (exec.c:1484)
==8331== by 0x427756: execlist (exec.c:1267)
==8331== by 0x42717C: execode (exec.c:1073)
==8331== by 0x431299: runshfunc (exec.c:5040)
==8331== by 0x430E76: doshfunc (exec.c:4920)
==8331== by 0x4302FB: execshfunc (exec.c:4557)
==8331== by 0x42D8C1: execcmd (exec.c:3373)
==8331==
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8332-by-pythonnut-on-???
==8332== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8332-by-pythonnut-on-???
==8332== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8332-by-pythonnut-on-???
==8332==
==8332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8332== don't want to do, unless you know exactly what you're doing,
==8332== or are doing some strange experiment):
==8332== /usr/lib/valgrind/../../bin/vgdb --pid=8332 ...command...
==8332==
==8332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8332== /path/to/gdb ./zsh
==8332== and then give GDB the following command
==8332== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8332
==8332== --pid is optional if only one valgrind process is running
==8332==
--8332-- Caught __NR_exit; running __libc_freeres()
--8332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8332==
==8332== HEAP SUMMARY:
==8332== in use at exit: 1,299,062 bytes in 27,998 blocks
==8332== total heap usage: 780,692 allocs, 752,694 frees, 50,959,446 bytes allocated
==8332==
==8332== Searching for pointers to 27,998 not-freed blocks
--8332-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8332-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8332-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8332-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8332-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8332-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8332-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8332-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8332-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8332-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8332-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8332-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8332-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8332-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8332-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8332-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8332-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8332-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8332-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8332-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8332-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8332-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8332-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8332-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8332-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8332-- Scanning root segment: 0x701a000..0x701afff (4096)
--8332-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8332-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8332-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8332-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8332-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8332-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8332-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8332== Checked 1,583,976 bytes
==8332==
==8332== LEAK SUMMARY:
==8332== definitely lost: 253 bytes in 4 blocks
==8332== indirectly lost: 6,756 bytes in 7 blocks
==8332== possibly lost: 0 bytes in 0 blocks
==8332== still reachable: 1,292,053 bytes in 27,987 blocks
==8332== suppressed: 0 bytes in 0 blocks
==8332== Rerun with --leak-check=full to see details of leaked memory
==8332==
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332==
==8332== 1 errors in context 1 of 1:
==8332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8332== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8332== by 0x488CD0: stringsubst (subst.c:301)
==8332== by 0x48801B: prefork (subst.c:77)
==8332== by 0x42B318: execcmd (exec.c:2619)
==8332== by 0x428CA0: execpline2 (exec.c:1697)
==8332== by 0x427FD2: execpline (exec.c:1484)
==8332== by 0x427756: execlist (exec.c:1267)
==8332== by 0x42717C: execode (exec.c:1073)
==8332== by 0x431299: runshfunc (exec.c:5040)
==8332== by 0x430E76: doshfunc (exec.c:4920)
==8332== by 0x4302FB: execshfunc (exec.c:4557)
==8332== by 0x42D8C1: execcmd (exec.c:3373)
==8332==
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8333-- Caught __NR_exit; running __libc_freeres()
==8333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8333-by-pythonnut-on-???
==8333== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8333-by-pythonnut-on-???
==8333== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8333-by-pythonnut-on-???
==8333==
==8333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8333== don't want to do, unless you know exactly what you're doing,
==8333== or are doing some strange experiment):
==8333== /usr/lib/valgrind/../../bin/vgdb --pid=8333 ...command...
==8333==
==8333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8333== /path/to/gdb ./zsh
==8333== and then give GDB the following command
==8333== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8333
==8333== --pid is optional if only one valgrind process is running
==8333==
--8333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8333==
==8333== HEAP SUMMARY:
==8333== in use at exit: 1,299,086 bytes in 27,998 blocks
==8333== total heap usage: 780,798 allocs, 752,800 frees, 51,309,762 bytes allocated
==8333==
==8333== Searching for pointers to 27,998 not-freed blocks
--8333-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8333-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8333-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8333-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8333-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8333-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8333-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8333-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8333-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8333-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8333-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8333-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8333-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8333-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8333-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8333-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8333-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8333-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8333-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8333-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8333-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8333-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8333-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8333-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8333-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8333-- Scanning root segment: 0x701a000..0x701afff (4096)
--8333-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8333-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8333-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8333-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8333-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8333-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8333-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8333== Checked 1,584,000 bytes
==8333==
==8333== LEAK SUMMARY:
==8333== definitely lost: 253 bytes in 4 blocks
==8333== indirectly lost: 6,756 bytes in 7 blocks
==8333== possibly lost: 0 bytes in 0 blocks
==8333== still reachable: 1,292,077 bytes in 27,987 blocks
==8333== suppressed: 0 bytes in 0 blocks
==8333== Rerun with --leak-check=full to see details of leaked memory
==8333==
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8333==
==8333== 1 errors in context 1 of 1:
==8333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8333== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8333== by 0x488CD0: stringsubst (subst.c:301)
==8333== by 0x48801B: prefork (subst.c:77)
==8333== by 0x42B318: execcmd (exec.c:2619)
==8333== by 0x428CA0: execpline2 (exec.c:1697)
==8333== by 0x427FD2: execpline (exec.c:1484)
==8333== by 0x427756: execlist (exec.c:1267)
==8333== by 0x42717C: execode (exec.c:1073)
==8333== by 0x431299: runshfunc (exec.c:5040)
==8333== by 0x430E76: doshfunc (exec.c:4920)
==8333== by 0x4302FB: execshfunc (exec.c:4557)
==8333== by 0x42D8C1: execcmd (exec.c:3373)
==8333==
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8334-by-pythonnut-on-???
==8334== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8334-by-pythonnut-on-???
==8334== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8334-by-pythonnut-on-???
==8334==
==8334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8334== don't want to do, unless you know exactly what you're doing,
==8334== or are doing some strange experiment):
==8334== /usr/lib/valgrind/../../bin/vgdb --pid=8334 ...command...
==8334==
==8334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8334== /path/to/gdb ./zsh
==8334== and then give GDB the following command
==8334== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8334
==8334== --pid is optional if only one valgrind process is running
==8334==
--8334-- Caught __NR_exit; running __libc_freeres()
--8334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8334==
==8334== HEAP SUMMARY:
==8334== in use at exit: 1,299,080 bytes in 27,998 blocks
==8334== total heap usage: 780,904 allocs, 752,906 frees, 51,660,100 bytes allocated
==8334==
==8334== Searching for pointers to 27,998 not-freed blocks
--8334-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8334-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8334-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8334-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8334-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8334-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8334-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8334-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8334-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8334-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8334-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8334-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8334-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8334-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8334-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8334-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8334-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8334-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8334-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8334-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8334-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8334-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8334-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8334-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8334-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8334-- Scanning root segment: 0x701a000..0x701afff (4096)
--8334-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8334-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8334-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8334-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8334-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8334-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8334-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8334== Checked 1,584,000 bytes
==8334==
==8334== LEAK SUMMARY:
==8334== definitely lost: 253 bytes in 4 blocks
==8334== indirectly lost: 6,756 bytes in 7 blocks
==8334== possibly lost: 0 bytes in 0 blocks
==8334== still reachable: 1,292,071 bytes in 27,987 blocks
==8334== suppressed: 0 bytes in 0 blocks
==8334== Rerun with --leak-check=full to see details of leaked memory
==8334==
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334==
==8334== 1 errors in context 1 of 1:
==8334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8334== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8334== by 0x488CD0: stringsubst (subst.c:301)
==8334== by 0x48801B: prefork (subst.c:77)
==8334== by 0x42B318: execcmd (exec.c:2619)
==8334== by 0x428CA0: execpline2 (exec.c:1697)
==8334== by 0x427FD2: execpline (exec.c:1484)
==8334== by 0x427756: execlist (exec.c:1267)
==8334== by 0x42717C: execode (exec.c:1073)
==8334== by 0x431299: runshfunc (exec.c:5040)
==8334== by 0x430E76: doshfunc (exec.c:4920)
==8334== by 0x4302FB: execshfunc (exec.c:4557)
==8334== by 0x42D8C1: execcmd (exec.c:3373)
==8334==
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8335-by-pythonnut-on-???
==8335== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8335-by-pythonnut-on-???
==8335== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8335-by-pythonnut-on-???
==8335==
==8335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8335== don't want to do, unless you know exactly what you're doing,
==8335== or are doing some strange experiment):
==8335== /usr/lib/valgrind/../../bin/vgdb --pid=8335 ...command...
==8335==
==8335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8335== /path/to/gdb ./zsh
==8335== and then give GDB the following command
==8335== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8335
==8335== --pid is optional if only one valgrind process is running
==8335==
--8335-- Caught __NR_exit; running __libc_freeres()
--8335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8335==
==8335== HEAP SUMMARY:
==8335== in use at exit: 1,299,080 bytes in 27,998 blocks
==8335== total heap usage: 781,010 allocs, 753,012 frees, 52,010,420 bytes allocated
==8335==
==8335== Searching for pointers to 27,998 not-freed blocks
--8335-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8335-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8335-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8335-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8335-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8335-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8335-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8335-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8335-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8335-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8335-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8335-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8335-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8335-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8335-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8335-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8335-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8335-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8335-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8335-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8335-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8335-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8335-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8335-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8335-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8335-- Scanning root segment: 0x701a000..0x701afff (4096)
--8335-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8335-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8335-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8335-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8335-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8335-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8335-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8335== Checked 1,584,000 bytes
==8335==
==8335== LEAK SUMMARY:
==8335== definitely lost: 253 bytes in 4 blocks
==8335== indirectly lost: 6,756 bytes in 7 blocks
==8335== possibly lost: 0 bytes in 0 blocks
==8335== still reachable: 1,292,071 bytes in 27,987 blocks
==8335== suppressed: 0 bytes in 0 blocks
==8335== Rerun with --leak-check=full to see details of leaked memory
==8335==
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335==
==8335== 1 errors in context 1 of 1:
==8335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8335== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8335== by 0x488CD0: stringsubst (subst.c:301)
==8335== by 0x48801B: prefork (subst.c:77)
==8335== by 0x42B318: execcmd (exec.c:2619)
==8335== by 0x428CA0: execpline2 (exec.c:1697)
==8335== by 0x427FD2: execpline (exec.c:1484)
==8335== by 0x427756: execlist (exec.c:1267)
==8335== by 0x42717C: execode (exec.c:1073)
==8335== by 0x431299: runshfunc (exec.c:5040)
==8335== by 0x430E76: doshfunc (exec.c:4920)
==8335== by 0x4302FB: execshfunc (exec.c:4557)
==8335== by 0x42D8C1: execcmd (exec.c:3373)
==8335==
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8336-- Caught __NR_exit; running __libc_freeres()
==8336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8336-by-pythonnut-on-???
==8336== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8336-by-pythonnut-on-???
==8336== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8336-by-pythonnut-on-???
==8336==
==8336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8336== don't want to do, unless you know exactly what you're doing,
==8336== or are doing some strange experiment):
==8336== /usr/lib/valgrind/../../bin/vgdb --pid=8336 ...command...
==8336==
==8336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8336== /path/to/gdb ./zsh
==8336== and then give GDB the following command
==8336== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8336
==8336== --pid is optional if only one valgrind process is running
==8336==
--8336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8336==
==8336== HEAP SUMMARY:
==8336== in use at exit: 1,299,098 bytes in 27,998 blocks
==8336== total heap usage: 781,116 allocs, 753,118 frees, 52,360,764 bytes allocated
==8336==
==8336== Searching for pointers to 27,998 not-freed blocks
--8336-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8336-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8336-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8336-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8336-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8336-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8336-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8336-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8336-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8336-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8336-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8336-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8336-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8336-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8336-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8336-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8336-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8336-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8336-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8336-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8336-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8336-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8336-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8336-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8336-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8336-- Scanning root segment: 0x701a000..0x701afff (4096)
--8336-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8336-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8336-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8336-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8336-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8336-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8336-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8336== Checked 1,584,000 bytes
==8336==
==8336== LEAK SUMMARY:
==8336== definitely lost: 253 bytes in 4 blocks
==8336== indirectly lost: 6,756 bytes in 7 blocks
==8336== possibly lost: 0 bytes in 0 blocks
==8336== still reachable: 1,292,089 bytes in 27,987 blocks
==8336== suppressed: 0 bytes in 0 blocks
==8336== Rerun with --leak-check=full to see details of leaked memory
==8336==
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8336==
==8336== 1 errors in context 1 of 1:
==8336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8336== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8336== by 0x488CD0: stringsubst (subst.c:301)
==8336== by 0x48801B: prefork (subst.c:77)
==8336== by 0x42B318: execcmd (exec.c:2619)
==8336== by 0x428CA0: execpline2 (exec.c:1697)
==8336== by 0x427FD2: execpline (exec.c:1484)
==8336== by 0x427756: execlist (exec.c:1267)
==8336== by 0x42717C: execode (exec.c:1073)
==8336== by 0x431299: runshfunc (exec.c:5040)
==8336== by 0x430E76: doshfunc (exec.c:4920)
==8336== by 0x4302FB: execshfunc (exec.c:4557)
==8336== by 0x42D8C1: execcmd (exec.c:3373)
==8336==
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8337-by-pythonnut-on-???
==8337== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8337-by-pythonnut-on-???
==8337== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8337-by-pythonnut-on-???
==8337==
==8337== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8337== don't want to do, unless you know exactly what you're doing,
==8337== or are doing some strange experiment):
==8337== /usr/lib/valgrind/../../bin/vgdb --pid=8337 ...command...
==8337==
==8337== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8337== /path/to/gdb ./zsh
==8337== and then give GDB the following command
==8337== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8337
==8337== --pid is optional if only one valgrind process is running
==8337==
--8337-- Caught __NR_exit; running __libc_freeres()
--8337-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8337==
==8337== HEAP SUMMARY:
==8337== in use at exit: 1,299,104 bytes in 27,998 blocks
==8337== total heap usage: 781,222 allocs, 753,224 frees, 52,711,128 bytes allocated
==8337==
==8337== Searching for pointers to 27,998 not-freed blocks
--8337-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8337-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8337-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8337-- Scanning root segment: 0x402e000..0x4031fff (16384)
--8337-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8337-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8337-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8337-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8337-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8337-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8337-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8337-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8337-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8337-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8337-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8337-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8337-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8337-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8337-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8337-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8337-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8337-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8337-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8337-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8337-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8337-- Scanning root segment: 0x701a000..0x701afff (4096)
--8337-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8337-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8337-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8337-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8337-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8337-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8337-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8337== Checked 1,584,024 bytes
==8337==
==8337== LEAK SUMMARY:
==8337== definitely lost: 253 bytes in 4 blocks
==8337== indirectly lost: 6,756 bytes in 7 blocks
==8337== possibly lost: 0 bytes in 0 blocks
==8337== still reachable: 1,292,095 bytes in 27,987 blocks
==8337== suppressed: 0 bytes in 0 blocks
==8337== Rerun with --leak-check=full to see details of leaked memory
==8337==
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337==
==8337== 1 errors in context 1 of 1:
==8337== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8337== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8337== by 0x488CD0: stringsubst (subst.c:301)
==8337== by 0x48801B: prefork (subst.c:77)
==8337== by 0x42B318: execcmd (exec.c:2619)
==8337== by 0x428CA0: execpline2 (exec.c:1697)
==8337== by 0x427FD2: execpline (exec.c:1484)
==8337== by 0x427756: execlist (exec.c:1267)
==8337== by 0x42717C: execode (exec.c:1073)
==8337== by 0x431299: runshfunc (exec.c:5040)
==8337== by 0x430E76: doshfunc (exec.c:4920)
==8337== by 0x4302FB: execshfunc (exec.c:4557)
==8337== by 0x42D8C1: execcmd (exec.c:3373)
==8337==
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFFDD5C, len 4
client request: code 4d430005, addr 0xFFEFFDC0C, len 4
--8339-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF32CC, len 4
==8339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8339-by-pythonnut-on-???
==8339== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8339-by-pythonnut-on-???
==8339== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8339-by-pythonnut-on-???
==8339==
==8339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8339== don't want to do, unless you know exactly what you're doing,
==8339== or are doing some strange experiment):
==8339== /usr/lib/valgrind/../../bin/vgdb --pid=8339 ...command...
==8339==
==8339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8339== /path/to/gdb ./zsh
==8339== and then give GDB the following command
==8339== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8339
==8339== --pid is optional if only one valgrind process is running
==8339==
--8339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8339==
==8339== HEAP SUMMARY:
==8339== in use at exit: 1,357,496 bytes in 28,690 blocks
==8339== total heap usage: 786,800 allocs, 758,110 frees, 54,157,849 bytes allocated
==8339==
==8339== Searching for pointers to 28,690 not-freed blocks
--8339-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8339-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8339-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8339-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8339-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8339-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8339-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8339-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8339-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8339-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8339-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8339-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8339-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8339-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8339-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8339-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8339-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8339-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8339-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8339-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8339-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8339-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8339-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8339-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8339-- Scanning root segment: 0x701a000..0x701afff (4096)
--8339-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8339-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8339-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8339-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8339-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8339-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8339-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8339== Checked 1,615,192 bytes
==8339==
==8339== LEAK SUMMARY:
==8339== definitely lost: 253 bytes in 4 blocks
==8339== indirectly lost: 6,756 bytes in 7 blocks
==8339== possibly lost: 0 bytes in 0 blocks
==8339== still reachable: 1,350,487 bytes in 28,679 blocks
==8339== suppressed: 0 bytes in 0 blocks
==8339== Rerun with --leak-check=full to see details of leaked memory
==8339==
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8339==
==8339== 1 errors in context 1 of 1:
==8339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8339== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8339== by 0x488CD0: stringsubst (subst.c:301)
==8339== by 0x48801B: prefork (subst.c:77)
==8339== by 0x42B318: execcmd (exec.c:2619)
==8339== by 0x428CA0: execpline2 (exec.c:1697)
==8339== by 0x427FD2: execpline (exec.c:1484)
==8339== by 0x427756: execlist (exec.c:1267)
==8339== by 0x42717C: execode (exec.c:1073)
==8339== by 0x431299: runshfunc (exec.c:5040)
==8339== by 0x430E76: doshfunc (exec.c:4920)
==8339== by 0x4302FB: execshfunc (exec.c:4557)
==8339== by 0x42D8C1: execcmd (exec.c:3373)
==8339==
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8338-- Caught __NR_exit; running __libc_freeres()
==8338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8338-by-pythonnut-on-???
==8338== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8338-by-pythonnut-on-???
==8338== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8338-by-pythonnut-on-???
==8338==
==8338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8338== don't want to do, unless you know exactly what you're doing,
==8338== or are doing some strange experiment):
==8338== /usr/lib/valgrind/../../bin/vgdb --pid=8338 ...command...
==8338==
==8338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8338== /path/to/gdb ./zsh
==8338== and then give GDB the following command
==8338== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8338
==8338== --pid is optional if only one valgrind process is running
==8338==
--8338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8338==
==8338== HEAP SUMMARY:
==8338== in use at exit: 1,357,432 bytes in 28,687 blocks
==8338== total heap usage: 786,798 allocs, 758,111 frees, 54,157,608 bytes allocated
==8338==
==8338== Searching for pointers to 28,687 not-freed blocks
--8338-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8338-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8338-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8338-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8338-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8338-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8338-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8338-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8338-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8338-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8338-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8338-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8338-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8338-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8338-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8338-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8338-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8338-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8338-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8338-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8338-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8338-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8338-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8338-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8338-- Scanning root segment: 0x701a000..0x701afff (4096)
--8338-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8338-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8338-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8338-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8338-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8338-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8338-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8338== Checked 1,614,504 bytes
==8338==
==8338== LEAK SUMMARY:
==8338== definitely lost: 253 bytes in 4 blocks
==8338== indirectly lost: 6,756 bytes in 7 blocks
==8338== possibly lost: 0 bytes in 0 blocks
==8338== still reachable: 1,350,423 bytes in 28,676 blocks
==8338== suppressed: 0 bytes in 0 blocks
==8338== Rerun with --leak-check=full to see details of leaked memory
==8338==
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8338==
==8338== 1 errors in context 1 of 1:
==8338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8338== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8338== by 0x488CD0: stringsubst (subst.c:301)
==8338== by 0x48801B: prefork (subst.c:77)
==8338== by 0x42B318: execcmd (exec.c:2619)
==8338== by 0x428CA0: execpline2 (exec.c:1697)
==8338== by 0x427FD2: execpline (exec.c:1484)
==8338== by 0x427756: execlist (exec.c:1267)
==8338== by 0x42717C: execode (exec.c:1073)
==8338== by 0x431299: runshfunc (exec.c:5040)
==8338== by 0x430E76: doshfunc (exec.c:4920)
==8338== by 0x4302FB: execshfunc (exec.c:4557)
==8338== by 0x42D8C1: execcmd (exec.c:3373)
==8338==
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8341-by-pythonnut-on-???
==8341== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8341-by-pythonnut-on-???
==8341== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8341-by-pythonnut-on-???
==8341==
==8341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8341== don't want to do, unless you know exactly what you're doing,
==8341== or are doing some strange experiment):
==8341== /usr/lib/valgrind/../../bin/vgdb --pid=8341 ...command...
==8341==
==8341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8341== /path/to/gdb ./zsh
==8341== and then give GDB the following command
==8341== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8341
==8341== --pid is optional if only one valgrind process is running
==8341==
--8341-- Caught __NR_exit; running __libc_freeres()
--8341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8341==
==8341== HEAP SUMMARY:
==8341== in use at exit: 1,357,439 bytes in 28,687 blocks
==8341== total heap usage: 786,813 allocs, 758,126 frees, 54,162,606 bytes allocated
==8341==
==8341== Searching for pointers to 28,687 not-freed blocks
--8341-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8341-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8341-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8341-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8341-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8341-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8341-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8341-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8341-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8341-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8341-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8341-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8341-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8341-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8341-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8341-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8341-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8341-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8341-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8341-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8341-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8341-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8341-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8341-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8341-- Scanning root segment: 0x701a000..0x701afff (4096)
--8341-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8341-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8341-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8341-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8341-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8341-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8341-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8341== Checked 1,614,640 bytes
==8341==
==8341== LEAK SUMMARY:
==8341== definitely lost: 253 bytes in 4 blocks
==8341== indirectly lost: 6,756 bytes in 7 blocks
==8341== possibly lost: 0 bytes in 0 blocks
==8341== still reachable: 1,350,430 bytes in 28,676 blocks
==8341== suppressed: 0 bytes in 0 blocks
==8341== Rerun with --leak-check=full to see details of leaked memory
==8341==
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341==
==8341== 1 errors in context 1 of 1:
==8341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8341== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8341== by 0x488CD0: stringsubst (subst.c:301)
==8341== by 0x48801B: prefork (subst.c:77)
==8341== by 0x42B318: execcmd (exec.c:2619)
==8341== by 0x428CA0: execpline2 (exec.c:1697)
==8341== by 0x427FD2: execpline (exec.c:1484)
==8341== by 0x427756: execlist (exec.c:1267)
==8341== by 0x42717C: execode (exec.c:1073)
==8341== by 0x431299: runshfunc (exec.c:5040)
==8341== by 0x430E76: doshfunc (exec.c:4920)
==8341== by 0x4302FB: execshfunc (exec.c:4557)
==8341== by 0x42D8C1: execcmd (exec.c:3373)
==8341==
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8342-- Caught __NR_exit; running __libc_freeres()
==8342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8342-by-pythonnut-on-???
==8342== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8342-by-pythonnut-on-???
==8342== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8342-by-pythonnut-on-???
==8342==
==8342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8342== don't want to do, unless you know exactly what you're doing,
==8342== or are doing some strange experiment):
==8342== /usr/lib/valgrind/../../bin/vgdb --pid=8342 ...command...
==8342==
==8342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8342== /path/to/gdb ./zsh
==8342== and then give GDB the following command
==8342== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8342
==8342== --pid is optional if only one valgrind process is running
==8342==
--8342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8342==
==8342== HEAP SUMMARY:
==8342== in use at exit: 1,357,535 bytes in 28,687 blocks
==8342== total heap usage: 786,829 allocs, 758,142 frees, 54,167,393 bytes allocated
==8342==
==8342== Searching for pointers to 28,687 not-freed blocks
--8342-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8342-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8342-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8342-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8342-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8342-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8342-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8342-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8342-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8342-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8342-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8342-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8342-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8342-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8342-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8342-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8342-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8342-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8342-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8342-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8342-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8342-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8342-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8342-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8342-- Scanning root segment: 0x701a000..0x701afff (4096)
--8342-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8342-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8342-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8342-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8342-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8342-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8342-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8342== Checked 1,612,144 bytes
==8342==
==8342== LEAK SUMMARY:
==8342== definitely lost: 253 bytes in 4 blocks
==8342== indirectly lost: 6,756 bytes in 7 blocks
==8342== possibly lost: 0 bytes in 0 blocks
==8342== still reachable: 1,350,526 bytes in 28,676 blocks
==8342== suppressed: 0 bytes in 0 blocks
==8342== Rerun with --leak-check=full to see details of leaked memory
==8342==
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8342==
==8342== 1 errors in context 1 of 1:
==8342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8342== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8342== by 0x488CD0: stringsubst (subst.c:301)
==8342== by 0x48801B: prefork (subst.c:77)
==8342== by 0x42B318: execcmd (exec.c:2619)
==8342== by 0x428CA0: execpline2 (exec.c:1697)
==8342== by 0x427FD2: execpline (exec.c:1484)
==8342== by 0x427756: execlist (exec.c:1267)
==8342== by 0x42717C: execode (exec.c:1073)
==8342== by 0x431299: runshfunc (exec.c:5040)
==8342== by 0x430E76: doshfunc (exec.c:4920)
==8342== by 0x4302FB: execshfunc (exec.c:4557)
==8342== by 0x42D8C1: execcmd (exec.c:3373)
==8342==
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8343-by-pythonnut-on-???
==8343== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8343-by-pythonnut-on-???
==8343== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8343-by-pythonnut-on-???
==8343==
==8343== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8343== don't want to do, unless you know exactly what you're doing,
==8343== or are doing some strange experiment):
==8343== /usr/lib/valgrind/../../bin/vgdb --pid=8343 ...command...
==8343==
==8343== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8343== /path/to/gdb ./zsh
==8343== and then give GDB the following command
==8343== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8343
==8343== --pid is optional if only one valgrind process is running
==8343==
--8343-- Caught __NR_exit; running __libc_freeres()
--8343-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8343==
==8343== HEAP SUMMARY:
==8343== in use at exit: 1,357,890 bytes in 28,694 blocks
==8343== total heap usage: 786,878 allocs, 758,184 frees, 54,176,485 bytes allocated
==8343==
==8343== Searching for pointers to 28,694 not-freed blocks
--8343-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8343-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8343-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8343-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8343-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8343-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8343-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8343-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8343-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8343-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8343-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8343-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8343-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8343-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8343-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8343-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8343-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8343-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8343-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8343-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8343-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8343-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8343-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8343-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8343-- Scanning root segment: 0x701a000..0x701afff (4096)
--8343-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8343-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8343-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8343-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8343-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8343-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8343-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8343== Checked 1,613,880 bytes
==8343==
==8343== LEAK SUMMARY:
==8343== definitely lost: 253 bytes in 4 blocks
==8343== indirectly lost: 6,756 bytes in 7 blocks
==8343== possibly lost: 0 bytes in 0 blocks
==8343== still reachable: 1,350,881 bytes in 28,683 blocks
==8343== suppressed: 0 bytes in 0 blocks
==8343== Rerun with --leak-check=full to see details of leaked memory
==8343==
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343==
==8343== 1 errors in context 1 of 1:
==8343== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8343== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8343== by 0x488CD0: stringsubst (subst.c:301)
==8343== by 0x48801B: prefork (subst.c:77)
==8343== by 0x42B318: execcmd (exec.c:2619)
==8343== by 0x428CA0: execpline2 (exec.c:1697)
==8343== by 0x427FD2: execpline (exec.c:1484)
==8343== by 0x427756: execlist (exec.c:1267)
==8343== by 0x42717C: execode (exec.c:1073)
==8343== by 0x431299: runshfunc (exec.c:5040)
==8343== by 0x430E76: doshfunc (exec.c:4920)
==8343== by 0x4302FB: execshfunc (exec.c:4557)
==8343== by 0x42D8C1: execcmd (exec.c:3373)
==8343==
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8344-- Caught __NR_exit; running __libc_freeres()
==8344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8344-by-pythonnut-on-???
==8344== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8344-by-pythonnut-on-???
==8344== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8344-by-pythonnut-on-???
==8344==
==8344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8344== don't want to do, unless you know exactly what you're doing,
==8344== or are doing some strange experiment):
==8344== /usr/lib/valgrind/../../bin/vgdb --pid=8344 ...command...
==8344==
==8344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8344== /path/to/gdb ./zsh
==8344== and then give GDB the following command
==8344== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8344
==8344== --pid is optional if only one valgrind process is running
==8344==
--8344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8344==
==8344== HEAP SUMMARY:
==8344== in use at exit: 1,357,732 bytes in 28,694 blocks
==8344== total heap usage: 786,857 allocs, 758,163 frees, 54,174,179 bytes allocated
==8344==
==8344== Searching for pointers to 28,694 not-freed blocks
--8344-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8344-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8344-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8344-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8344-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8344-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8344-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8344-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8344-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8344-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8344-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8344-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8344-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8344-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8344-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8344-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8344-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8344-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8344-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8344-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8344-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8344-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8344-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8344-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8344-- Scanning root segment: 0x701a000..0x701afff (4096)
--8344-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8344-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8344-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8344-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8344-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8344-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8344-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8344== Checked 1,612,256 bytes
==8344==
==8344== LEAK SUMMARY:
==8344== definitely lost: 253 bytes in 4 blocks
==8344== indirectly lost: 6,756 bytes in 7 blocks
==8344== possibly lost: 0 bytes in 0 blocks
==8344== still reachable: 1,350,723 bytes in 28,683 blocks
==8344== suppressed: 0 bytes in 0 blocks
==8344== Rerun with --leak-check=full to see details of leaked memory
==8344==
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8344==
==8344== 1 errors in context 1 of 1:
==8344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8344== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8344== by 0x488CD0: stringsubst (subst.c:301)
==8344== by 0x48801B: prefork (subst.c:77)
==8344== by 0x42B318: execcmd (exec.c:2619)
==8344== by 0x428CA0: execpline2 (exec.c:1697)
==8344== by 0x427FD2: execpline (exec.c:1484)
==8344== by 0x427756: execlist (exec.c:1267)
==8344== by 0x42717C: execode (exec.c:1073)
==8344== by 0x431299: runshfunc (exec.c:5040)
==8344== by 0x430E76: doshfunc (exec.c:4920)
==8344== by 0x4302FB: execshfunc (exec.c:4557)
==8344== by 0x42D8C1: execcmd (exec.c:3373)
==8344==
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8345-by-pythonnut-on-???
==8345== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8345-by-pythonnut-on-???
==8345== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8345-by-pythonnut-on-???
==8345==
==8345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8345== don't want to do, unless you know exactly what you're doing,
==8345== or are doing some strange experiment):
==8345== /usr/lib/valgrind/../../bin/vgdb --pid=8345 ...command...
==8345==
==8345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8345== /path/to/gdb ./zsh
==8345== and then give GDB the following command
==8345== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8345
==8345== --pid is optional if only one valgrind process is running
==8345==
--8345-- Caught __NR_exit; running __libc_freeres()
--8345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8345==
==8345== HEAP SUMMARY:
==8345== in use at exit: 1,357,756 bytes in 28,695 blocks
==8345== total heap usage: 786,870 allocs, 758,175 frees, 54,176,862 bytes allocated
==8345==
==8345== Searching for pointers to 28,695 not-freed blocks
--8345-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8345-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8345-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8345-- Scanning root segment: 0x4033000..0x4036fff (16384)
--8345-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8345-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8345-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8345-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8345-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8345-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8345-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8345-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8345-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8345-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8345-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8345-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8345-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8345-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8345-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8345-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8345-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8345-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8345-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8345-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8345-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8345-- Scanning root segment: 0x701a000..0x701afff (4096)
--8345-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8345-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8345-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8345-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8345-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8345-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8345-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8345== Checked 1,628,152 bytes
==8345==
==8345== LEAK SUMMARY:
==8345== definitely lost: 253 bytes in 4 blocks
==8345== indirectly lost: 6,756 bytes in 7 blocks
==8345== possibly lost: 0 bytes in 0 blocks
==8345== still reachable: 1,350,747 bytes in 28,684 blocks
==8345== suppressed: 0 bytes in 0 blocks
==8345== Rerun with --leak-check=full to see details of leaked memory
==8345==
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345==
==8345== 1 errors in context 1 of 1:
==8345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8345== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8345== by 0x488CD0: stringsubst (subst.c:301)
==8345== by 0x48801B: prefork (subst.c:77)
==8345== by 0x42B318: execcmd (exec.c:2619)
==8345== by 0x428CA0: execpline2 (exec.c:1697)
==8345== by 0x427FD2: execpline (exec.c:1484)
==8345== by 0x427756: execlist (exec.c:1267)
==8345== by 0x42717C: execode (exec.c:1073)
==8345== by 0x431299: runshfunc (exec.c:5040)
==8345== by 0x430E76: doshfunc (exec.c:4920)
==8345== by 0x4302FB: execshfunc (exec.c:4557)
==8345== by 0x42D8C1: execcmd (exec.c:3373)
==8345==
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8346-- Caught __NR_exit; running __libc_freeres()
==8346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8346-by-pythonnut-on-???
==8346== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8346-by-pythonnut-on-???
==8346== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8346-by-pythonnut-on-???
==8346==
==8346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8346== don't want to do, unless you know exactly what you're doing,
==8346== or are doing some strange experiment):
==8346== /usr/lib/valgrind/../../bin/vgdb --pid=8346 ...command...
==8346==
==8346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8346== /path/to/gdb ./zsh
==8346== and then give GDB the following command
==8346== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8346
==8346== --pid is optional if only one valgrind process is running
==8346==
--8346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8346==
==8346== HEAP SUMMARY:
==8346== in use at exit: 1,363,150 bytes in 28,704 blocks
==8346== total heap usage: 787,161 allocs, 758,457 frees, 54,207,028 bytes allocated
==8346==
==8346== Searching for pointers to 28,704 not-freed blocks
--8346-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8346-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8346-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8346-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8346-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8346-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8346-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8346-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8346-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8346-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8346-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8346-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8346-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8346-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8346-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8346-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8346-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8346-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8346-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8346-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8346-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8346-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8346-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8346-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8346-- Scanning root segment: 0x701a000..0x701afff (4096)
--8346-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8346-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8346-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8346-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8346-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8346-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8346-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8346== Checked 1,617,864 bytes
==8346==
==8346== LEAK SUMMARY:
==8346== definitely lost: 253 bytes in 4 blocks
==8346== indirectly lost: 6,756 bytes in 7 blocks
==8346== possibly lost: 0 bytes in 0 blocks
==8346== still reachable: 1,356,141 bytes in 28,693 blocks
==8346== suppressed: 0 bytes in 0 blocks
==8346== Rerun with --leak-check=full to see details of leaked memory
==8346==
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8346==
==8346== 1 errors in context 1 of 1:
==8346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8346== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8346== by 0x488CD0: stringsubst (subst.c:301)
==8346== by 0x48801B: prefork (subst.c:77)
==8346== by 0x42B318: execcmd (exec.c:2619)
==8346== by 0x428CA0: execpline2 (exec.c:1697)
==8346== by 0x427FD2: execpline (exec.c:1484)
==8346== by 0x427756: execlist (exec.c:1267)
==8346== by 0x42717C: execode (exec.c:1073)
==8346== by 0x431299: runshfunc (exec.c:5040)
==8346== by 0x430E76: doshfunc (exec.c:4920)
==8346== by 0x4302FB: execshfunc (exec.c:4557)
==8346== by 0x42D8C1: execcmd (exec.c:3373)
==8346==
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8347-by-pythonnut-on-???
==8347== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8347-by-pythonnut-on-???
==8347== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8347-by-pythonnut-on-???
==8347==
==8347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8347== don't want to do, unless you know exactly what you're doing,
==8347== or are doing some strange experiment):
==8347== /usr/lib/valgrind/../../bin/vgdb --pid=8347 ...command...
==8347==
==8347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8347== /path/to/gdb ./zsh
==8347== and then give GDB the following command
==8347== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8347
==8347== --pid is optional if only one valgrind process is running
==8347==
==8347== Ignoring duplicate redirection:
--8347-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8347-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
--8347-- Caught __NR_exit; running __libc_freeres()
--8347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8347==
==8347== HEAP SUMMARY:
==8347== in use at exit: 1,365,095 bytes in 28,774 blocks
==8347== total heap usage: 788,181 allocs, 759,407 frees, 54,946,126 bytes allocated
==8347==
==8347== Searching for pointers to 28,774 not-freed blocks
--8347-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8347-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8347-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8347-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8347-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8347-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8347-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8347-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8347-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8347-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8347-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8347-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8347-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8347-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8347-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8347-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8347-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8347-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8347-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8347-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8347-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8347-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8347-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8347-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8347-- Scanning root segment: 0x701a000..0x701afff (4096)
--8347-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8347-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8347-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8347-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8347-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8347-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8347-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8347== Checked 1,619,312 bytes
==8347==
==8347== LEAK SUMMARY:
==8347== definitely lost: 253 bytes in 4 blocks
==8347== indirectly lost: 6,756 bytes in 7 blocks
==8347== possibly lost: 0 bytes in 0 blocks
==8347== still reachable: 1,358,086 bytes in 28,763 blocks
==8347== suppressed: 0 bytes in 0 blocks
==8347== Rerun with --leak-check=full to see details of leaked memory
==8347==
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347==
==8347== 1 errors in context 1 of 1:
==8347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8347== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8347== by 0x488CD0: stringsubst (subst.c:301)
==8347== by 0x48801B: prefork (subst.c:77)
==8347== by 0x42B318: execcmd (exec.c:2619)
==8347== by 0x428CA0: execpline2 (exec.c:1697)
==8347== by 0x427FD2: execpline (exec.c:1484)
==8347== by 0x427756: execlist (exec.c:1267)
==8347== by 0x42717C: execode (exec.c:1073)
==8347== by 0x431299: runshfunc (exec.c:5040)
==8347== by 0x430E76: doshfunc (exec.c:4920)
==8347== by 0x4302FB: execshfunc (exec.c:4557)
==8347== by 0x42D8C1: execcmd (exec.c:3373)
==8347==
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8349-by-pythonnut-on-???
==8349== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8349-by-pythonnut-on-???
==8349== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8349-by-pythonnut-on-???
==8349==
==8349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8349== don't want to do, unless you know exactly what you're doing,
==8349== or are doing some strange experiment):
==8349== /usr/lib/valgrind/../../bin/vgdb --pid=8349 ...command...
==8349==
==8349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8349== /path/to/gdb ./zsh
==8349== and then give GDB the following command
==8349== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8349
==8349== --pid is optional if only one valgrind process is running
==8349==
==8350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8350-by-pythonnut-on-???
==8350== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8350-by-pythonnut-on-???
==8350== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8350-by-pythonnut-on-???
==8350==
==8350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8350== don't want to do, unless you know exactly what you're doing,
==8350== or are doing some strange experiment):
==8350== /usr/lib/valgrind/../../bin/vgdb --pid=8350 ...command...
==8350==
==8350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8350== /path/to/gdb ./zsh
==8350== and then give GDB the following command
==8350== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8350
==8350== --pid is optional if only one valgrind process is running
==8350==
==8351== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8351-by-pythonnut-on-???
==8351== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8351-by-pythonnut-on-???
==8351== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8351-by-pythonnut-on-???
==8351==
==8351== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8351== don't want to do, unless you know exactly what you're doing,
==8351== or are doing some strange experiment):
==8351== /usr/lib/valgrind/../../bin/vgdb --pid=8351 ...command...
==8351==
==8351== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8351== /path/to/gdb ./zsh
==8351== and then give GDB the following command
==8351== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8351
==8351== --pid is optional if only one valgrind process is running
==8351==
==8351== Ignoring duplicate redirection:
--8351-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8351-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/system.so
--7806-- svma 0x00000021c0, avma 0x000b86d1c0
--7806-- REDIR: 0x5a3d250 (libc.so.6:strncat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806-- new: 0x05a4b430 (__strncat_sse2 ) R-> (2004.0) 0x04c2d380 strncat
--7806-- REDIR: 0x5a4b430 (libc.so.6:__strncat_sse2) redirected to 0x4c2d380 (strncat)
--8351-- Caught __NR_exit; running __libc_freeres()
--8351-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8351==
==8351== HEAP SUMMARY:
==8351== in use at exit: 1,371,080 bytes in 28,988 blocks
==8351== total heap usage: 788,409 allocs, 759,421 frees, 54,957,467 bytes allocated
==8351==
==8351== Searching for pointers to 28,988 not-freed blocks
--8351-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8351-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8351-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8351-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8351-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8351-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8351-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8351-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8351-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8351-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8351-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8351-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8351-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8351-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8351-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8351-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8351-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8351-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8351-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8351-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8351-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8351-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8351-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8351-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8351-- Scanning root segment: 0x701a000..0x701afff (4096)
--8351-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8351-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8351-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8351-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8351-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8351-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8351-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8351== Checked 1,628,784 bytes
==8351==
==8351== LEAK SUMMARY:
==8351== definitely lost: 253 bytes in 4 blocks
==8351== indirectly lost: 6,756 bytes in 7 blocks
==8351== possibly lost: 0 bytes in 0 blocks
==8351== still reachable: 1,364,071 bytes in 28,977 blocks
==8351== suppressed: 0 bytes in 0 blocks
==8351== Rerun with --leak-check=full to see details of leaked memory
==8351==
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8351==
==8351== 1 errors in context 1 of 1:
==8351== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8351== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8351== by 0x488CD0: stringsubst (subst.c:301)
==8351== by 0x48801B: prefork (subst.c:77)
==8351== by 0x42B318: execcmd (exec.c:2619)
==8351== by 0x428CA0: execpline2 (exec.c:1697)
==8351== by 0x427FD2: execpline (exec.c:1484)
==8351== by 0x427756: execlist (exec.c:1267)
==8351== by 0x42717C: execode (exec.c:1073)
==8351== by 0x431299: runshfunc (exec.c:5040)
==8351== by 0x430E76: doshfunc (exec.c:4920)
==8351== by 0x4302FB: execshfunc (exec.c:4557)
==8351== by 0x42D8C1: execcmd (exec.c:3373)
==8351==
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352== Ignoring duplicate redirection:
--8352-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8352-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8352-by-pythonnut-on-???
==8352== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8352-by-pythonnut-on-???
==8352== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8352-by-pythonnut-on-???
==8352==
==8352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8352== don't want to do, unless you know exactly what you're doing,
==8352== or are doing some strange experiment):
==8352== /usr/lib/valgrind/../../bin/vgdb --pid=8352 ...command...
==8352==
==8352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8352== /path/to/gdb ./zsh
==8352== and then give GDB the following command
==8352== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8352
==8352== --pid is optional if only one valgrind process is running
==8352==
--8352-- Caught __NR_exit; running __libc_freeres()
--8352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8352==
==8352== HEAP SUMMARY:
==8352== in use at exit: 1,371,163 bytes in 28,999 blocks
==8352== total heap usage: 787,678 allocs, 758,679 frees, 54,746,970 bytes allocated
==8352==
==8352== Searching for pointers to 28,999 not-freed blocks
--8352-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8352-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8352-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8352-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8352-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8352-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8352-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8352-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8352-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8352-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8352-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8352-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8352-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8352-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8352-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8352-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8352-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8352-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8352-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8352-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8352-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8352-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8352-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8352-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8352-- Scanning root segment: 0x701a000..0x701afff (4096)
--8352-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8352-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8352-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8352-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8352-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8352-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8352-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8352== Checked 1,629,640 bytes
==8352==
==8352== LEAK SUMMARY:
==8352== definitely lost: 253 bytes in 4 blocks
==8352== indirectly lost: 6,756 bytes in 7 blocks
==8352== possibly lost: 0 bytes in 0 blocks
==8352== still reachable: 1,364,154 bytes in 28,988 blocks
==8352== suppressed: 0 bytes in 0 blocks
==8352== Rerun with --leak-check=full to see details of leaked memory
==8352==
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352==
==8352== 1 errors in context 1 of 1:
==8352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8352== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8352== by 0x488CD0: stringsubst (subst.c:301)
==8352== by 0x48801B: prefork (subst.c:77)
==8352== by 0x42B318: execcmd (exec.c:2619)
==8352== by 0x428CA0: execpline2 (exec.c:1697)
==8352== by 0x427FD2: execpline (exec.c:1484)
==8352== by 0x427756: execlist (exec.c:1267)
==8352== by 0x42717C: execode (exec.c:1073)
==8352== by 0x431299: runshfunc (exec.c:5040)
==8352== by 0x430E76: doshfunc (exec.c:4920)
==8352== by 0x4302FB: execshfunc (exec.c:4557)
==8352== by 0x42D8C1: execcmd (exec.c:3373)
==8352==
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353== Ignoring duplicate redirection:
--8353-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8353-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8353== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8353-by-pythonnut-on-???
==8353== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8353-by-pythonnut-on-???
==8353== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8353-by-pythonnut-on-???
==8353==
==8353== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8353== don't want to do, unless you know exactly what you're doing,
==8353== or are doing some strange experiment):
==8353== /usr/lib/valgrind/../../bin/vgdb --pid=8353 ...command...
==8353==
==8353== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8353== /path/to/gdb ./zsh
==8353== and then give GDB the following command
==8353== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8353
==8353== --pid is optional if only one valgrind process is running
==8353==
--8353-- Caught __NR_exit; running __libc_freeres()
--8353-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8353==
==8353== HEAP SUMMARY:
==8353== in use at exit: 1,371,298 bytes in 29,001 blocks
==8353== total heap usage: 787,715 allocs, 758,714 frees, 54,820,129 bytes allocated
==8353==
==8353== Searching for pointers to 29,001 not-freed blocks
--8353-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8353-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8353-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8353-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8353-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8353-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8353-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8353-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8353-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8353-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8353-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8353-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8353-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8353-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8353-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8353-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8353-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8353-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8353-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8353-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8353-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8353-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8353-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8353-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8353-- Scanning root segment: 0x701a000..0x701afff (4096)
--8353-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8353-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8353-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8353-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8353-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8353-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8353-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8353== Checked 1,629,752 bytes
==8353==
==8353== LEAK SUMMARY:
==8353== definitely lost: 253 bytes in 4 blocks
==8353== indirectly lost: 6,756 bytes in 7 blocks
==8353== possibly lost: 0 bytes in 0 blocks
==8353== still reachable: 1,364,289 bytes in 28,990 blocks
==8353== suppressed: 0 bytes in 0 blocks
==8353== Rerun with --leak-check=full to see details of leaked memory
==8353==
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353==
==8353== 1 errors in context 1 of 1:
==8353== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8353== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8353== by 0x488CD0: stringsubst (subst.c:301)
==8353== by 0x48801B: prefork (subst.c:77)
==8353== by 0x42B318: execcmd (exec.c:2619)
==8353== by 0x428CA0: execpline2 (exec.c:1697)
==8353== by 0x427FD2: execpline (exec.c:1484)
==8353== by 0x427756: execlist (exec.c:1267)
==8353== by 0x42717C: execode (exec.c:1073)
==8353== by 0x431299: runshfunc (exec.c:5040)
==8353== by 0x430E76: doshfunc (exec.c:4920)
==8353== by 0x4302FB: execshfunc (exec.c:4557)
==8353== by 0x42D8C1: execcmd (exec.c:3373)
==8353==
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354== Ignoring duplicate redirection:
--8354-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8354-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8354== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8354-by-pythonnut-on-???
==8354== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8354-by-pythonnut-on-???
==8354== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8354-by-pythonnut-on-???
==8354==
==8354== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8354== don't want to do, unless you know exactly what you're doing,
==8354== or are doing some strange experiment):
==8354== /usr/lib/valgrind/../../bin/vgdb --pid=8354 ...command...
==8354==
==8354== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8354== /path/to/gdb ./zsh
==8354== and then give GDB the following command
==8354== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8354
==8354== --pid is optional if only one valgrind process is running
==8354==
--8354-- Caught __NR_exit; running __libc_freeres()
--8354-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8354==
==8354== HEAP SUMMARY:
==8354== in use at exit: 1,371,296 bytes in 29,001 blocks
==8354== total heap usage: 787,769 allocs, 758,768 frees, 55,516,661 bytes allocated
==8354==
==8354== Searching for pointers to 29,001 not-freed blocks
--8354-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8354-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8354-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8354-- Scanning root segment: 0x4035000..0x4038fff (16384)
--8354-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8354-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8354-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8354-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8354-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8354-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8354-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8354-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8354-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8354-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8354-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8354-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8354-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8354-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8354-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8354-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8354-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8354-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8354-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8354-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8354-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8354-- Scanning root segment: 0x701a000..0x701afff (4096)
--8354-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8354-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8354-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8354-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8354-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8354-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8354-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8354== Checked 1,646,144 bytes
==8354==
==8354== LEAK SUMMARY:
==8354== definitely lost: 253 bytes in 4 blocks
==8354== indirectly lost: 6,756 bytes in 7 blocks
==8354== possibly lost: 0 bytes in 0 blocks
==8354== still reachable: 1,364,287 bytes in 28,990 blocks
==8354== suppressed: 0 bytes in 0 blocks
==8354== Rerun with --leak-check=full to see details of leaked memory
==8354==
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354==
==8354== 1 errors in context 1 of 1:
==8354== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8354== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8354== by 0x488CD0: stringsubst (subst.c:301)
==8354== by 0x48801B: prefork (subst.c:77)
==8354== by 0x42B318: execcmd (exec.c:2619)
==8354== by 0x428CA0: execpline2 (exec.c:1697)
==8354== by 0x427FD2: execpline (exec.c:1484)
==8354== by 0x427756: execlist (exec.c:1267)
==8354== by 0x42717C: execode (exec.c:1073)
==8354== by 0x431299: runshfunc (exec.c:5040)
==8354== by 0x430E76: doshfunc (exec.c:4920)
==8354== by 0x4302FB: execshfunc (exec.c:4557)
==8354== by 0x42D8C1: execcmd (exec.c:3373)
==8354==
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355== Ignoring duplicate redirection:
--8355-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8355-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8355== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8355-by-pythonnut-on-???
==8355== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8355-by-pythonnut-on-???
==8355== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8355-by-pythonnut-on-???
==8355==
==8355== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8355== don't want to do, unless you know exactly what you're doing,
==8355== or are doing some strange experiment):
==8355== /usr/lib/valgrind/../../bin/vgdb --pid=8355 ...command...
==8355==
==8355== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8355== /path/to/gdb ./zsh
==8355== and then give GDB the following command
==8355== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8355
==8355== --pid is optional if only one valgrind process is running
==8355==
--8355-- Caught __NR_exit; running __libc_freeres()
--8355-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8355==
==8355== HEAP SUMMARY:
==8355== in use at exit: 1,371,296 bytes in 29,001 blocks
==8355== total heap usage: 787,776 allocs, 758,775 frees, 54,833,386 bytes allocated
==8355==
==8355== Searching for pointers to 29,001 not-freed blocks
--8355-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8355-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8355-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8355-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8355-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8355-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8355-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8355-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8355-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8355-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8355-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8355-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8355-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8355-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8355-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8355-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8355-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8355-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8355-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8355-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8355-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8355-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8355-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8355-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8355-- Scanning root segment: 0x701a000..0x701afff (4096)
--8355-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8355-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8355-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8355-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8355-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8355-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8355-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8355== Checked 1,629,752 bytes
==8355==
==8355== LEAK SUMMARY:
==8355== definitely lost: 253 bytes in 4 blocks
==8355== indirectly lost: 6,756 bytes in 7 blocks
==8355== possibly lost: 0 bytes in 0 blocks
==8355== still reachable: 1,364,287 bytes in 28,990 blocks
==8355== suppressed: 0 bytes in 0 blocks
==8355== Rerun with --leak-check=full to see details of leaked memory
==8355==
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355==
==8355== 1 errors in context 1 of 1:
==8355== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8355== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8355== by 0x488CD0: stringsubst (subst.c:301)
==8355== by 0x48801B: prefork (subst.c:77)
==8355== by 0x42B318: execcmd (exec.c:2619)
==8355== by 0x428CA0: execpline2 (exec.c:1697)
==8355== by 0x427FD2: execpline (exec.c:1484)
==8355== by 0x427756: execlist (exec.c:1267)
==8355== by 0x42717C: execode (exec.c:1073)
==8355== by 0x431299: runshfunc (exec.c:5040)
==8355== by 0x430E76: doshfunc (exec.c:4920)
==8355== by 0x4302FB: execshfunc (exec.c:4557)
==8355== by 0x42D8C1: execcmd (exec.c:3373)
==8355==
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356== Ignoring duplicate redirection:
--8356-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8356-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8356-by-pythonnut-on-???
==8356== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8356-by-pythonnut-on-???
==8356== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8356-by-pythonnut-on-???
==8356==
==8356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8356== don't want to do, unless you know exactly what you're doing,
==8356== or are doing some strange experiment):
==8356== /usr/lib/valgrind/../../bin/vgdb --pid=8356 ...command...
==8356==
==8356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8356== /path/to/gdb ./zsh
==8356== and then give GDB the following command
==8356== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8356
==8356== --pid is optional if only one valgrind process is running
==8356==
--8356-- Caught __NR_exit; running __libc_freeres()
--8356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8356==
==8356== HEAP SUMMARY:
==8356== in use at exit: 1,371,298 bytes in 29,001 blocks
==8356== total heap usage: 787,813 allocs, 758,812 frees, 54,841,329 bytes allocated
==8356==
==8356== Searching for pointers to 29,001 not-freed blocks
--8356-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8356-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8356-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8356-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8356-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8356-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8356-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8356-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8356-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8356-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8356-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8356-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8356-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8356-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8356-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8356-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8356-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8356-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8356-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8356-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8356-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8356-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8356-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8356-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8356-- Scanning root segment: 0x701a000..0x701afff (4096)
--8356-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8356-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8356-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8356-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8356-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8356-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8356-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8356== Checked 1,629,752 bytes
==8356==
==8356== LEAK SUMMARY:
==8356== definitely lost: 253 bytes in 4 blocks
==8356== indirectly lost: 6,756 bytes in 7 blocks
==8356== possibly lost: 0 bytes in 0 blocks
==8356== still reachable: 1,364,289 bytes in 28,990 blocks
==8356== suppressed: 0 bytes in 0 blocks
==8356== Rerun with --leak-check=full to see details of leaked memory
==8356==
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356==
==8356== 1 errors in context 1 of 1:
==8356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8356== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8356== by 0x488CD0: stringsubst (subst.c:301)
==8356== by 0x48801B: prefork (subst.c:77)
==8356== by 0x42B318: execcmd (exec.c:2619)
==8356== by 0x428CA0: execpline2 (exec.c:1697)
==8356== by 0x427FD2: execpline (exec.c:1484)
==8356== by 0x427756: execlist (exec.c:1267)
==8356== by 0x42717C: execode (exec.c:1073)
==8356== by 0x431299: runshfunc (exec.c:5040)
==8356== by 0x430E76: doshfunc (exec.c:4920)
==8356== by 0x4302FB: execshfunc (exec.c:4557)
==8356== by 0x42D8C1: execcmd (exec.c:3373)
==8356==
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357== Ignoring duplicate redirection:
--8357-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8357-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8357-by-pythonnut-on-???
==8357== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8357-by-pythonnut-on-???
==8357== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8357-by-pythonnut-on-???
==8357==
==8357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8357== don't want to do, unless you know exactly what you're doing,
==8357== or are doing some strange experiment):
==8357== /usr/lib/valgrind/../../bin/vgdb --pid=8357 ...command...
==8357==
==8357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8357== /path/to/gdb ./zsh
==8357== and then give GDB the following command
==8357== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8357
==8357== --pid is optional if only one valgrind process is running
==8357==
--8357-- Caught __NR_exit; running __libc_freeres()
--8357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8357==
==8357== HEAP SUMMARY:
==8357== in use at exit: 1,371,297 bytes in 29,001 blocks
==8357== total heap usage: 787,847 allocs, 758,846 frees, 54,881,543 bytes allocated
==8357==
==8357== Searching for pointers to 29,001 not-freed blocks
--8357-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8357-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8357-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8357-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8357-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8357-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8357-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8357-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8357-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8357-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8357-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8357-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8357-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8357-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8357-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8357-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8357-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8357-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8357-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8357-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8357-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8357-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8357-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8357-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8357-- Scanning root segment: 0x701a000..0x701afff (4096)
--8357-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8357-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8357-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8357-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8357-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8357-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8357-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8357== Checked 1,629,752 bytes
==8357==
==8357== LEAK SUMMARY:
==8357== definitely lost: 253 bytes in 4 blocks
==8357== indirectly lost: 6,756 bytes in 7 blocks
==8357== possibly lost: 0 bytes in 0 blocks
==8357== still reachable: 1,364,288 bytes in 28,990 blocks
==8357== suppressed: 0 bytes in 0 blocks
==8357== Rerun with --leak-check=full to see details of leaked memory
==8357==
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357==
==8357== 1 errors in context 1 of 1:
==8357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8357== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8357== by 0x488CD0: stringsubst (subst.c:301)
==8357== by 0x48801B: prefork (subst.c:77)
==8357== by 0x42B318: execcmd (exec.c:2619)
==8357== by 0x428CA0: execpline2 (exec.c:1697)
==8357== by 0x427FD2: execpline (exec.c:1484)
==8357== by 0x427756: execlist (exec.c:1267)
==8357== by 0x42717C: execode (exec.c:1073)
==8357== by 0x431299: runshfunc (exec.c:5040)
==8357== by 0x430E76: doshfunc (exec.c:4920)
==8357== by 0x4302FB: execshfunc (exec.c:4557)
==8357== by 0x42D8C1: execcmd (exec.c:3373)
==8357==
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359== Ignoring duplicate redirection:
--8359-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8359-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8359== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8359-by-pythonnut-on-???
==8359== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8359-by-pythonnut-on-???
==8359== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8359-by-pythonnut-on-???
==8359==
==8359== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8359== don't want to do, unless you know exactly what you're doing,
==8359== or are doing some strange experiment):
==8359== /usr/lib/valgrind/../../bin/vgdb --pid=8359 ...command...
==8359==
==8359== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8359== /path/to/gdb ./zsh
==8359== and then give GDB the following command
==8359== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8359
==8359== --pid is optional if only one valgrind process is running
==8359==
==8358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8358-by-pythonnut-on-???
==8358== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8358-by-pythonnut-on-???
==8358== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8358-by-pythonnut-on-???
==8358==
==8358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8358== don't want to do, unless you know exactly what you're doing,
==8358== or are doing some strange experiment):
==8358== /usr/lib/valgrind/../../bin/vgdb --pid=8358 ...command...
==8358==
==8358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8358== /path/to/gdb ./zsh
==8358== and then give GDB the following command
==8358== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8358
==8358== --pid is optional if only one valgrind process is running
==8358==
--8359-- Caught __NR_exit; running __libc_freeres()
==8361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8361-by-pythonnut-on-???
==8361== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8361-by-pythonnut-on-???
==8361== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8361-by-pythonnut-on-???
==8361==
==8361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8361== don't want to do, unless you know exactly what you're doing,
==8361== or are doing some strange experiment):
==8361== /usr/lib/valgrind/../../bin/vgdb --pid=8361 ...command...
==8361==
==8361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8361== /path/to/gdb ./zsh
==8361== and then give GDB the following command
==8361== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8361
==8361== --pid is optional if only one valgrind process is running
==8361==
==8363== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8363-by-pythonnut-on-???
==8363== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8363-by-pythonnut-on-???
==8363== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8363-by-pythonnut-on-???
==8363==
==8363== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8363== don't want to do, unless you know exactly what you're doing,
==8363== or are doing some strange experiment):
==8363== /usr/lib/valgrind/../../bin/vgdb --pid=8363 ...command...
==8363==
==8363== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8363== /path/to/gdb ./zsh
==8363== and then give GDB the following command
==8363== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8363
==8363== --pid is optional if only one valgrind process is running
==8363==
==8362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8362-by-pythonnut-on-???
==8362== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8362-by-pythonnut-on-???
==8362== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8362-by-pythonnut-on-???
==8362==
==8362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8362== don't want to do, unless you know exactly what you're doing,
==8362== or are doing some strange experiment):
==8362== /usr/lib/valgrind/../../bin/vgdb --pid=8362 ...command...
==8362==
==8362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8362== /path/to/gdb ./zsh
==8362== and then give GDB the following command
==8362== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8362
==8362== --pid is optional if only one valgrind process is running
==8362==
--8362-- Caught __NR_exit; running __libc_freeres()
--8359-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF493C, len 4
==8359==
==8359== HEAP SUMMARY:
==8359== in use at exit: 1,371,295 bytes in 29,001 blocks
==8359== total heap usage: 787,888 allocs, 758,887 frees, 55,151,466 bytes allocated
==8359==
client request: code 4d430005, addr 0xFFEFF028C, len 4
--8362-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8365-- Caught __NR_exit; running __libc_freeres()
==8359== Searching for pointers to 29,001 not-freed blocks
--8359-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8359-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8359-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8359-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8359-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8359-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8359-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8359-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8359-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8359-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8359-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8359-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8359-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8359-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8359-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8359-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8359-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8359-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8359-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8359-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8359-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8359-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8359-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8359-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8359-- Scanning root segment: 0x701a000..0x701afff (4096)
--8359-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8359-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8359-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8359-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8359-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8359-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8359-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362==
==8362== HEAP SUMMARY:
==8362== in use at exit: 2,983,812 bytes in 68,326 blocks
==8362== total heap usage: 830,638 allocs, 762,312 frees, 56,958,445 bytes allocated
==8362==
==8365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8365-by-pythonnut-on-???
==8365== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8365-by-pythonnut-on-???
==8365== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8365-by-pythonnut-on-???
==8365==
==8365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8365== don't want to do, unless you know exactly what you're doing,
==8365== or are doing some strange experiment):
==8365== /usr/lib/valgrind/../../bin/vgdb --pid=8365 ...command...
==8365==
==8365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8365== /path/to/gdb ./zsh
==8365== and then give GDB the following command
==8365== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8365
==8365== --pid is optional if only one valgrind process is running
==8365==
--8365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8359== Checked 1,629,752 bytes
==8359==
==8365==
==8362== Searching for pointers to 68,326 not-freed blocks
--8362-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8362-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8362-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8362-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8362-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8362-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8362-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8362-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8362-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8362-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8362-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8362-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8362-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8362-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8362-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8362-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8362-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8362-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8362-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8362-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8362-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
==8365== HEAP SUMMARY:
==8365== in use at exit: 2,985,160 bytes in 68,318 blocks
==8365== total heap usage: 830,629 allocs, 762,311 frees, 57,167,913 bytes allocated
==8365==
--8362-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8362-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8362-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8362-- Scanning root segment: 0x701a000..0x701afff (4096)
--8362-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8362-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8362-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8362-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8362-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8362-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8362-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8362-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8359== LEAK SUMMARY:
==8359== definitely lost: 253 bytes in 4 blocks
==8359== indirectly lost: 6,756 bytes in 7 blocks
==8359== possibly lost: 0 bytes in 0 blocks
==8359== still reachable: 1,364,286 bytes in 28,990 blocks
==8359== suppressed: 0 bytes in 0 blocks
==8359== Rerun with --leak-check=full to see details of leaked memory
==8359==
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359==
==8359== 1 errors in context 1 of 1:
==8359== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8359== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8359== by 0x488CD0: stringsubst (subst.c:301)
==8359== by 0x48801B: prefork (subst.c:77)
==8359== by 0x42B318: execcmd (exec.c:2619)
==8359== by 0x428CA0: execpline2 (exec.c:1697)
==8359== by 0x427FD2: execpline (exec.c:1484)
==8359== by 0x427756: execlist (exec.c:1267)
==8359== by 0x42717C: execode (exec.c:1073)
==8359== by 0x431299: runshfunc (exec.c:5040)
==8359== by 0x430E76: doshfunc (exec.c:4920)
==8359== by 0x4302FB: execshfunc (exec.c:4557)
==8359== by 0x42D8C1: execcmd (exec.c:3373)
==8359==
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8350-- Caught __NR_exit; running __libc_freeres()
==8365== Searching for pointers to 68,318 not-freed blocks
--8365-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8365-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8365-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8365-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8365-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8365-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8365-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8365-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8365-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8365-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8365-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8365-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8365-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8365-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8365-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8365-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8365-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8365-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8365-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8365-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8365-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8365-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8365-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8365-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8365-- Scanning root segment: 0x701a000..0x701afff (4096)
--8365-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8365-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8365-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8365-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8365-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8365-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8365-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8365-- Scanning root segment: 0xffeff4000..0xfff000fff (53248)
--8350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8350==
==8350== HEAP SUMMARY:
==8350== in use at exit: 1,369,210 bytes in 28,920 blocks
==8350== total heap usage: 787,830 allocs, 758,910 frees, 54,491,153 bytes allocated
==8350==
==8350== Searching for pointers to 28,920 not-freed blocks
--8350-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8350-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8350-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8350-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8350-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8350-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8350-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8350-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8350-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8350-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8350-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8350-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8350-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8350-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8350-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8350-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8350-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8350-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8350-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8350-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8350-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8350-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8350-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8350-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8350-- Scanning root segment: 0x701a000..0x701afff (4096)
--8350-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8350-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8350-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8350-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8350-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8350-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8350-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362== Checked 4,630,640 bytes
==8362==
==8350== Checked 1,625,072 bytes
==8350==
==8350== LEAK SUMMARY:
==8350== definitely lost: 253 bytes in 4 blocks
==8350== indirectly lost: 6,756 bytes in 7 blocks
==8350== possibly lost: 0 bytes in 0 blocks
==8350== still reachable: 1,362,201 bytes in 28,909 blocks
==8350== suppressed: 0 bytes in 0 blocks
==8350== Rerun with --leak-check=full to see details of leaked memory
==8350==
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8350==
==8350== 1 errors in context 1 of 1:
==8350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8350== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8350== by 0x488CD0: stringsubst (subst.c:301)
==8350== by 0x48801B: prefork (subst.c:77)
==8350== by 0x42B318: execcmd (exec.c:2619)
==8350== by 0x428CA0: execpline2 (exec.c:1697)
==8350== by 0x427FD2: execpline (exec.c:1484)
==8350== by 0x427756: execlist (exec.c:1267)
==8350== by 0x42717C: execode (exec.c:1073)
==8350== by 0x431299: runshfunc (exec.c:5040)
==8350== by 0x430E76: doshfunc (exec.c:4920)
==8350== by 0x4302FB: execshfunc (exec.c:4557)
==8350== by 0x42D8C1: execcmd (exec.c:3373)
==8350==
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== Ignoring duplicate redirection:
--8349-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8349-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==8362== LEAK SUMMARY:
==8362== definitely lost: 253 bytes in 4 blocks
==8362== indirectly lost: 6,756 bytes in 7 blocks
==8362== possibly lost: 0 bytes in 0 blocks
==8362== still reachable: 2,976,803 bytes in 68,315 blocks
==8362== suppressed: 0 bytes in 0 blocks
==8362== Rerun with --leak-check=full to see details of leaked memory
==8362==
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8362==
==8362== 1 errors in context 1 of 1:
==8362== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8362== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8362== by 0x488CD0: stringsubst (subst.c:301)
==8362== by 0x48801B: prefork (subst.c:77)
==8362== by 0x42B318: execcmd (exec.c:2619)
==8362== by 0x428CA0: execpline2 (exec.c:1697)
==8362== by 0x427FD2: execpline (exec.c:1484)
==8362== by 0x427756: execlist (exec.c:1267)
==8362== by 0x42717C: execode (exec.c:1073)
==8362== by 0x431299: runshfunc (exec.c:5040)
==8362== by 0x430E76: doshfunc (exec.c:4920)
==8362== by 0x4302FB: execshfunc (exec.c:4557)
==8362== by 0x42D8C1: execcmd (exec.c:3373)
==8362==
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8360-- Caught __NR_exit; running __libc_freeres()
==8360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8360-by-pythonnut-on-???
==8360== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8360-by-pythonnut-on-???
==8360== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8360-by-pythonnut-on-???
==8360==
==8360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8360== don't want to do, unless you know exactly what you're doing,
==8360== or are doing some strange experiment):
==8360== /usr/lib/valgrind/../../bin/vgdb --pid=8360 ...command...
==8360==
==8360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8360== /path/to/gdb ./zsh
==8360== and then give GDB the following command
==8360== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8360
==8360== --pid is optional if only one valgrind process is running
==8360==
==8365== Checked 4,637,680 bytes
==8365==
--8349-- Caught __NR_exit; running __libc_freeres()
--8360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8365== LEAK SUMMARY:
==8365== definitely lost: 253 bytes in 4 blocks
==8365== indirectly lost: 6,756 bytes in 7 blocks
==8365== possibly lost: 0 bytes in 0 blocks
==8365== still reachable: 2,978,151 bytes in 68,307 blocks
==8365== suppressed: 0 bytes in 0 blocks
==8365== Rerun with --leak-check=full to see details of leaked memory
==8365==
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8365==
==8365== 1 errors in context 1 of 1:
==8365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8365== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8365== by 0x488CD0: stringsubst (subst.c:301)
==8365== by 0x48801B: prefork (subst.c:77)
==8365== by 0x42B318: execcmd (exec.c:2619)
==8365== by 0x428CA0: execpline2 (exec.c:1697)
==8365== by 0x427FD2: execpline (exec.c:1484)
==8365== by 0x427756: execlist (exec.c:1267)
==8365== by 0x42717C: execode (exec.c:1073)
==8365== by 0x431299: runshfunc (exec.c:5040)
==8365== by 0x430E76: doshfunc (exec.c:4920)
==8365== by 0x4302FB: execshfunc (exec.c:4557)
==8365== by 0x42D8C1: execcmd (exec.c:3373)
==8365==
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360==
==8360== HEAP SUMMARY:
==8360== in use at exit: 2,983,748 bytes in 68,323 blocks
==8360== total heap usage: 830,636 allocs, 762,313 frees, 56,958,204 bytes allocated
==8360==
==8367== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8367-by-pythonnut-on-???
==8367== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8367-by-pythonnut-on-???
==8367== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8367-by-pythonnut-on-???
==8367==
==8367== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8367== don't want to do, unless you know exactly what you're doing,
==8367== or are doing some strange experiment):
==8367== /usr/lib/valgrind/../../bin/vgdb --pid=8367 ...command...
==8367==
==8367== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8367== /path/to/gdb ./zsh
==8367== and then give GDB the following command
==8367== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8367
==8367== --pid is optional if only one valgrind process is running
==8367==
--8367-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
--8349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF8FCC, len 4
==8349==
==8349== HEAP SUMMARY:
==8349== in use at exit: 1,367,122 bytes in 28,847 blocks
==8349== total heap usage: 787,575 allocs, 758,728 frees, 54,449,232 bytes allocated
==8349==
==8360== Searching for pointers to 68,323 not-freed blocks
--8360-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8349== Searching for pointers to 28,847 not-freed blocks
--8349-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8349-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8349-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8360-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8349-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8360-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8360-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8349-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8360-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8349-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8360-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8360-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8349-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8360-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8349-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8349-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8360-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8349-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8360-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8349-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8360-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8349-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8360-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8349-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8360-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8360-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8349-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8360-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8349-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8360-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8360-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8349-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8349-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8360-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8349-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8360-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8349-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8360-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8349-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8360-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8349-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8360-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349-- Scanning root segment: 0x701a000..0x701afff (4096)
--8360-- Scanning root segment: 0x701a000..0x701afff (4096)
--8349-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8360-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8349-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8360-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8349-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8360-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8349-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8360-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8349-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8360-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8349-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8360-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8349-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8360-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8360-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005, addr 0xFFEFF5FBC, len 4
==8349== Checked 1,621,968 bytes
==8349==
==8349== LEAK SUMMARY:
==8349== definitely lost: 253 bytes in 4 blocks
==8349== indirectly lost: 6,756 bytes in 7 blocks
==8349== possibly lost: 0 bytes in 0 blocks
==8349== still reachable: 1,360,113 bytes in 28,836 blocks
==8349== suppressed: 0 bytes in 0 blocks
==8349== Rerun with --leak-check=full to see details of leaked memory
==8349==
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349==
==8349== 1 errors in context 1 of 1:
==8349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8349== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8349== by 0x488CD0: stringsubst (subst.c:301)
==8349== by 0x48801B: prefork (subst.c:77)
==8349== by 0x42B318: execcmd (exec.c:2619)
==8349== by 0x428CA0: execpline2 (exec.c:1697)
==8349== by 0x427FD2: execpline (exec.c:1484)
==8349== by 0x427756: execlist (exec.c:1267)
==8349== by 0x42717C: execode (exec.c:1073)
==8349== by 0x431299: runshfunc (exec.c:5040)
==8349== by 0x430E76: doshfunc (exec.c:4920)
==8349== by 0x4302FB: execshfunc (exec.c:4557)
==8349== by 0x42D8C1: execcmd (exec.c:3373)
==8349==
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8348-by-pythonnut-on-???
==8348== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8348-by-pythonnut-on-???
==8348== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8348-by-pythonnut-on-???
==8348==
==8348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8348== don't want to do, unless you know exactly what you're doing,
==8348== or are doing some strange experiment):
==8348== /usr/lib/valgrind/../../bin/vgdb --pid=8348 ...command...
==8348==
==8348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8348== /path/to/gdb ./zsh
==8348== and then give GDB the following command
==8348== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8348
==8348== --pid is optional if only one valgrind process is running
==8348==
--8369-- Caught __NR_exit; running __libc_freeres()
==8369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8369-by-pythonnut-on-???
==8369== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8369-by-pythonnut-on-???
==8369== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8369-by-pythonnut-on-???
==8369==
==8369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8369== don't want to do, unless you know exactly what you're doing,
==8369== or are doing some strange experiment):
==8369== /usr/lib/valgrind/../../bin/vgdb --pid=8369 ...command...
==8369==
==8369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8369== /path/to/gdb ./zsh
==8369== and then give GDB the following command
==8369== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8369
==8369== --pid is optional if only one valgrind process is running
==8369==
--8369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8369==
==8360== Checked 4,629,952 bytes
==8360==
==8369== HEAP SUMMARY:
==8369== in use at exit: 1,368,844 bytes in 28,914 blocks
==8369== total heap usage: 787,567 allocs, 758,653 frees, 54,437,661 bytes allocated
==8369==
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
==8369== Searching for pointers to 28,914 not-freed blocks
--8369-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8369-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8369-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8369-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8369-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8369-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8369-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8369-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8369-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8369-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8369-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8369-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8369-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8369-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8369-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8369-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8369-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8369-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8369-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8369-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8369-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8369-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8369-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8369-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8369-- Scanning root segment: 0x701a000..0x701afff (4096)
--8369-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8369-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8369-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8369-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8369-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8369-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8369-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
==8360== LEAK SUMMARY:
==8360== definitely lost: 253 bytes in 4 blocks
==8360== indirectly lost: 6,756 bytes in 7 blocks
==8360== possibly lost: 0 bytes in 0 blocks
==8360== still reachable: 2,976,739 bytes in 68,312 blocks
==8360== suppressed: 0 bytes in 0 blocks
==8360== Rerun with --leak-check=full to see details of leaked memory
==8360==
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360==
==8360== 1 errors in context 1 of 1:
==8360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8360== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8360== by 0x488CD0: stringsubst (subst.c:301)
==8360== by 0x48801B: prefork (subst.c:77)
==8360== by 0x42B318: execcmd (exec.c:2619)
==8360== by 0x428CA0: execpline2 (exec.c:1697)
==8360== by 0x427FD2: execpline (exec.c:1484)
==8360== by 0x427756: execlist (exec.c:1267)
==8360== by 0x42717C: execode (exec.c:1073)
==8360== by 0x431299: runshfunc (exec.c:5040)
==8360== by 0x430E76: doshfunc (exec.c:4920)
==8360== by 0x4302FB: execshfunc (exec.c:4557)
==8360== by 0x42D8C1: execcmd (exec.c:3373)
==8360==
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF65AC, len 4
client request: code 4d430005, addr 0xFFEFF773C, len 4
==8369== Checked 1,625,320 bytes
==8369==
--8370-- Caught __NR_exit; running __libc_freeres()
==8369== LEAK SUMMARY:
==8369== definitely lost: 253 bytes in 4 blocks
==8369== indirectly lost: 6,756 bytes in 7 blocks
==8369== possibly lost: 0 bytes in 0 blocks
==8369== still reachable: 1,361,835 bytes in 28,903 blocks
client request: code 4d430005, addr 0xFFEFEC84C, len 4
==8369== suppressed: 0 bytes in 0 blocks
==8369== Rerun with --leak-check=full to see details of leaked memory
==8369==
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8369==
==8369== 1 errors in context 1 of 1:
==8369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8369== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8369== by 0x488CD0: stringsubst (subst.c:301)
==8369== by 0x48801B: prefork (subst.c:77)
==8369== by 0x42B318: execcmd (exec.c:2619)
==8369== by 0x428CA0: execpline2 (exec.c:1697)
==8369== by 0x427FD2: execpline (exec.c:1484)
==8369== by 0x427756: execlist (exec.c:1267)
==8369== by 0x42717C: execode (exec.c:1073)
==8369== by 0x431299: runshfunc (exec.c:5040)
==8369== by 0x430E76: doshfunc (exec.c:4920)
==8369== by 0x4302FB: execshfunc (exec.c:4557)
==8369== by 0x42D8C1: execcmd (exec.c:3373)
==8369==
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8368-by-pythonnut-on-???
==8368== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8368-by-pythonnut-on-???
==8368== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8368-by-pythonnut-on-???
==8368==
==8368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8368== don't want to do, unless you know exactly what you're doing,
==8368== or are doing some strange experiment):
==8368== /usr/lib/valgrind/../../bin/vgdb --pid=8368 ...command...
==8368==
==8368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8368== /path/to/gdb ./zsh
==8368== and then give GDB the following command
==8368== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8368
==8368== --pid is optional if only one valgrind process is running
==8368==
client request: code 4d430005, addr 0xFFEFF773C, len 4
==8370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8370-by-pythonnut-on-???
==8370== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8370-by-pythonnut-on-???
==8370== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8370-by-pythonnut-on-???
==8370==
==8370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8370== don't want to do, unless you know exactly what you're doing,
==8370== or are doing some strange experiment):
==8370== /usr/lib/valgrind/../../bin/vgdb --pid=8370 ...command...
==8370==
==8370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8370== /path/to/gdb ./zsh
==8370== and then give GDB the following command
==8370== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8370
==8370== --pid is optional if only one valgrind process is running
==8370==
==8372== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8372-by-pythonnut-on-???
==8372== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8372-by-pythonnut-on-???
==8372== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8372-by-pythonnut-on-???
==8372==
==8372== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8372== don't want to do, unless you know exactly what you're doing,
==8372== or are doing some strange experiment):
==8372== /usr/lib/valgrind/../../bin/vgdb --pid=8372 ...command...
==8372==
==8372== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8372== /path/to/gdb ./zsh
==8372== and then give GDB the following command
==8372== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8372
==8372== --pid is optional if only one valgrind process is running
==8372==
--8370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8373-by-pythonnut-on-???
==8373== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8373-by-pythonnut-on-???
==8373== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8373-by-pythonnut-on-???
==8373==
==8373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8373== don't want to do, unless you know exactly what you're doing,
==8373== or are doing some strange experiment):
==8373== /usr/lib/valgrind/../../bin/vgdb --pid=8373 ...command...
==8373==
==8373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8373== /path/to/gdb ./zsh
==8373== and then give GDB the following command
==8373== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8373
==8373== --pid is optional if only one valgrind process is running
==8373==
==8370==
==8370== HEAP SUMMARY:
==8370== in use at exit: 2,983,755 bytes in 68,323 blocks
==8370== total heap usage: 830,651 allocs, 762,328 frees, 56,963,202 bytes allocated
==8370==
==8374== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8374-by-pythonnut-on-???
==8374== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8374-by-pythonnut-on-???
==8374== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8374-by-pythonnut-on-???
==8374==
==8374== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8374== don't want to do, unless you know exactly what you're doing,
==8374== or are doing some strange experiment):
==8374== /usr/lib/valgrind/../../bin/vgdb --pid=8374 ...command...
==8374==
==8374== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8374== /path/to/gdb ./zsh
==8374== and then give GDB the following command
==8374== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8374
==8374== --pid is optional if only one valgrind process is running
==8374==
==8376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8376-by-pythonnut-on-???
==8376== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8376-by-pythonnut-on-???
==8376== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8376-by-pythonnut-on-???
==8376==
==8376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8376== don't want to do, unless you know exactly what you're doing,
==8376== or are doing some strange experiment):
==8376== /usr/lib/valgrind/../../bin/vgdb --pid=8376 ...command...
==8376==
==8376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8376== /path/to/gdb ./zsh
==8376== and then give GDB the following command
==8376== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8376
==8376== --pid is optional if only one valgrind process is running
==8376==
client request: code 4d430005, addr 0xFFEFF327C, len 4
client request: code 4d430005, addr 0xFFEFF327C, len 4
==8375== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8375-by-pythonnut-on-???
==8375== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8375-by-pythonnut-on-???
==8375== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8375-by-pythonnut-on-???
==8375==
==8375== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8375== don't want to do, unless you know exactly what you're doing,
==8375== or are doing some strange experiment):
==8375== /usr/lib/valgrind/../../bin/vgdb --pid=8375 ...command...
==8375==
==8375== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8375== /path/to/gdb ./zsh
==8375== and then give GDB the following command
==8375== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8375
==8375== --pid is optional if only one valgrind process is running
==8375==
client request: code 4d430005, addr 0xFFEFED4DC, len 4
==8370== Searching for pointers to 68,323 not-freed blocks
--8370-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8370-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8370-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8370-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8370-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8370-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8370-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8370-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8370-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8370-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8370-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8370-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8370-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8370-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8370-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8370-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8370-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8370-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375-- Caught __NR_exit; running __libc_freeres()
--8370-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8370-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8370-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8370-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8370-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8370-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8370-- Scanning root segment: 0x701a000..0x701afff (4096)
--8370-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8370-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8370-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8370-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8370-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8370-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8370-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8370-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8376-- Caught __NR_exit; running __libc_freeres()
--8375-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8375==
==8375== HEAP SUMMARY:
==8375== in use at exit: 3,016,891 bytes in 68,815 blocks
==8375== total heap usage: 834,379 allocs, 765,564 frees, 58,903,628 bytes allocated
==8375==
--8376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8376==
==8376== HEAP SUMMARY:
==8376== in use at exit: 1,372,120 bytes in 28,983 blocks
==8376== total heap usage: 787,704 allocs, 758,721 frees, 54,663,017 bytes allocated
==8376==
==8376== Searching for pointers to 28,983 not-freed blocks
--8376-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8376-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8376-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8376-- Scanning root segment: 0x4035000..0x4038fff (16384)
--8376-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8376-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8376-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8376-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8376-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8376-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8376-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8376-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8376-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8376-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8376-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8376-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8376-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8376-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8376-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8376-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8376-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8376-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8376-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8376-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8376-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8376-- Scanning root segment: 0x701a000..0x701afff (4096)
--8376-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8376-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8376-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8376-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8376-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8376-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8376-- Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8375== Searching for pointers to 68,815 not-freed blocks
--8375-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8375-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8375-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8375-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8375-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8375-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8375-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8375-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8375-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8375-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8375-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8375-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8375-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8375-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8375-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8375-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8375-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8375-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8375-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8375-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8375-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8375-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8375-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8375-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8375-- Scanning root segment: 0x701a000..0x701afff (4096)
--8375-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8375-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8375-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8375-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8375-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8375-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8375-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8375-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8376== Checked 1,649,112 bytes
==8376==
==8376== LEAK SUMMARY:
==8376== definitely lost: 253 bytes in 4 blocks
==8376== indirectly lost: 6,756 bytes in 7 blocks
==8376== possibly lost: 0 bytes in 0 blocks
==8376== still reachable: 1,365,111 bytes in 28,972 blocks
==8376== suppressed: 0 bytes in 0 blocks
==8376== Rerun with --leak-check=full to see details of leaked memory
==8376==
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8376==
==8376== 1 errors in context 1 of 1:
==8376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8376== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8376== by 0x488CD0: stringsubst (subst.c:301)
==8376== by 0x48801B: prefork (subst.c:77)
==8376== by 0x42B318: execcmd (exec.c:2619)
==8376== by 0x428CA0: execpline2 (exec.c:1697)
==8376== by 0x427FD2: execpline (exec.c:1484)
==8376== by 0x427756: execlist (exec.c:1267)
==8376== by 0x42717C: execode (exec.c:1073)
==8376== by 0x431299: runshfunc (exec.c:5040)
==8376== by 0x430E76: doshfunc (exec.c:4920)
==8376== by 0x4302FB: execshfunc (exec.c:4557)
==8376== by 0x42D8C1: execcmd (exec.c:3373)
==8376==
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370== Checked 4,630,088 bytes
==8370==
==8378== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8378-by-pythonnut-on-???
==8378== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8378-by-pythonnut-on-???
==8378== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8378-by-pythonnut-on-???
==8378==
==8378== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8378== don't want to do, unless you know exactly what you're doing,
==8378== or are doing some strange experiment):
==8378== /usr/lib/valgrind/../../bin/vgdb --pid=8378 ...command...
==8378==
==8378== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8378== /path/to/gdb ./zsh
==8378== and then give GDB the following command
==8378== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8378
==8378== --pid is optional if only one valgrind process is running
==8378==
==8370== LEAK SUMMARY:
==8370== definitely lost: 253 bytes in 4 blocks
==8370== indirectly lost: 6,756 bytes in 7 blocks
==8370== possibly lost: 0 bytes in 0 blocks
==8370== still reachable: 2,976,746 bytes in 68,312 blocks
==8370== suppressed: 0 bytes in 0 blocks
==8370== Rerun with --leak-check=full to see details of leaked memory
==8370==
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370==
==8370== 1 errors in context 1 of 1:
==8370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8370== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8370== by 0x488CD0: stringsubst (subst.c:301)
==8370== by 0x48801B: prefork (subst.c:77)
==8370== by 0x42B318: execcmd (exec.c:2619)
==8370== by 0x428CA0: execpline2 (exec.c:1697)
==8370== by 0x427FD2: execpline (exec.c:1484)
==8370== by 0x427756: execlist (exec.c:1267)
==8370== by 0x42717C: execode (exec.c:1073)
==8370== by 0x431299: runshfunc (exec.c:5040)
==8370== by 0x430E76: doshfunc (exec.c:4920)
==8370== by 0x4302FB: execshfunc (exec.c:4557)
==8370== by 0x42D8C1: execcmd (exec.c:3373)
==8370==
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8379-by-pythonnut-on-???
==8379== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8379-by-pythonnut-on-???
==8379== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8379-by-pythonnut-on-???
==8379==
==8379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8379== don't want to do, unless you know exactly what you're doing,
==8379== or are doing some strange experiment):
==8379== /usr/lib/valgrind/../../bin/vgdb --pid=8379 ...command...
==8379==
==8379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8379== /path/to/gdb ./zsh
==8379== and then give GDB the following command
==8379== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8379
==8379== --pid is optional if only one valgrind process is running
==8379==
--8379-- Caught __NR_exit; running __libc_freeres()
--8380-- Caught __NR_exit; running __libc_freeres()
==8380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8380-by-pythonnut-on-???
==8380== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8380-by-pythonnut-on-???
==8380== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8380-by-pythonnut-on-???
==8380==
==8380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8380== don't want to do, unless you know exactly what you're doing,
==8380== or are doing some strange experiment):
==8380== /usr/lib/valgrind/../../bin/vgdb --pid=8380 ...command...
==8380==
==8380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8380== /path/to/gdb ./zsh
==8380== and then give GDB the following command
==8380== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8380
==8380== --pid is optional if only one valgrind process is running
==8380==
==8375== Checked 4,725,768 bytes
==8375==
--8379-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379==
==8379== HEAP SUMMARY:
==8379== in use at exit: 1,445,564 bytes in 28,990 blocks
==8379== total heap usage: 787,712 allocs, 758,722 frees, 54,739,549 bytes allocated
==8379==
--8380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8380==
==8375== LEAK SUMMARY:
==8375== definitely lost: 253 bytes in 4 blocks
==8375== indirectly lost: 6,756 bytes in 7 blocks
==8375== possibly lost: 0 bytes in 0 blocks
==8375== still reachable: 3,009,882 bytes in 68,804 blocks
==8375== suppressed: 0 bytes in 0 blocks
==8375== Rerun with --leak-check=full to see details of leaked memory
==8375==
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8375==
==8375== 1 errors in context 1 of 1:
==8375== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8375== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8375== by 0x488CD0: stringsubst (subst.c:301)
==8375== by 0x48801B: prefork (subst.c:77)
==8375== by 0x42B318: execcmd (exec.c:2619)
==8375== by 0x428CA0: execpline2 (exec.c:1697)
==8375== by 0x427FD2: execpline (exec.c:1484)
==8375== by 0x427756: execlist (exec.c:1267)
==8375== by 0x42717C: execode (exec.c:1073)
==8375== by 0x431299: runshfunc (exec.c:5040)
==8375== by 0x430E76: doshfunc (exec.c:4920)
==8375== by 0x4302FB: execshfunc (exec.c:4557)
==8375== by 0x42D8C1: execcmd (exec.c:3373)
==8375==
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380== HEAP SUMMARY:
==8380== in use at exit: 2,983,915 bytes in 68,324 blocks
==8380== total heap usage: 830,668 allocs, 762,344 frees, 56,968,053 bytes allocated
==8380==
==8379== Searching for pointers to 28,990 not-freed blocks
--8379-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8379-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8379-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8379-- Scanning root segment: 0x4035000..0x4041fff (53248)
--8379-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8379-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8379-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8379-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8379-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8379-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8379-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8379-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8379-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8379-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8379-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8379-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8379-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8379-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8379-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8379-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8379-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8379-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8379-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8379-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8379-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8379-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8379-- Scanning root segment: 0x701a000..0x701afff (4096)
--8379-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8379-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8379-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8379-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8379-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8379-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8379-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Caught __NR_exit; running __libc_freeres()
==8380== Searching for pointers to 68,324 not-freed blocks
--8380-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8380-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8380-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8380-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8380-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8380-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8380-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8380-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8380-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8380-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8380-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8380-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8380-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8380-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8380-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8380-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8380-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8380-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8380-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8380-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8380-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8380-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8380-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8380-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8380-- Scanning root segment: 0x701a000..0x701afff (4096)
--8380-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8380-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8380-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8380-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8380-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8380-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8380-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8380-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379== Checked 1,834,064 bytes
==8379==
==8373==
==8373== HEAP SUMMARY:
==8373== in use at exit: 3,014,741 bytes in 68,736 blocks
==8373== total heap usage: 834,288 allocs, 765,552 frees, 58,704,829 bytes allocated
==8373==
==8379== LEAK SUMMARY:
==8379== definitely lost: 253 bytes in 4 blocks
==8379== indirectly lost: 6,756 bytes in 7 blocks
==8379== possibly lost: 0 bytes in 0 blocks
==8379== still reachable: 1,438,555 bytes in 28,979 blocks
==8379== suppressed: 0 bytes in 0 blocks
==8379== Rerun with --leak-check=full to see details of leaked memory
==8379==
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379==
==8379== 1 errors in context 1 of 1:
==8379== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8379== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8379== by 0x488CD0: stringsubst (subst.c:301)
==8379== by 0x48801B: prefork (subst.c:77)
==8379== by 0x42B318: execcmd (exec.c:2619)
==8379== by 0x428CA0: execpline2 (exec.c:1697)
==8379== by 0x427FD2: execpline (exec.c:1484)
==8379== by 0x427756: execlist (exec.c:1267)
==8379== by 0x42717C: execode (exec.c:1073)
==8379== by 0x431299: runshfunc (exec.c:5040)
==8379== by 0x430E76: doshfunc (exec.c:4920)
==8379== by 0x4302FB: execshfunc (exec.c:4557)
==8379== by 0x42D8C1: execcmd (exec.c:3373)
==8379==
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373== Searching for pointers to 68,736 not-freed blocks
--8373-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8373-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8373-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8373-- Scanning root segment: 0x4037000..0x403efff (32768)
--8373-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8373-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8373-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8373-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8373-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8373-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8373-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8373-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8373-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8373-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8373-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8373-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8373-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8373-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8373-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8373-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8373-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8373-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8373-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8373-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8373-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8373-- Scanning root segment: 0x701a000..0x701afff (4096)
--8373-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8373-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8373-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8373-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8373-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8373-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8373-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8373-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8380== Checked 4,629,432 bytes
==8380==
==8380== LEAK SUMMARY:
==8380== definitely lost: 253 bytes in 4 blocks
==8380== indirectly lost: 6,756 bytes in 7 blocks
==8380== possibly lost: 0 bytes in 0 blocks
==8380== still reachable: 2,976,906 bytes in 68,313 blocks
==8380== suppressed: 0 bytes in 0 blocks
==8380== Rerun with --leak-check=full to see details of leaked memory
==8380==
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380==
==8380== 1 errors in context 1 of 1:
==8380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8380== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8380== by 0x488CD0: stringsubst (subst.c:301)
==8380== by 0x48801B: prefork (subst.c:77)
==8380== by 0x42B318: execcmd (exec.c:2619)
==8380== by 0x428CA0: execpline2 (exec.c:1697)
==8380== by 0x427FD2: execpline (exec.c:1484)
==8380== by 0x427756: execlist (exec.c:1267)
==8380== by 0x42717C: execode (exec.c:1073)
==8380== by 0x431299: runshfunc (exec.c:5040)
==8380== by 0x430E76: doshfunc (exec.c:4920)
==8380== by 0x4302FB: execshfunc (exec.c:4557)
==8380== by 0x42D8C1: execcmd (exec.c:3373)
==8380==
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8381-by-pythonnut-on-???
==8381== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8381-by-pythonnut-on-???
==8381== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8381-by-pythonnut-on-???
==8381==
==8381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8381== don't want to do, unless you know exactly what you're doing,
==8381== or are doing some strange experiment):
==8381== /usr/lib/valgrind/../../bin/vgdb --pid=8381 ...command...
==8381==
==8381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8381== /path/to/gdb ./zsh
==8381== and then give GDB the following command
==8381== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8381
==8381== --pid is optional if only one valgrind process is running
==8381==
==8373== Checked 4,705,520 bytes
==8373==
==8373== LEAK SUMMARY:
==8373== definitely lost: 253 bytes in 4 blocks
==8373== indirectly lost: 6,756 bytes in 7 blocks
==8373== possibly lost: 0 bytes in 0 blocks
==8373== still reachable: 3,007,732 bytes in 68,725 blocks
==8373== suppressed: 0 bytes in 0 blocks
==8373== Rerun with --leak-check=full to see details of leaked memory
==8373==
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373==
==8373== 1 errors in context 1 of 1:
==8373== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8373== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8373== by 0x488CD0: stringsubst (subst.c:301)
==8373== by 0x48801B: prefork (subst.c:77)
==8373== by 0x42B318: execcmd (exec.c:2619)
==8373== by 0x428CA0: execpline2 (exec.c:1697)
==8373== by 0x427FD2: execpline (exec.c:1484)
==8373== by 0x427756: execlist (exec.c:1267)
==8373== by 0x42717C: execode (exec.c:1073)
==8373== by 0x431299: runshfunc (exec.c:5040)
==8373== by 0x430E76: doshfunc (exec.c:4920)
==8373== by 0x4302FB: execshfunc (exec.c:4557)
==8373== by 0x42D8C1: execcmd (exec.c:3373)
==8373==
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8381-- Caught __NR_exit; running __libc_freeres()
==8382== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8382-by-pythonnut-on-???
==8382== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8382-by-pythonnut-on-???
==8382== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8382-by-pythonnut-on-???
==8382==
==8382== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8382== don't want to do, unless you know exactly what you're doing,
==8382== or are doing some strange experiment):
==8382== /usr/lib/valgrind/../../bin/vgdb --pid=8382 ...command...
==8382==
==8382== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8382== /path/to/gdb ./zsh
==8382== and then give GDB the following command
==8382== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8382
==8382== --pid is optional if only one valgrind process is running
==8382==
--8381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8381==
==8381== HEAP SUMMARY:
==8381== in use at exit: 2,984,187 bytes in 68,329 blocks
==8381== total heap usage: 830,716 allocs, 762,387 frees, 56,977,081 bytes allocated
==8381==
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==8383== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8383-by-pythonnut-on-???
==8383== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8383-by-pythonnut-on-???
==8383== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8383-by-pythonnut-on-???
==8383==
==8383== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8383== don't want to do, unless you know exactly what you're doing,
==8383== or are doing some strange experiment):
==8383== /usr/lib/valgrind/../../bin/vgdb --pid=8383 ...command...
==8383==
==8383== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8383== /path/to/gdb ./zsh
==8383== and then give GDB the following command
==8383== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8383
==8383== --pid is optional if only one valgrind process is running
==8383==
--8383-- Caught __NR_exit; running __libc_freeres()
==8381== Searching for pointers to 68,329 not-freed blocks
--8381-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8381-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8381-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8381-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8381-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8381-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8381-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8381-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8381-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8381-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8381-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8381-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8381-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8381-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8381-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8381-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8381-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8381-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8381-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8381-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8381-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8381-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8381-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8381-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8381-- Scanning root segment: 0x701a000..0x701afff (4096)
--8381-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8381-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8381-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8381-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8381-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8381-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8381-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8381-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8383-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383==
==8383== HEAP SUMMARY:
==8383== in use at exit: 3,017,094 bytes in 68,822 blocks
==8383== total heap usage: 834,396 allocs, 765,574 frees, 58,873,765 bytes allocated
==8383==
==8383== Searching for pointers to 68,822 not-freed blocks
--8383-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8383-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8383-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8383-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8383-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8383-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8383-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8383-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8383-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8383-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8383-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8383-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8383-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8383-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8383-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8383-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8383-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8383-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8383-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8383-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8383-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8383-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8383-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8383-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8383-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8383-- Scanning root segment: 0x701a000..0x701afff (4096)
--8383-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8383-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8383-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8383-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8383-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8383-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8383-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8383-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8381== Checked 4,631,072 bytes
==8381==
==8381== LEAK SUMMARY:
==8381== definitely lost: 253 bytes in 4 blocks
==8381== indirectly lost: 6,756 bytes in 7 blocks
==8381== possibly lost: 0 bytes in 0 blocks
==8381== still reachable: 2,977,178 bytes in 68,318 blocks
==8381== suppressed: 0 bytes in 0 blocks
==8381== Rerun with --leak-check=full to see details of leaked memory
==8381==
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381==
==8381== 1 errors in context 1 of 1:
==8381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8381== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8381== by 0x488CD0: stringsubst (subst.c:301)
==8381== by 0x48801B: prefork (subst.c:77)
==8381== by 0x42B318: execcmd (exec.c:2619)
==8381== by 0x428CA0: execpline2 (exec.c:1697)
==8381== by 0x427FD2: execpline (exec.c:1484)
==8381== by 0x427756: execlist (exec.c:1267)
==8381== by 0x42717C: execode (exec.c:1073)
==8381== by 0x431299: runshfunc (exec.c:5040)
==8381== by 0x430E76: doshfunc (exec.c:4920)
==8381== by 0x4302FB: execshfunc (exec.c:4557)
==8381== by 0x42D8C1: execcmd (exec.c:3373)
==8381==
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8384-by-pythonnut-on-???
==8384== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8384-by-pythonnut-on-???
==8384== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8384-by-pythonnut-on-???
==8384==
==8384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8384== don't want to do, unless you know exactly what you're doing,
==8384== or are doing some strange experiment):
==8384== /usr/lib/valgrind/../../bin/vgdb --pid=8384 ...command...
==8384==
==8384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8384== /path/to/gdb ./zsh
==8384== and then give GDB the following command
==8384== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8384
==8384== --pid is optional if only one valgrind process is running
==8384==
--8384-- Caught __NR_exit; running __libc_freeres()
==8383== Checked 4,726,456 bytes
==8383==
--8384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383== LEAK SUMMARY:
==8383== definitely lost: 253 bytes in 4 blocks
==8383== indirectly lost: 6,756 bytes in 7 blocks
==8383== possibly lost: 0 bytes in 0 blocks
==8383== still reachable: 3,010,085 bytes in 68,811 blocks
==8383== suppressed: 0 bytes in 0 blocks
==8383== Rerun with --leak-check=full to see details of leaked memory
==8383==
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8383==
==8383== 1 errors in context 1 of 1:
==8383== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8383== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8383== by 0x488CD0: stringsubst (subst.c:301)
==8383== by 0x48801B: prefork (subst.c:77)
==8383== by 0x42B318: execcmd (exec.c:2619)
==8383== by 0x428CA0: execpline2 (exec.c:1697)
==8383== by 0x427FD2: execpline (exec.c:1484)
==8383== by 0x427756: execlist (exec.c:1267)
==8383== by 0x42717C: execode (exec.c:1073)
==8383== by 0x431299: runshfunc (exec.c:5040)
==8383== by 0x430E76: doshfunc (exec.c:4920)
==8383== by 0x4302FB: execshfunc (exec.c:4557)
==8383== by 0x42D8C1: execcmd (exec.c:3373)
==8383==
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384==
==8384== HEAP SUMMARY:
==8384== in use at exit: 2,984,029 bytes in 68,329 blocks
==8384== total heap usage: 830,695 allocs, 762,366 frees, 56,974,775 bytes allocated
==8384==
--8382-- Caught __NR_exit; running __libc_freeres()
==8384== Searching for pointers to 68,329 not-freed blocks
--8384-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8384-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8384-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8384-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8384-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8384-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8384-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8384-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8384-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8384-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8384-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8384-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8384-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8384-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8384-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8384-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8384-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8384-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8384-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8384-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8384-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8384-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8384-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8384-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8384-- Scanning root segment: 0x701a000..0x701afff (4096)
--8384-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8384-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8384-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8384-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8384-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8384-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8384-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8384-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8382==
==8382== HEAP SUMMARY:
==8382== in use at exit: 3,014,954 bytes in 68,743 blocks
==8382== total heap usage: 834,303 allocs, 765,560 frees, 58,707,706 bytes allocated
==8382==
==8382== Searching for pointers to 68,743 not-freed blocks
--8382-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8382-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8382-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8382-- Scanning root segment: 0x4037000..0x403efff (32768)
--8382-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8382-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8382-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8382-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8382-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8382-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8382-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8382-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8382-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8382-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8382-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8382-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8382-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8382-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8382-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8382-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8382-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8382-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8382-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8382-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8382-- Scanning root segment: 0x701a000..0x701afff (4096)
--8382-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8382-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8382-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8382-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8382-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8382-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8382-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8382-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8378-- Caught __NR_exit; running __libc_freeres()
--8378-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8384== Checked 4,629,464 bytes
==8384==
==8378==
==8378== HEAP SUMMARY:
==8378== in use at exit: 1,409,137 bytes in 28,990 blocks
==8378== total heap usage: 791,430 allocs, 762,440 frees, 55,967,706 bytes allocated
==8378==
==8378== Searching for pointers to 28,990 not-freed blocks
--8378-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8378-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8378-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8378-- Scanning root segment: 0x4035000..0x4041fff (53248)
--8378-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8378-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8378-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8378-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8378-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8378-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8378-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8378-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8378-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8378-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8378-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8378-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8378-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8378-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8378-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8378-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8378-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8378-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8378-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8378-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8378-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8378-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8378-- Scanning root segment: 0x701a000..0x701afff (4096)
--8378-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8378-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8378-- Scanning root segment: 0xae51000..0xae52fff (8192)
==8384== LEAK SUMMARY:
==8384== definitely lost: 253 bytes in 4 blocks
==8384== indirectly lost: 6,756 bytes in 7 blocks
==8384== possibly lost: 0 bytes in 0 blocks
==8384== still reachable: 2,977,020 bytes in 68,318 blocks
==8384== suppressed: 0 bytes in 0 blocks
==8384== Rerun with --leak-check=full to see details of leaked memory
==8384==
--8378-- Scanning root segment: 0xb054000..0xb054fff (4096)
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384==
--8378-- Scanning root segment: 0xb268000..0xb268fff (4096)
==8384== 1 errors in context 1 of 1:
==8384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8384== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8384== by 0x488CD0: stringsubst (subst.c:301)
--8378-- Scanning root segment: 0xb46a000..0xb46afff (4096)
==8384== by 0x48801B: prefork (subst.c:77)
==8384== by 0x42B318: execcmd (exec.c:2619)
==8384== by 0x428CA0: execpline2 (exec.c:1697)
==8384== by 0x427FD2: execpline (exec.c:1484)
--8378-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8384== by 0x427756: execlist (exec.c:1267)
==8384== by 0x42717C: execode (exec.c:1073)
==8384== by 0x431299: runshfunc (exec.c:5040)
==8384== by 0x430E76: doshfunc (exec.c:4920)
==8384== by 0x4302FB: execshfunc (exec.c:4557)
==8384== by 0x42D8C1: execcmd (exec.c:3373)
==8384==
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382== Checked 4,706,232 bytes
==8382==
==8385== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8385-by-pythonnut-on-???
==8385== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8385-by-pythonnut-on-???
==8385== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8385-by-pythonnut-on-???
==8385==
==8385== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8385== don't want to do, unless you know exactly what you're doing,
==8385== or are doing some strange experiment):
==8385== /usr/lib/valgrind/../../bin/vgdb --pid=8385 ...command...
==8385==
==8385== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8385== /path/to/gdb ./zsh
==8385== and then give GDB the following command
==8385== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8385
==8385== --pid is optional if only one valgrind process is running
==8385==
==8378== Checked 1,796,952 bytes
==8378==
==8378== LEAK SUMMARY:
==8378== definitely lost: 253 bytes in 4 blocks
==8378== indirectly lost: 6,756 bytes in 7 blocks
==8378== possibly lost: 0 bytes in 0 blocks
==8378== still reachable: 1,402,128 bytes in 28,979 blocks
==8378== suppressed: 0 bytes in 0 blocks
==8378== Rerun with --leak-check=full to see details of leaked memory
==8378==
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8378==
==8378== 1 errors in context 1 of 1:
==8378== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8378== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8378== by 0x488CD0: stringsubst (subst.c:301)
==8378== by 0x48801B: prefork (subst.c:77)
==8378== by 0x42B318: execcmd (exec.c:2619)
==8378== by 0x428CA0: execpline2 (exec.c:1697)
==8378== by 0x427FD2: execpline (exec.c:1484)
==8378== by 0x427756: execlist (exec.c:1267)
==8378== by 0x42717C: execode (exec.c:1073)
==8378== by 0x431299: runshfunc (exec.c:5040)
==8378== by 0x430E76: doshfunc (exec.c:4920)
==8378== by 0x4302FB: execshfunc (exec.c:4557)
==8378== by 0x42D8C1: execcmd (exec.c:3373)
==8378==
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8385-- Caught __NR_exit; running __libc_freeres()
==8382== LEAK SUMMARY:
==8382== definitely lost: 253 bytes in 4 blocks
==8382== indirectly lost: 6,756 bytes in 7 blocks
==8382== possibly lost: 0 bytes in 0 blocks
==8382== still reachable: 3,007,945 bytes in 68,732 blocks
==8382== suppressed: 0 bytes in 0 blocks
==8382== Rerun with --leak-check=full to see details of leaked memory
==8382==
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382==
==8382== 1 errors in context 1 of 1:
==8382== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8382== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8382== by 0x488CD0: stringsubst (subst.c:301)
==8382== by 0x48801B: prefork (subst.c:77)
==8382== by 0x42B318: execcmd (exec.c:2619)
==8382== by 0x428CA0: execpline2 (exec.c:1697)
==8382== by 0x427FD2: execpline (exec.c:1484)
==8382== by 0x427756: execlist (exec.c:1267)
==8382== by 0x42717C: execode (exec.c:1073)
==8382== by 0x431299: runshfunc (exec.c:5040)
==8382== by 0x430E76: doshfunc (exec.c:4920)
==8382== by 0x4302FB: execshfunc (exec.c:4557)
==8382== by 0x42D8C1: execcmd (exec.c:3373)
==8382==
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8386-by-pythonnut-on-???
==8386== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8386-by-pythonnut-on-???
==8386== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8386-by-pythonnut-on-???
==8386==
==8386== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8386== don't want to do, unless you know exactly what you're doing,
==8386== or are doing some strange experiment):
==8386== /usr/lib/valgrind/../../bin/vgdb --pid=8386 ...command...
==8386==
==8386== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8386== /path/to/gdb ./zsh
==8386== and then give GDB the following command
==8386== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8386
==8386== --pid is optional if only one valgrind process is running
==8386==
--8385-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8387-by-pythonnut-on-???
==8387== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8387-by-pythonnut-on-???
==8387== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8387-by-pythonnut-on-???
==8387==
==8387== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8387== don't want to do, unless you know exactly what you're doing,
==8387== or are doing some strange experiment):
==8387== /usr/lib/valgrind/../../bin/vgdb --pid=8387 ...command...
==8387==
==8387== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8387== /path/to/gdb ./zsh
==8387== and then give GDB the following command
==8387== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8387
==8387== --pid is optional if only one valgrind process is running
==8387==
==8385==
==8385== HEAP SUMMARY:
==8385== in use at exit: 2,984,064 bytes in 68,330 blocks
==8385== total heap usage: 830,708 allocs, 762,378 frees, 56,977,469 bytes allocated
==8385==
--8387-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE75C, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==8388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8388-by-pythonnut-on-???
==8388== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8388-by-pythonnut-on-???
==8388== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8388-by-pythonnut-on-???
==8388==
==8388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8388== don't want to do, unless you know exactly what you're doing,
==8388== or are doing some strange experiment):
==8388== /usr/lib/valgrind/../../bin/vgdb --pid=8388 ...command...
==8388==
==8388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8388== /path/to/gdb ./zsh
==8388== and then give GDB the following command
==8388== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8388
==8388== --pid is optional if only one valgrind process is running
==8388==
--8389-- Caught __NR_exit; running __libc_freeres()
==8385== Searching for pointers to 68,330 not-freed blocks
--8385-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8385-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8385-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8385-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8385-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8385-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8385-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8385-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8385-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8385-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8385-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8385-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8385-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8385-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8385-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8385-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8385-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8385-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8385-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8385-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8385-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8385-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8385-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8385-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8385-- Scanning root segment: 0x701a000..0x701afff (4096)
--8385-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8385-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8385-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8385-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8385-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8385-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8385-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8385-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8387-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8388-- Caught __NR_exit; running __libc_freeres()
==8389== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8389-by-pythonnut-on-???
==8389== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8389-by-pythonnut-on-???
==8389== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8389-by-pythonnut-on-???
==8389==
==8389== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8389== don't want to do, unless you know exactly what you're doing,
==8389== or are doing some strange experiment):
==8389== /usr/lib/valgrind/../../bin/vgdb --pid=8389 ...command...
==8389==
==8389== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8389== /path/to/gdb ./zsh
==8389== and then give GDB the following command
==8389== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8389
==8389== --pid is optional if only one valgrind process is running
==8389==
==8387==
==8387== HEAP SUMMARY:
==8387== in use at exit: 1,415,351 bytes in 28,990 blocks
==8387== total heap usage: 787,717 allocs, 758,727 frees, 54,748,044 bytes allocated
==8387==
--8389-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== Searching for pointers to 28,990 not-freed blocks
--8387-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8387-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8387-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8387-- Scanning root segment: 0x4035000..0x4041fff (53248)
--8387-- Scanning root segment: 0x4043000..0x4046fff (16384)
==8389==
--8387-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8387-- Scanning root segment: 0x41d6000..0x4204fff (192512)
--8387-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8387-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8387-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8387-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8387-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8387-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8387-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8387-- Scanning root segment: 0x54ac000..0x54acfff (4096)
==8389== HEAP SUMMARY:
==8389== in use at exit: 1,393,879 bytes in 28,990 blocks
==8389== total heap usage: 787,723 allocs, 758,733 frees, 54,750,164 bytes allocated
==8389==
--8387-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8387-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8387-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8387-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8387-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8387-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8387-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8387-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8387-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8387-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8387-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8387-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8387-- Scanning root segment: 0x701a000..0x701afff (4096)
--8387-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8387-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8387-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8387-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8387-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8387-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8387-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8389== Searching for pointers to 28,990 not-freed blocks
--8389-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8389-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8389-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8389-- Scanning root segment: 0x4035000..0x4041fff (53248)
==8388==
--8389-- Scanning root segment: 0x4043000..0x4046fff (16384)
--8389-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8389-- Scanning root segment: 0x41d6000..0x4204fff (192512)
--8389-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8389-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8389-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8389-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8389-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8389-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8389-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8389-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8389-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8389-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8389-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8389-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8389-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8389-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8389-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8389-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8389-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8389-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8389-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8389-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8389-- Scanning root segment: 0x701a000..0x701afff (4096)
--8389-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8389-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8389-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8389-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8389-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8389-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8389-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8388== HEAP SUMMARY:
==8388== in use at exit: 3,017,079 bytes in 68,822 blocks
==8388== total heap usage: 834,406 allocs, 765,584 frees, 58,843,698 bytes allocated
==8388==
==8387== Checked 1,937,992 bytes
==8387==
==8388== Searching for pointers to 68,822 not-freed blocks
--8388-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8387== LEAK SUMMARY:
==8387== definitely lost: 253 bytes in 4 blocks
==8387== indirectly lost: 6,756 bytes in 7 blocks
==8387== possibly lost: 0 bytes in 0 blocks
==8387== still reachable: 1,408,342 bytes in 28,979 blocks
==8387== suppressed: 0 bytes in 0 blocks
==8387== Rerun with --leak-check=full to see details of leaked memory
==8387==
--8388-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8387==
==8387== 1 errors in context 1 of 1:
==8387== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8387== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8387== by 0x488CD0: stringsubst (subst.c:301)
==8387== by 0x48801B: prefork (subst.c:77)
==8387== by 0x42B318: execcmd (exec.c:2619)
==8387== by 0x428CA0: execpline2 (exec.c:1697)
==8387== by 0x427FD2: execpline (exec.c:1484)
==8387== by 0x427756: execlist (exec.c:1267)
==8387== by 0x42717C: execode (exec.c:1073)
==8387== by 0x431299: runshfunc (exec.c:5040)
==8387== by 0x430E76: doshfunc (exec.c:4920)
==8387== by 0x4302FB: execshfunc (exec.c:4557)
==8387== by 0x42D8C1: execcmd (exec.c:3373)
==8387==
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8388-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8388-- Scanning root segment: 0x4037000..0x4042fff (49152)
==8389== Checked 1,916,640 bytes
==8389==
--8388-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8388-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8388-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8388-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8388-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8388-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8388-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8388-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8388-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8388-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8388-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8388-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8388-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8388-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8388-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8388-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8388-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8388-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8388-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8388-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8388-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8388-- Scanning root segment: 0x701a000..0x701afff (4096)
--8388-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8388-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8388-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8388-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8388-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8388-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8388-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8388-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8389== LEAK SUMMARY:
==8389== definitely lost: 277 bytes in 5 blocks
==8389== indirectly lost: 6,796 bytes in 9 blocks
==8389== possibly lost: 0 bytes in 0 blocks
==8389== still reachable: 1,386,806 bytes in 28,976 blocks
==8389== suppressed: 0 bytes in 0 blocks
==8389== Rerun with --leak-check=full to see details of leaked memory
==8389==
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8389==
==8389== 1 errors in context 1 of 1:
==8389== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8389== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8389== by 0x488CD0: stringsubst (subst.c:301)
==8389== by 0x48801B: prefork (subst.c:77)
==8389== by 0x42B318: execcmd (exec.c:2619)
==8389== by 0x428CA0: execpline2 (exec.c:1697)
==8389== by 0x427FD2: execpline (exec.c:1484)
==8389== by 0x427756: execlist (exec.c:1267)
==8389== by 0x42717C: execode (exec.c:1073)
==8389== by 0x431299: runshfunc (exec.c:5040)
==8389== by 0x430E76: doshfunc (exec.c:4920)
==8389== by 0x4302FB: execshfunc (exec.c:4557)
==8389== by 0x42D8C1: execcmd (exec.c:3373)
==8389==
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385== Checked 4,629,024 bytes
==8385==
==8391== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8391-by-pythonnut-on-???
==8391== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8391-by-pythonnut-on-???
==8391== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8391-by-pythonnut-on-???
==8391==
==8391== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8391== don't want to do, unless you know exactly what you're doing,
==8391== or are doing some strange experiment):
==8391== /usr/lib/valgrind/../../bin/vgdb --pid=8391 ...command...
==8391==
==8391== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8391== /path/to/gdb ./zsh
==8391== and then give GDB the following command
==8391== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8391
==8391== --pid is optional if only one valgrind process is running
==8391==
client request: code 4d430005, addr 0xFFEFEF0DC, len 4
==8385== LEAK SUMMARY:
==8385== definitely lost: 253 bytes in 4 blocks
==8385== indirectly lost: 6,756 bytes in 7 blocks
==8385== possibly lost: 0 bytes in 0 blocks
==8385== still reachable: 2,977,055 bytes in 68,319 blocks
==8385== suppressed: 0 bytes in 0 blocks
==8385== Rerun with --leak-check=full to see details of leaked memory
==8385==
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385==
==8385== 1 errors in context 1 of 1:
==8385== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8385== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8385== by 0x488CD0: stringsubst (subst.c:301)
==8385== by 0x48801B: prefork (subst.c:77)
==8385== by 0x42B318: execcmd (exec.c:2619)
==8385== by 0x428CA0: execpline2 (exec.c:1697)
==8385== by 0x427FD2: execpline (exec.c:1484)
==8385== by 0x427756: execlist (exec.c:1267)
==8385== by 0x42717C: execode (exec.c:1073)
==8385== by 0x431299: runshfunc (exec.c:5040)
==8385== by 0x430E76: doshfunc (exec.c:4920)
==8385== by 0x4302FB: execshfunc (exec.c:4557)
==8385== by 0x42D8C1: execcmd (exec.c:3373)
==8385==
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8374-- Caught __NR_exit; running __libc_freeres()
==8392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8392-by-pythonnut-on-???
==8392== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8392-by-pythonnut-on-???
==8392== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8392-by-pythonnut-on-???
==8392==
==8392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8392== don't want to do, unless you know exactly what you're doing,
==8392== or are doing some strange experiment):
==8392== /usr/lib/valgrind/../../bin/vgdb --pid=8392 ...command...
==8392==
==8392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8392== /path/to/gdb ./zsh
==8392== and then give GDB the following command
==8392== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8392
==8392== --pid is optional if only one valgrind process is running
==8392==
--8374-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8392-- Caught __NR_exit; running __libc_freeres()
==8374==
==8374== HEAP SUMMARY:
==8374== in use at exit: 1,371,697 bytes in 28,972 blocks
==8374== total heap usage: 787,724 allocs, 758,752 frees, 54,750,732 bytes allocated
==8374==
==8374== Searching for pointers to 28,972 not-freed blocks
--8374-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8374-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8374-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8374-- Scanning root segment: 0x4035000..0x4038fff (16384)
==8388== Checked 4,726,456 bytes
--8374-- Scanning root segment: 0x4049000..0x404cfff (16384)
==8388==
--8374-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8374-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8374-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8374-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8374-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8374-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8374-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8374-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8374-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8374-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8374-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8374-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8374-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8374-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8374-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8374-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8374-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8374-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8374-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8374-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8374-- Scanning root segment: 0x701a000..0x701afff (4096)
--8374-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8374-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8374-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8374-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8374-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8374-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8374-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392==
==8388== LEAK SUMMARY:
==8388== definitely lost: 253 bytes in 4 blocks
==8388== indirectly lost: 6,756 bytes in 7 blocks
==8388== possibly lost: 0 bytes in 0 blocks
==8388== still reachable: 3,010,070 bytes in 68,811 blocks
==8388== suppressed: 0 bytes in 0 blocks
==8388== Rerun with --leak-check=full to see details of leaked memory
==8388==
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8388==
==8388== 1 errors in context 1 of 1:
==8388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8388== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8388== by 0x488CD0: stringsubst (subst.c:301)
==8388== by 0x48801B: prefork (subst.c:77)
==8388== by 0x42B318: execcmd (exec.c:2619)
==8388== by 0x428CA0: execpline2 (exec.c:1697)
==8388== by 0x427FD2: execpline (exec.c:1484)
==8388== by 0x427756: execlist (exec.c:1267)
==8388== by 0x42717C: execode (exec.c:1073)
==8388== by 0x431299: runshfunc (exec.c:5040)
==8388== by 0x430E76: doshfunc (exec.c:4920)
==8388== by 0x4302FB: execshfunc (exec.c:4557)
==8388== by 0x42D8C1: execcmd (exec.c:3373)
==8388==
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392== HEAP SUMMARY:
==8392== in use at exit: 2,982,589 bytes in 68,270 blocks
==8392== total heap usage: 830,678 allocs, 762,408 frees, 56,980,498 bytes allocated
==8392==
==8374== Checked 1,646,632 bytes
==8374==
--8386-- Caught __NR_exit; running __libc_freeres()
==8374== LEAK SUMMARY:
==8374== definitely lost: 253 bytes in 4 blocks
==8374== indirectly lost: 6,756 bytes in 7 blocks
==8374== possibly lost: 0 bytes in 0 blocks
==8374== still reachable: 1,364,688 bytes in 28,961 blocks
==8374== suppressed: 0 bytes in 0 blocks
==8374== Rerun with --leak-check=full to see details of leaked memory
==8374==
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8374==
==8374== 1 errors in context 1 of 1:
==8374== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8374== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8374== by 0x488CD0: stringsubst (subst.c:301)
==8374== by 0x48801B: prefork (subst.c:77)
==8374== by 0x42B318: execcmd (exec.c:2619)
==8374== by 0x428CA0: execpline2 (exec.c:1697)
==8374== by 0x427FD2: execpline (exec.c:1484)
==8374== by 0x427756: execlist (exec.c:1267)
==8374== by 0x42717C: execode (exec.c:1073)
==8374== by 0x431299: runshfunc (exec.c:5040)
==8374== by 0x430E76: doshfunc (exec.c:4920)
==8374== by 0x4302FB: execshfunc (exec.c:4557)
==8374== by 0x42D8C1: execcmd (exec.c:3373)
==8374==
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8386-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392== Searching for pointers to 68,270 not-freed blocks
--8392-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8392-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8392-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8392-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8392-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8392-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8392-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8392-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8392-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8392-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8392-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8392-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8392-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8392-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8392-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8392-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8392-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8392-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8392-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8392-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8392-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8392-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8392-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8392-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8392-- Scanning root segment: 0x701a000..0x701afff (4096)
--8392-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8392-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8392-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8392-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8392-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8392-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8392-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8392-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386==
==8393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8393-by-pythonnut-on-???
==8393== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8393-by-pythonnut-on-???
==8393== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8393-by-pythonnut-on-???
==8393==
==8393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8393== don't want to do, unless you know exactly what you're doing,
==8393== or are doing some strange experiment):
==8393== /usr/lib/valgrind/../../bin/vgdb --pid=8393 ...command...
==8393==
==8393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8393== /path/to/gdb ./zsh
==8393== and then give GDB the following command
==8393== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8393
==8393== --pid is optional if only one valgrind process is running
==8393==
==8386== HEAP SUMMARY:
==8386== in use at exit: 3,014,949 bytes in 68,743 blocks
==8386== total heap usage: 834,313 allocs, 765,570 frees, 58,710,458 bytes allocated
==8386==
--8393-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEFEDC, len 4
==8386== Searching for pointers to 68,743 not-freed blocks
--8386-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8386-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8386-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8386-- Scanning root segment: 0x4037000..0x403efff (32768)
--8386-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8386-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8386-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8386-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8386-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8386-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8386-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8386-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8386-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8386-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8386-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8386-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8386-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8386-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8386-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8386-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8386-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8386-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8386-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8386-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8386-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8386-- Scanning root segment: 0x701a000..0x701afff (4096)
--8386-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8386-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8386-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8386-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8386-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8386-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8386-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8386-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8393==
==8393== HEAP SUMMARY:
==8393== in use at exit: 1,409,207 bytes in 28,973 blocks
==8393== total heap usage: 787,688 allocs, 758,715 frees, 54,701,568 bytes allocated
==8393==
==8393== Searching for pointers to 28,973 not-freed blocks
--8393-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8393-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8393-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8393-- Scanning root segment: 0x4035000..0x4038fff (16384)
--8393-- Scanning root segment: 0x403a000..0x4047fff (57344)
--8393-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8393-- Scanning root segment: 0x41d6000..0x41edfff (98304)
--8393-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8393-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8393-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8393-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8393-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8393-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8393-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8393-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8393-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8393-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8393-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8393-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8393-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8393-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8393-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8393-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8393-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8393-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8393-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8393-- Scanning root segment: 0x701a000..0x701afff (4096)
--8393-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8393-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8393-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8393-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8393-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8393-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8393-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8393== Checked 1,840,504 bytes
==8393==
==8393== LEAK SUMMARY:
==8393== definitely lost: 253 bytes in 4 blocks
==8393== indirectly lost: 6,756 bytes in 7 blocks
==8393== possibly lost: 0 bytes in 0 blocks
==8393== still reachable: 1,402,198 bytes in 28,962 blocks
==8393== suppressed: 0 bytes in 0 blocks
==8393== Rerun with --leak-check=full to see details of leaked memory
==8393==
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8393==
==8393== 1 errors in context 1 of 1:
==8393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8393== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8393== by 0x488CD0: stringsubst (subst.c:301)
==8393== by 0x48801B: prefork (subst.c:77)
==8393== by 0x42B318: execcmd (exec.c:2619)
==8393== by 0x428CA0: execpline2 (exec.c:1697)
==8393== by 0x427FD2: execpline (exec.c:1484)
==8393== by 0x427756: execlist (exec.c:1267)
==8393== by 0x42717C: execode (exec.c:1073)
==8393== by 0x431299: runshfunc (exec.c:5040)
==8393== by 0x430E76: doshfunc (exec.c:4920)
==8393== by 0x4302FB: execshfunc (exec.c:4557)
==8393== by 0x42D8C1: execcmd (exec.c:3373)
==8393==
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Caught __NR_exit; running __libc_freeres()
==8392== Checked 4,628,456 bytes
==8392==
==8392== LEAK SUMMARY:
==8392== definitely lost: 253 bytes in 4 blocks
==8392== indirectly lost: 6,756 bytes in 7 blocks
==8392== possibly lost: 0 bytes in 0 blocks
==8392== still reachable: 2,975,580 bytes in 68,259 blocks
==8392== suppressed: 0 bytes in 0 blocks
==8392== Rerun with --leak-check=full to see details of leaked memory
==8392==
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392==
==8392== 1 errors in context 1 of 1:
==8392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8392== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8392== by 0x488CD0: stringsubst (subst.c:301)
==8392== by 0x48801B: prefork (subst.c:77)
==8392== by 0x42B318: execcmd (exec.c:2619)
==8392== by 0x428CA0: execpline2 (exec.c:1697)
==8392== by 0x427FD2: execpline (exec.c:1484)
==8392== by 0x427756: execlist (exec.c:1267)
==8392== by 0x42717C: execode (exec.c:1073)
==8392== by 0x431299: runshfunc (exec.c:5040)
==8392== by 0x430E76: doshfunc (exec.c:4920)
==8392== by 0x4302FB: execshfunc (exec.c:4557)
==8392== by 0x42D8C1: execcmd (exec.c:3373)
==8392==
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8386== Checked 4,706,224 bytes
==8386==
==8372==
==8372== HEAP SUMMARY:
==8372== in use at exit: 1,370,462 bytes in 28,940 blocks
==8372== total heap usage: 787,691 allocs, 758,751 frees, 54,702,144 bytes allocated
==8372==
==8372== Searching for pointers to 28,940 not-freed blocks
--8372-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8372-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8372-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8372-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8372-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8372-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8372-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8372-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8372-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8372-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8372-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8372-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8372-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8372-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8372-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8372-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8372-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8372-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8372-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8372-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8372-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8372-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8372-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8372-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8372-- Scanning root segment: 0x701a000..0x701afff (4096)
--8372-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8372-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8372-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8372-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8372-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8372-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8372-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386== LEAK SUMMARY:
==8386== definitely lost: 253 bytes in 4 blocks
==8386== indirectly lost: 6,756 bytes in 7 blocks
==8386== possibly lost: 0 bytes in 0 blocks
==8386== still reachable: 3,007,940 bytes in 68,732 blocks
==8386== suppressed: 0 bytes in 0 blocks
==8386== Rerun with --leak-check=full to see details of leaked memory
==8386==
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386==
==8386== 1 errors in context 1 of 1:
==8386== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8386== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8386== by 0x488CD0: stringsubst (subst.c:301)
==8386== by 0x48801B: prefork (subst.c:77)
==8386== by 0x42B318: execcmd (exec.c:2619)
==8386== by 0x428CA0: execpline2 (exec.c:1697)
==8386== by 0x427FD2: execpline (exec.c:1484)
==8386== by 0x427756: execlist (exec.c:1267)
==8386== by 0x42717C: execode (exec.c:1073)
==8386== by 0x431299: runshfunc (exec.c:5040)
==8386== by 0x430E76: doshfunc (exec.c:4920)
==8386== by 0x4302FB: execshfunc (exec.c:4557)
==8386== by 0x42D8C1: execcmd (exec.c:3373)
==8386==
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8395-by-pythonnut-on-???
==8395== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8395-by-pythonnut-on-???
==8395== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8395-by-pythonnut-on-???
==8395==
==8395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8395== don't want to do, unless you know exactly what you're doing,
==8395== or are doing some strange experiment):
==8395== /usr/lib/valgrind/../../bin/vgdb --pid=8395 ...command...
==8395==
==8395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8395== /path/to/gdb ./zsh
==8395== and then give GDB the following command
==8395== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8395
==8395== --pid is optional if only one valgrind process is running
==8395==
==8372== Checked 1,627,256 bytes
==8372==
==8372== LEAK SUMMARY:
==8372== definitely lost: 253 bytes in 4 blocks
==8372== indirectly lost: 6,756 bytes in 7 blocks
==8372== possibly lost: 0 bytes in 0 blocks
==8372== still reachable: 1,363,453 bytes in 28,929 blocks
==8372== suppressed: 0 bytes in 0 blocks
==8372== Rerun with --leak-check=full to see details of leaked memory
==8372==
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8372==
==8372== 1 errors in context 1 of 1:
==8372== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8372== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8372== by 0x488CD0: stringsubst (subst.c:301)
==8372== by 0x48801B: prefork (subst.c:77)
==8372== by 0x42B318: execcmd (exec.c:2619)
==8372== by 0x428CA0: execpline2 (exec.c:1697)
==8372== by 0x427FD2: execpline (exec.c:1484)
==8372== by 0x427756: execlist (exec.c:1267)
==8372== by 0x42717C: execode (exec.c:1073)
==8372== by 0x431299: runshfunc (exec.c:5040)
==8372== by 0x430E76: doshfunc (exec.c:4920)
==8372== by 0x4302FB: execshfunc (exec.c:4557)
==8372== by 0x42D8C1: execcmd (exec.c:3373)
==8372==
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==8396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8396-by-pythonnut-on-???
==8396== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8396-by-pythonnut-on-???
==8396== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8396-by-pythonnut-on-???
==8396==
==8396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8396== don't want to do, unless you know exactly what you're doing,
==8396== or are doing some strange experiment):
==8396== /usr/lib/valgrind/../../bin/vgdb --pid=8396 ...command...
==8396==
==8396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8396== /path/to/gdb ./zsh
==8396== and then give GDB the following command
==8396== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8396
==8396== --pid is optional if only one valgrind process is running
==8396==
--8396-- Caught __NR_exit; running __libc_freeres()
==8397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8397-by-pythonnut-on-???
==8397== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8397-by-pythonnut-on-???
==8397== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8397-by-pythonnut-on-???
==8397==
==8397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8397== don't want to do, unless you know exactly what you're doing,
==8397== or are doing some strange experiment):
==8397== /usr/lib/valgrind/../../bin/vgdb --pid=8397 ...command...
==8397==
==8397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8397== /path/to/gdb ./zsh
==8397== and then give GDB the following command
==8397== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8397
==8397== --pid is optional if only one valgrind process is running
==8397==
--8396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8396==
==8396== HEAP SUMMARY:
==8396== in use at exit: 3,017,044 bytes in 68,822 blocks
==8396== total heap usage: 834,418 allocs, 765,596 frees, 58,813,649 bytes allocated
==8396==
--8397-- Caught __NR_exit; running __libc_freeres()
==8396== Searching for pointers to 68,822 not-freed blocks
--8396-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8396-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8396-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8396-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8396-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8396-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8396-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8396-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8396-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8396-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8396-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8396-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8396-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8396-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8396-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8396-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8396-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8396-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8396-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8396-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8396-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8396-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8396-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8396-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8396-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8396-- Scanning root segment: 0x701a000..0x701afff (4096)
--8396-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8396-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8396-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8396-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8396-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8396-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8396-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8396-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
--8397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8397==
==8397== HEAP SUMMARY:
==8397== in use at exit: 3,006,086 bytes in 68,429 blocks
==8397== total heap usage: 831,152 allocs, 762,723 frees, 57,041,470 bytes allocated
==8397==
==8397== Searching for pointers to 68,429 not-freed blocks
--8397-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8397-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8397-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8397-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8397-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8397-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8397-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8397-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8397-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8397-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8397-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8397-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8397-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8397-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8397-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8397-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8397-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8397-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8397-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8397-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8397-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8397-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8397-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8397-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8397-- Scanning root segment: 0x701a000..0x701afff (4096)
--8397-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8397-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8397-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8397-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8397-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8397-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8397-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8397-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8396== Checked 4,726,424 bytes
==8396==
==8396== LEAK SUMMARY:
==8396== definitely lost: 253 bytes in 4 blocks
==8396== indirectly lost: 6,756 bytes in 7 blocks
==8396== possibly lost: 0 bytes in 0 blocks
==8396== still reachable: 3,010,035 bytes in 68,811 blocks
==8396== suppressed: 0 bytes in 0 blocks
==8396== Rerun with --leak-check=full to see details of leaked memory
==8396==
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8396==
==8396== 1 errors in context 1 of 1:
==8396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8396== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8396== by 0x488CD0: stringsubst (subst.c:301)
==8396== by 0x48801B: prefork (subst.c:77)
==8396== by 0x42B318: execcmd (exec.c:2619)
==8396== by 0x428CA0: execpline2 (exec.c:1697)
==8396== by 0x427FD2: execpline (exec.c:1484)
==8396== by 0x427756: execlist (exec.c:1267)
==8396== by 0x42717C: execode (exec.c:1073)
==8396== by 0x431299: runshfunc (exec.c:5040)
==8396== by 0x430E76: doshfunc (exec.c:4920)
==8396== by 0x4302FB: execshfunc (exec.c:4557)
==8396== by 0x42D8C1: execcmd (exec.c:3373)
==8396==
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Caught __NR_exit; running __libc_freeres()
==8397== Checked 4,641,936 bytes
==8397==
==8397== LEAK SUMMARY:
==8397== definitely lost: 253 bytes in 4 blocks
==8397== indirectly lost: 6,756 bytes in 7 blocks
==8397== possibly lost: 0 bytes in 0 blocks
==8397== still reachable: 2,999,077 bytes in 68,418 blocks
==8397== suppressed: 0 bytes in 0 blocks
==8397== Rerun with --leak-check=full to see details of leaked memory
==8397==
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8397==
==8397== 1 errors in context 1 of 1:
==8397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8397== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8397== by 0x488CD0: stringsubst (subst.c:301)
==8397== by 0x48801B: prefork (subst.c:77)
==8397== by 0x42B318: execcmd (exec.c:2619)
==8397== by 0x428CA0: execpline2 (exec.c:1697)
==8397== by 0x427FD2: execpline (exec.c:1484)
==8397== by 0x427756: execlist (exec.c:1267)
==8397== by 0x42717C: execode (exec.c:1073)
==8397== by 0x431299: runshfunc (exec.c:5040)
==8397== by 0x430E76: doshfunc (exec.c:4920)
==8397== by 0x4302FB: execshfunc (exec.c:4557)
==8397== by 0x42D8C1: execcmd (exec.c:3373)
==8397==
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8395==
==8395== HEAP SUMMARY:
==8395== in use at exit: 3,014,944 bytes in 68,743 blocks
==8395== total heap usage: 834,325 allocs, 765,582 frees, 58,713,253 bytes allocated
==8395==
==8398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8398-by-pythonnut-on-???
==8398== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8398-by-pythonnut-on-???
==8398== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8398-by-pythonnut-on-???
==8398==
==8398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8398== don't want to do, unless you know exactly what you're doing,
==8398== or are doing some strange experiment):
==8398== /usr/lib/valgrind/../../bin/vgdb --pid=8398 ...command...
==8398==
==8398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8398== /path/to/gdb ./zsh
==8398== and then give GDB the following command
==8398== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8398
==8398== --pid is optional if only one valgrind process is running
==8398==
==8395== Searching for pointers to 68,743 not-freed blocks
--8395-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8395-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8395-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8395-- Scanning root segment: 0x4037000..0x403efff (32768)
--8395-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8395-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8395-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8395-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8395-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8395-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8395-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8395-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8395-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8395-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8395-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8395-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8395-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8395-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8395-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8395-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8395-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8395-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8395-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8395-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8395-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8395-- Scanning root segment: 0x701a000..0x701afff (4096)
--8395-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8395-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8395-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8395-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8395-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8395-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8395-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8395-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8399-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==8399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8399-by-pythonnut-on-???
==8399== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8399-by-pythonnut-on-???
==8399== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8399-by-pythonnut-on-???
==8399==
==8399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8399== don't want to do, unless you know exactly what you're doing,
==8399== or are doing some strange experiment):
==8399== /usr/lib/valgrind/../../bin/vgdb --pid=8399 ...command...
==8399==
==8399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8399== /path/to/gdb ./zsh
==8399== and then give GDB the following command
==8399== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8399
==8399== --pid is optional if only one valgrind process is running
==8399==
--8399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399==
==8399== HEAP SUMMARY:
==8399== in use at exit: 3,010,269 bytes in 68,529 blocks
==8399== total heap usage: 831,069 allocs, 762,540 frees, 57,027,560 bytes allocated
==8399==
==8399== Searching for pointers to 68,529 not-freed blocks
--8399-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8399-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8399-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8399-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8399-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8399-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8399-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8399-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8399-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8399-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8399-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8399-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8399-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8399-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8399-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8399-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8399-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8399-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8399-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8399-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8399-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8399-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8399-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8399-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8399-- Scanning root segment: 0x701a000..0x701afff (4096)
--8399-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8399-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8399-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8399-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8399-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8399-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8399-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8399-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8395== Checked 4,706,224 bytes
==8395==
==8395== LEAK SUMMARY:
==8395== definitely lost: 253 bytes in 4 blocks
==8395== indirectly lost: 6,756 bytes in 7 blocks
==8395== possibly lost: 0 bytes in 0 blocks
==8395== still reachable: 3,007,935 bytes in 68,732 blocks
==8395== suppressed: 0 bytes in 0 blocks
==8395== Rerun with --leak-check=full to see details of leaked memory
==8395==
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395==
==8395== 1 errors in context 1 of 1:
==8395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8395== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8395== by 0x488CD0: stringsubst (subst.c:301)
==8395== by 0x48801B: prefork (subst.c:77)
==8395== by 0x42B318: execcmd (exec.c:2619)
==8395== by 0x428CA0: execpline2 (exec.c:1697)
==8395== by 0x427FD2: execpline (exec.c:1484)
==8395== by 0x427756: execlist (exec.c:1267)
==8395== by 0x42717C: execode (exec.c:1073)
==8395== by 0x431299: runshfunc (exec.c:5040)
==8395== by 0x430E76: doshfunc (exec.c:4920)
==8395== by 0x4302FB: execshfunc (exec.c:4557)
==8395== by 0x42D8C1: execcmd (exec.c:3373)
==8395==
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8401-by-pythonnut-on-???
==8401== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8401-by-pythonnut-on-???
==8401== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8401-by-pythonnut-on-???
==8401==
==8401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8401== don't want to do, unless you know exactly what you're doing,
==8401== or are doing some strange experiment):
==8401== /usr/lib/valgrind/../../bin/vgdb --pid=8401 ...command...
==8401==
==8401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8401== /path/to/gdb ./zsh
==8401== and then give GDB the following command
==8401== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8401
==8401== --pid is optional if only one valgrind process is running
==8401==
==8402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8402-by-pythonnut-on-???
==8402== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8402-by-pythonnut-on-???
==8402== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8402-by-pythonnut-on-???
==8402==
==8402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8402== don't want to do, unless you know exactly what you're doing,
==8402== or are doing some strange experiment):
==8402== /usr/lib/valgrind/../../bin/vgdb --pid=8402 ...command...
==8402==
==8402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8402== /path/to/gdb ./zsh
==8402== and then give GDB the following command
==8402== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8402
==8402== --pid is optional if only one valgrind process is running
==8402==
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
--8402-- Caught __NR_exit; running __libc_freeres()
==8399== Checked 4,652,512 bytes
==8399==
--8402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399== LEAK SUMMARY:
==8399== definitely lost: 253 bytes in 4 blocks
==8399== indirectly lost: 6,756 bytes in 7 blocks
==8399== possibly lost: 0 bytes in 0 blocks
==8399== still reachable: 3,003,260 bytes in 68,518 blocks
==8399== suppressed: 0 bytes in 0 blocks
==8399== Rerun with --leak-check=full to see details of leaked memory
==8399==
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8399==
==8399== 1 errors in context 1 of 1:
==8399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8399== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8399== by 0x488CD0: stringsubst (subst.c:301)
==8399== by 0x48801B: prefork (subst.c:77)
==8399== by 0x42B318: execcmd (exec.c:2619)
==8399== by 0x428CA0: execpline2 (exec.c:1697)
==8399== by 0x427FD2: execpline (exec.c:1484)
==8399== by 0x427756: execlist (exec.c:1267)
==8399== by 0x42717C: execode (exec.c:1073)
==8399== by 0x431299: runshfunc (exec.c:5040)
==8399== by 0x430E76: doshfunc (exec.c:4920)
==8399== by 0x4302FB: execshfunc (exec.c:4557)
==8399== by 0x42D8C1: execcmd (exec.c:3373)
==8399==
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402==
==8402== HEAP SUMMARY:
==8402== in use at exit: 3,016,995 bytes in 68,822 blocks
==8402== total heap usage: 834,429 allocs, 765,607 frees, 58,783,556 bytes allocated
==8402==
--8398-- Caught __NR_exit; running __libc_freeres()
--8398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8402== Searching for pointers to 68,822 not-freed blocks
--8402-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8402-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8402-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8402-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8402-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8402-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8402-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8402-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8402-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8402-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8402-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8402-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8402-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8402-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8402-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8402-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8402-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8402-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8402-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8402-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8402-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8402-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8402-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8402-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8402-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8402-- Scanning root segment: 0x701a000..0x701afff (4096)
--8402-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8402-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8402-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8402-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8402-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8402-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8402-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8402-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8398==
==8398== HEAP SUMMARY:
==8398== in use at exit: 3,010,205 bytes in 68,526 blocks
==8398== total heap usage: 831,067 allocs, 762,541 frees, 57,027,319 bytes allocated
==8398==
==8398== Searching for pointers to 68,526 not-freed blocks
--8398-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8398-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8398-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8398-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8398-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8398-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8398-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8398-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8398-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8398-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8398-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8398-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8398-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8398-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8398-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8398-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8398-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8398-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8398-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8398-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8398-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8398-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8398-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8398-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8398-- Scanning root segment: 0x701a000..0x701afff (4096)
--8398-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8398-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8398-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8398-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8398-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8398-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8398-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8398-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8402== Checked 4,726,376 bytes
==8402==
==8402== LEAK SUMMARY:
==8402== definitely lost: 253 bytes in 4 blocks
==8402== indirectly lost: 6,756 bytes in 7 blocks
==8402== possibly lost: 0 bytes in 0 blocks
==8402== still reachable: 3,009,986 bytes in 68,811 blocks
==8402== suppressed: 0 bytes in 0 blocks
==8402== Rerun with --leak-check=full to see details of leaked memory
==8402==
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402==
==8402== 1 errors in context 1 of 1:
==8402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8402== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8402== by 0x488CD0: stringsubst (subst.c:301)
==8402== by 0x48801B: prefork (subst.c:77)
==8402== by 0x42B318: execcmd (exec.c:2619)
==8402== by 0x428CA0: execpline2 (exec.c:1697)
==8402== by 0x427FD2: execpline (exec.c:1484)
==8402== by 0x427756: execlist (exec.c:1267)
==8402== by 0x42717C: execode (exec.c:1073)
==8402== by 0x431299: runshfunc (exec.c:5040)
==8402== by 0x430E76: doshfunc (exec.c:4920)
==8402== by 0x4302FB: execshfunc (exec.c:4557)
==8402== by 0x42D8C1: execcmd (exec.c:3373)
==8402==
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Caught __NR_exit; running __libc_freeres()
==8398== Checked 4,651,824 bytes
==8398==
==8398== LEAK SUMMARY:
==8398== definitely lost: 253 bytes in 4 blocks
==8398== indirectly lost: 6,756 bytes in 7 blocks
==8398== possibly lost: 0 bytes in 0 blocks
==8398== still reachable: 3,003,196 bytes in 68,515 blocks
==8398== suppressed: 0 bytes in 0 blocks
==8398== Rerun with --leak-check=full to see details of leaked memory
==8398==
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8398==
==8398== 1 errors in context 1 of 1:
==8398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8398== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8398== by 0x488CD0: stringsubst (subst.c:301)
==8398== by 0x48801B: prefork (subst.c:77)
==8398== by 0x42B318: execcmd (exec.c:2619)
==8398== by 0x428CA0: execpline2 (exec.c:1697)
==8398== by 0x427FD2: execpline (exec.c:1484)
==8398== by 0x427756: execlist (exec.c:1267)
==8398== by 0x42717C: execode (exec.c:1073)
==8398== by 0x431299: runshfunc (exec.c:5040)
==8398== by 0x430E76: doshfunc (exec.c:4920)
==8398== by 0x4302FB: execshfunc (exec.c:4557)
==8398== by 0x42D8C1: execcmd (exec.c:3373)
==8398==
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8401==
==8401== HEAP SUMMARY:
==8401== in use at exit: 3,014,929 bytes in 68,743 blocks
==8401== total heap usage: 834,336 allocs, 765,593 frees, 58,716,009 bytes allocated
==8401==
--8403-- Caught __NR_exit; running __libc_freeres()
==8403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8403-by-pythonnut-on-???
==8403== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8403-by-pythonnut-on-???
==8403== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8403-by-pythonnut-on-???
==8403==
==8403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8403== don't want to do, unless you know exactly what you're doing,
==8403== or are doing some strange experiment):
==8403== /usr/lib/valgrind/../../bin/vgdb --pid=8403 ...command...
==8403==
==8403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8403== /path/to/gdb ./zsh
==8403== and then give GDB the following command
==8403== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8403
==8403== --pid is optional if only one valgrind process is running
==8403==
==8401== Searching for pointers to 68,743 not-freed blocks
--8401-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8401-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8401-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8401-- Scanning root segment: 0x4037000..0x403efff (32768)
--8401-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8401-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8401-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8401-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8401-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8401-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8401-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8401-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8401-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8401-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8401-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8401-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8401-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8401-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8401-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8401-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8401-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8401-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8401-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8401-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8401-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8401-- Scanning root segment: 0x701a000..0x701afff (4096)
--8401-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8401-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8401-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8401-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8401-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8401-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8401-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8401-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8403==
==8403== HEAP SUMMARY:
==8403== in use at exit: 3,010,212 bytes in 68,526 blocks
==8403== total heap usage: 831,082 allocs, 762,556 frees, 57,032,317 bytes allocated
==8403==
==8403== Searching for pointers to 68,526 not-freed blocks
--8403-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8403-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8403-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8403-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8403-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8403-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8403-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8403-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8403-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8403-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8403-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8403-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8403-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8403-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8403-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8403-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8403-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8403-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8403-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8403-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8403-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8403-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8403-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8403-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8403-- Scanning root segment: 0x701a000..0x701afff (4096)
--8403-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8403-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8403-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8403-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8403-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8403-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8403-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8403-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8401== Checked 4,706,208 bytes
==8401==
==8401== LEAK SUMMARY:
==8401== definitely lost: 253 bytes in 4 blocks
==8401== indirectly lost: 6,756 bytes in 7 blocks
==8401== possibly lost: 0 bytes in 0 blocks
==8401== still reachable: 3,007,920 bytes in 68,732 blocks
==8401== suppressed: 0 bytes in 0 blocks
==8401== Rerun with --leak-check=full to see details of leaked memory
==8401==
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401==
==8401== 1 errors in context 1 of 1:
==8401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8401== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8401== by 0x488CD0: stringsubst (subst.c:301)
==8401== by 0x48801B: prefork (subst.c:77)
==8401== by 0x42B318: execcmd (exec.c:2619)
==8401== by 0x428CA0: execpline2 (exec.c:1697)
==8401== by 0x427FD2: execpline (exec.c:1484)
==8401== by 0x427756: execlist (exec.c:1267)
==8401== by 0x42717C: execode (exec.c:1073)
==8401== by 0x431299: runshfunc (exec.c:5040)
==8401== by 0x430E76: doshfunc (exec.c:4920)
==8401== by 0x4302FB: execshfunc (exec.c:4557)
==8401== by 0x42D8C1: execcmd (exec.c:3373)
==8401==
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8404-by-pythonnut-on-???
==8404== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8404-by-pythonnut-on-???
==8404== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8404-by-pythonnut-on-???
==8404==
==8404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8404== don't want to do, unless you know exactly what you're doing,
==8404== or are doing some strange experiment):
==8404== /usr/lib/valgrind/../../bin/vgdb --pid=8404 ...command...
==8404==
==8404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8404== /path/to/gdb ./zsh
==8404== and then give GDB the following command
==8404== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8404
==8404== --pid is optional if only one valgrind process is running
==8404==
==8405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8405-by-pythonnut-on-???
==8405== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8405-by-pythonnut-on-???
==8405== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8405-by-pythonnut-on-???
==8405==
==8405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8405== don't want to do, unless you know exactly what you're doing,
==8405== or are doing some strange experiment):
==8405== /usr/lib/valgrind/../../bin/vgdb --pid=8405 ...command...
==8405==
==8405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8405== /path/to/gdb ./zsh
==8405== and then give GDB the following command
==8405== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8405
==8405== --pid is optional if only one valgrind process is running
==8405==
==8403== Checked 4,651,960 bytes
==8403==
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==8403== LEAK SUMMARY:
==8403== definitely lost: 253 bytes in 4 blocks
==8403== indirectly lost: 6,756 bytes in 7 blocks
==8403== possibly lost: 0 bytes in 0 blocks
==8403== still reachable: 3,003,203 bytes in 68,515 blocks
==8403== suppressed: 0 bytes in 0 blocks
==8403== Rerun with --leak-check=full to see details of leaked memory
==8403==
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8403==
==8403== 1 errors in context 1 of 1:
==8403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8403== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8403== by 0x488CD0: stringsubst (subst.c:301)
==8403== by 0x48801B: prefork (subst.c:77)
==8403== by 0x42B318: execcmd (exec.c:2619)
==8403== by 0x428CA0: execpline2 (exec.c:1697)
==8403== by 0x427FD2: execpline (exec.c:1484)
==8403== by 0x427756: execlist (exec.c:1267)
==8403== by 0x42717C: execode (exec.c:1073)
==8403== by 0x431299: runshfunc (exec.c:5040)
==8403== by 0x430E76: doshfunc (exec.c:4920)
==8403== by 0x4302FB: execshfunc (exec.c:4557)
==8403== by 0x42D8C1: execcmd (exec.c:3373)
==8403==
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8405-- Caught __NR_exit; running __libc_freeres()
--8406-- Caught __NR_exit; running __libc_freeres()
--8405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8406-by-pythonnut-on-???
==8405==
==8406== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8406-by-pythonnut-on-???
==8406== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8406-by-pythonnut-on-???
==8406==
==8406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8406== don't want to do, unless you know exactly what you're doing,
==8406== or are doing some strange experiment):
==8406== /usr/lib/valgrind/../../bin/vgdb --pid=8406 ...command...
==8406==
==8406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8406== /path/to/gdb ./zsh
==8406== and then give GDB the following command
==8406== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8406
==8406== --pid is optional if only one valgrind process is running
==8406==
==8405== HEAP SUMMARY:
==8405== in use at exit: 3,016,944 bytes in 68,822 blocks
==8405== total heap usage: 834,440 allocs, 765,618 frees, 58,753,446 bytes allocated
==8405==
--8406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406==
==8406== HEAP SUMMARY:
==8406== in use at exit: 3,010,308 bytes in 68,526 blocks
==8406== total heap usage: 831,098 allocs, 762,572 frees, 57,037,104 bytes allocated
==8406==
==8405== Searching for pointers to 68,822 not-freed blocks
--8405-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8405-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8405-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8405-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8405-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8405-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8405-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8405-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8405-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8405-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8405-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8405-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8405-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8405-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8405-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8405-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8405-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8405-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8405-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8405-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8405-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8405-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8405-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8405-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8405-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8405-- Scanning root segment: 0x701a000..0x701afff (4096)
--8405-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8405-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8405-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8405-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8405-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8405-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8405-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8405-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8406== Searching for pointers to 68,526 not-freed blocks
--8406-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8406-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8406-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8406-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8406-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8406-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8406-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8406-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8406-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8406-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8406-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8406-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8406-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8406-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8406-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8406-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8406-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8406-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8406-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8406-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8406-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8406-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8406-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8406-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8406-- Scanning root segment: 0x701a000..0x701afff (4096)
--8406-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8406-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8406-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8406-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8406-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8406-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8406-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8406-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8405== Checked 4,726,328 bytes
==8405==
==8405== LEAK SUMMARY:
==8405== definitely lost: 253 bytes in 4 blocks
==8405== indirectly lost: 6,756 bytes in 7 blocks
==8405== possibly lost: 0 bytes in 0 blocks
==8405== still reachable: 3,009,935 bytes in 68,811 blocks
==8405== suppressed: 0 bytes in 0 blocks
==8405== Rerun with --leak-check=full to see details of leaked memory
==8405==
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8405==
==8405== 1 errors in context 1 of 1:
==8405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8405== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8405== by 0x488CD0: stringsubst (subst.c:301)
==8405== by 0x48801B: prefork (subst.c:77)
==8405== by 0x42B318: execcmd (exec.c:2619)
==8405== by 0x428CA0: execpline2 (exec.c:1697)
==8405== by 0x427FD2: execpline (exec.c:1484)
==8405== by 0x427756: execlist (exec.c:1267)
==8405== by 0x42717C: execode (exec.c:1073)
==8405== by 0x431299: runshfunc (exec.c:5040)
==8405== by 0x430E76: doshfunc (exec.c:4920)
==8405== by 0x4302FB: execshfunc (exec.c:4557)
==8405== by 0x42D8C1: execcmd (exec.c:3373)
==8405==
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406== Checked 4,651,240 bytes
==8406==
--8404-- Caught __NR_exit; running __libc_freeres()
==8406== LEAK SUMMARY:
==8406== definitely lost: 253 bytes in 4 blocks
==8406== indirectly lost: 6,756 bytes in 7 blocks
==8406== possibly lost: 0 bytes in 0 blocks
==8406== still reachable: 3,003,299 bytes in 68,515 blocks
==8406== suppressed: 0 bytes in 0 blocks
==8406== Rerun with --leak-check=full to see details of leaked memory
==8406==
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406==
==8406== 1 errors in context 1 of 1:
==8406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8406== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8406== by 0x488CD0: stringsubst (subst.c:301)
==8406== by 0x48801B: prefork (subst.c:77)
==8406== by 0x42B318: execcmd (exec.c:2619)
==8406== by 0x428CA0: execpline2 (exec.c:1697)
==8406== by 0x427FD2: execpline (exec.c:1484)
==8406== by 0x427756: execlist (exec.c:1267)
==8406== by 0x42717C: execode (exec.c:1073)
==8406== by 0x431299: runshfunc (exec.c:5040)
==8406== by 0x430E76: doshfunc (exec.c:4920)
==8406== by 0x4302FB: execshfunc (exec.c:4557)
==8406== by 0x42D8C1: execcmd (exec.c:3373)
==8406==
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8404-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8404==
==8404== HEAP SUMMARY:
==8404== in use at exit: 3,014,912 bytes in 68,743 blocks
==8404== total heap usage: 834,347 allocs, 765,604 frees, 58,718,748 bytes allocated
==8404==
==8407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8407-by-pythonnut-on-???
==8407== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8407-by-pythonnut-on-???
==8407== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8407-by-pythonnut-on-???
==8407==
==8407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8407== don't want to do, unless you know exactly what you're doing,
==8407== or are doing some strange experiment):
==8407== /usr/lib/valgrind/../../bin/vgdb --pid=8407 ...command...
==8407==
==8407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8407== /path/to/gdb ./zsh
==8407== and then give GDB the following command
==8407== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8407
==8407== --pid is optional if only one valgrind process is running
==8407==
--8407-- Caught __NR_exit; running __libc_freeres()
==8404== Searching for pointers to 68,743 not-freed blocks
--8404-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8404-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8404-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8404-- Scanning root segment: 0x4037000..0x403efff (32768)
--8404-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8404-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8404-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8404-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8404-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8404-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8404-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8404-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8404-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8404-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8404-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8404-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8404-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8404-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8404-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8404-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8404-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8404-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8404-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8404-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8404-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8404-- Scanning root segment: 0x701a000..0x701afff (4096)
--8404-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8404-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8404-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8404-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8404-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8404-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8404-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8404-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8407==
==8407== HEAP SUMMARY:
==8407== in use at exit: 3,010,614 bytes in 68,532 blocks
==8407== total heap usage: 831,147 allocs, 762,615 frees, 57,046,184 bytes allocated
==8407==
==8407== Searching for pointers to 68,532 not-freed blocks
--8407-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8407-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8407-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8407-- Scanning root segment: 0x4037000..0x403afff (16384)
--8407-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8407-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8407-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8407-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8407-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8407-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8407-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8407-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8407-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8407-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8407-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8407-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8407-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8407-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8407-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8407-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8407-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8407-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8407-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8407-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8407-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8407-- Scanning root segment: 0x701a000..0x701afff (4096)
--8407-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8407-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8407-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8407-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8407-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8407-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8407-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8407-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8404== Checked 4,706,200 bytes
==8404==
==8404== LEAK SUMMARY:
==8404== definitely lost: 253 bytes in 4 blocks
==8404== indirectly lost: 6,756 bytes in 7 blocks
==8404== possibly lost: 0 bytes in 0 blocks
==8404== still reachable: 3,007,903 bytes in 68,732 blocks
==8404== suppressed: 0 bytes in 0 blocks
==8404== Rerun with --leak-check=full to see details of leaked memory
==8404==
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404==
==8404== 1 errors in context 1 of 1:
==8404== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8404== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8404== by 0x488CD0: stringsubst (subst.c:301)
==8404== by 0x48801B: prefork (subst.c:77)
==8404== by 0x42B318: execcmd (exec.c:2619)
==8404== by 0x428CA0: execpline2 (exec.c:1697)
==8404== by 0x427FD2: execpline (exec.c:1484)
==8404== by 0x427756: execlist (exec.c:1267)
==8404== by 0x42717C: execode (exec.c:1073)
==8404== by 0x431299: runshfunc (exec.c:5040)
==8404== by 0x430E76: doshfunc (exec.c:4920)
==8404== by 0x4302FB: execshfunc (exec.c:4557)
==8404== by 0x42D8C1: execcmd (exec.c:3373)
==8404==
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8408-by-pythonnut-on-???
==8408== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8408-by-pythonnut-on-???
==8408== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8408-by-pythonnut-on-???
==8408==
==8408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8408== don't want to do, unless you know exactly what you're doing,
==8408== or are doing some strange experiment):
==8408== /usr/lib/valgrind/../../bin/vgdb --pid=8408 ...command...
==8408==
==8408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8408== /path/to/gdb ./zsh
==8408== and then give GDB the following command
==8408== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8408
==8408== --pid is optional if only one valgrind process is running
==8408==
==8407== Checked 4,667,840 bytes
==8407==
==8409== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8409-by-pythonnut-on-???
==8407== LEAK SUMMARY:
==8409== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8409-by-pythonnut-on-???
==8407== definitely lost: 253 bytes in 4 blocks
==8409== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8409-by-pythonnut-on-???
==8407== indirectly lost: 6,756 bytes in 7 blocks
==8409==
==8407== possibly lost: 0 bytes in 0 blocks
==8409== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8409== don't want to do, unless you know exactly what you're doing,
==8409== or are doing some strange experiment):
==8409== /usr/lib/valgrind/../../bin/vgdb --pid=8409 ...command...
==8407== still reachable: 3,003,605 bytes in 68,521 blocks
==8409==
==8407== suppressed: 0 bytes in 0 blocks
==8407== Rerun with --leak-check=full to see details of leaked memory
==8409== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8409== /path/to/gdb ./zsh
==8409== and then give GDB the following command
==8409== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8409
==8407==
==8409== --pid is optional if only one valgrind process is running
==8409==
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8407==
==8407== 1 errors in context 1 of 1:
==8407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8407== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8407== by 0x488CD0: stringsubst (subst.c:301)
==8407== by 0x48801B: prefork (subst.c:77)
==8407== by 0x42B318: execcmd (exec.c:2619)
==8407== by 0x428CA0: execpline2 (exec.c:1697)
==8407== by 0x427FD2: execpline (exec.c:1484)
==8407== by 0x427756: execlist (exec.c:1267)
==8407== by 0x42717C: execode (exec.c:1073)
==8407== by 0x431299: runshfunc (exec.c:5040)
==8407== by 0x430E76: doshfunc (exec.c:4920)
==8407== by 0x4302FB: execshfunc (exec.c:4557)
==8407== by 0x42D8C1: execcmd (exec.c:3373)
==8407==
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
--8409-- Caught __NR_exit; running __libc_freeres()
--8410-- Caught __NR_exit; running __libc_freeres()
--8409-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8410-by-pythonnut-on-???
==8410== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8410-by-pythonnut-on-???
==8410== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8410-by-pythonnut-on-???
==8410==
==8410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8410== don't want to do, unless you know exactly what you're doing,
==8410== or are doing some strange experiment):
==8410== /usr/lib/valgrind/../../bin/vgdb --pid=8410 ...command...
==8410==
==8410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8410== /path/to/gdb ./zsh
==8410== and then give GDB the following command
==8410== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8410
==8410== --pid is optional if only one valgrind process is running
==8410==
==8409==
==8409== HEAP SUMMARY:
==8409== in use at exit: 3,016,917 bytes in 68,822 blocks
==8409== total heap usage: 834,450 allocs, 765,628 frees, 58,723,325 bytes allocated
==8409==
--8410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410==
==8410== HEAP SUMMARY:
==8410== in use at exit: 3,010,518 bytes in 68,532 blocks
==8410== total heap usage: 831,127 allocs, 762,595 frees, 57,043,954 bytes allocated
==8410==
==8409== Searching for pointers to 68,822 not-freed blocks
--8409-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8409-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8409-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8409-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8409-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8409-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8409-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8409-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8409-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8409-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8409-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8409-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8409-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8409-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8409-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8409-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8409-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8409-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8409-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8409-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8409-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8409-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8409-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8409-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8409-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8409-- Scanning root segment: 0x701a000..0x701afff (4096)
--8409-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8409-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8409-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8409-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8409-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8409-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8409-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8409-- Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8410== Searching for pointers to 68,532 not-freed blocks
--8410-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8410-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8410-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8410-- Scanning root segment: 0x4037000..0x403afff (16384)
--8410-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8410-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8410-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8410-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8410-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8410-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8410-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8410-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8410-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8410-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8410-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8410-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8410-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8410-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8410-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8410-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8410-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8410-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8410-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8410-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8410-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8410-- Scanning root segment: 0x701a000..0x701afff (4096)
--8410-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8410-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8410-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8410-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8410-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8410-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8410-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8410-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8409== Checked 4,726,288 bytes
==8409==
==8409== LEAK SUMMARY:
==8409== definitely lost: 253 bytes in 4 blocks
==8409== indirectly lost: 6,756 bytes in 7 blocks
==8409== possibly lost: 0 bytes in 0 blocks
==8409== still reachable: 3,009,908 bytes in 68,811 blocks
==8409== suppressed: 0 bytes in 0 blocks
==8409== Rerun with --leak-check=full to see details of leaked memory
==8409==
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8409==
==8409== 1 errors in context 1 of 1:
==8409== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8409== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8409== by 0x488CD0: stringsubst (subst.c:301)
==8409== by 0x48801B: prefork (subst.c:77)
==8409== by 0x42B318: execcmd (exec.c:2619)
==8409== by 0x428CA0: execpline2 (exec.c:1697)
==8409== by 0x427FD2: execpline (exec.c:1484)
==8409== by 0x427756: execlist (exec.c:1267)
==8409== by 0x42717C: execode (exec.c:1073)
==8409== by 0x431299: runshfunc (exec.c:5040)
==8409== by 0x430E76: doshfunc (exec.c:4920)
==8409== by 0x4302FB: execshfunc (exec.c:4557)
==8409== by 0x42D8C1: execcmd (exec.c:3373)
==8409==
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410== Checked 4,667,728 bytes
==8410==
--8408-- Caught __NR_exit; running __libc_freeres()
==8410== LEAK SUMMARY:
==8410== definitely lost: 253 bytes in 4 blocks
==8410== indirectly lost: 6,756 bytes in 7 blocks
==8410== possibly lost: 0 bytes in 0 blocks
==8410== still reachable: 3,003,509 bytes in 68,521 blocks
==8410== suppressed: 0 bytes in 0 blocks
==8410== Rerun with --leak-check=full to see details of leaked memory
==8410==
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410==
==8410== 1 errors in context 1 of 1:
==8410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8410== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8410== by 0x488CD0: stringsubst (subst.c:301)
==8410== by 0x48801B: prefork (subst.c:77)
==8410== by 0x42B318: execcmd (exec.c:2619)
==8410== by 0x428CA0: execpline2 (exec.c:1697)
==8410== by 0x427FD2: execpline (exec.c:1484)
==8410== by 0x427756: execlist (exec.c:1267)
==8410== by 0x42717C: execode (exec.c:1073)
==8410== by 0x431299: runshfunc (exec.c:5040)
==8410== by 0x430E76: doshfunc (exec.c:4920)
==8410== by 0x4302FB: execshfunc (exec.c:4557)
==8410== by 0x42D8C1: execcmd (exec.c:3373)
==8410==
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8408==
==8408== HEAP SUMMARY:
==8408== in use at exit: 3,014,895 bytes in 68,743 blocks
==8408== total heap usage: 834,357 allocs, 765,614 frees, 58,721,446 bytes allocated
==8408==
==8411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8411-by-pythonnut-on-???
==8411== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8411-by-pythonnut-on-???
==8411== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8411-by-pythonnut-on-???
==8411==
==8411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8411== don't want to do, unless you know exactly what you're doing,
==8411== or are doing some strange experiment):
==8411== /usr/lib/valgrind/../../bin/vgdb --pid=8411 ...command...
==8411==
==8411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8411== /path/to/gdb ./zsh
==8411== and then give GDB the following command
==8411== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8411
==8411== --pid is optional if only one valgrind process is running
==8411==
--8411-- Caught __NR_exit; running __libc_freeres()
==8408== Searching for pointers to 68,743 not-freed blocks
--8408-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8408-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8408-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8408-- Scanning root segment: 0x4037000..0x403efff (32768)
--8408-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8408-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8408-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8408-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8408-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8408-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8408-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8408-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8408-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8408-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8408-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8408-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8408-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8408-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8408-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8408-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8408-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8408-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8408-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8408-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8408-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8408-- Scanning root segment: 0x701a000..0x701afff (4096)
--8408-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8408-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8408-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8408-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8408-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8408-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8408-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8408-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8411==
==8411== HEAP SUMMARY:
==8411== in use at exit: 3,010,553 bytes in 68,533 blocks
==8411== total heap usage: 831,140 allocs, 762,607 frees, 57,046,648 bytes allocated
==8411==
==8411== Searching for pointers to 68,533 not-freed blocks
--8411-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8411-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8411-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8411-- Scanning root segment: 0x4037000..0x403afff (16384)
--8411-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8411-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8411-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8411-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8411-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8411-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8411-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8411-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8411-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8411-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8411-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8411-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8411-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8411-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8411-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8411-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8411-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8411-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8411-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8411-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8411-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8411-- Scanning root segment: 0x701a000..0x701afff (4096)
--8411-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8411-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8411-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8411-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8411-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8411-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8411-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8411-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8408== Checked 4,706,168 bytes
==8408==
==8408== LEAK SUMMARY:
==8408== definitely lost: 253 bytes in 4 blocks
==8408== indirectly lost: 6,756 bytes in 7 blocks
==8408== possibly lost: 0 bytes in 0 blocks
==8408== still reachable: 3,007,886 bytes in 68,732 blocks
==8408== suppressed: 0 bytes in 0 blocks
==8408== Rerun with --leak-check=full to see details of leaked memory
==8408==
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408==
==8408== 1 errors in context 1 of 1:
==8408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8408== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8408== by 0x488CD0: stringsubst (subst.c:301)
==8408== by 0x48801B: prefork (subst.c:77)
==8408== by 0x42B318: execcmd (exec.c:2619)
==8408== by 0x428CA0: execpline2 (exec.c:1697)
==8408== by 0x427FD2: execpline (exec.c:1484)
==8408== by 0x427756: execlist (exec.c:1267)
==8408== by 0x42717C: execode (exec.c:1073)
==8408== by 0x431299: runshfunc (exec.c:5040)
==8408== by 0x430E76: doshfunc (exec.c:4920)
==8408== by 0x4302FB: execshfunc (exec.c:4557)
==8408== by 0x42D8C1: execcmd (exec.c:3373)
==8408==
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF773C, len 4
client request: code 4d430005, addr 0xFFEFF773C, len 4
client request: code 4d430005, addr 0xFFEFF762C, len 4
client request: code 4d430005, addr 0xFFEFF762C, len 4
==8411== Checked 4,667,248 bytes
==8411==
client request: code 4d430005, addr 0xFFEFF5D6C, len 4
client request: code 4d430005, addr 0xFFEFF573C, len 4
client request: code 4d430005, addr 0xFFEFF573C, len 4
client request: code 4d430005, addr 0xFFEFF573C, len 4
client request: code 4d430005, addr 0xFFEFF573C, len 4
client request: code 4d430005, addr 0xFFEFF573C, len 4
client request: code 4d430005, addr 0xFFEFF5DCC, len 4
client request: code 4d430005, addr 0xFFEFF5DCC, len 4
client request: code 4d430005, addr 0xFFEFF5DCC, len 4
client request: code 4d430005, addr 0xFFEFF933C, len 4
--8367-- Caught __NR_exit; running __libc_freeres()
==8411== LEAK SUMMARY:
==8411== definitely lost: 253 bytes in 4 blocks
==8411== indirectly lost: 6,756 bytes in 7 blocks
==8411== possibly lost: 0 bytes in 0 blocks
==8411== still reachable: 3,003,544 bytes in 68,522 blocks
==8411== suppressed: 0 bytes in 0 blocks
==8411== Rerun with --leak-check=full to see details of leaked memory
==8411==
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8411==
==8411== 1 errors in context 1 of 1:
==8411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8411== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8411== by 0x488CD0: stringsubst (subst.c:301)
==8411== by 0x48801B: prefork (subst.c:77)
==8411== by 0x42B318: execcmd (exec.c:2619)
==8411== by 0x428CA0: execpline2 (exec.c:1697)
==8411== by 0x427FD2: execpline (exec.c:1484)
==8411== by 0x427756: execlist (exec.c:1267)
==8411== by 0x42717C: execode (exec.c:1073)
==8411== by 0x431299: runshfunc (exec.c:5040)
==8411== by 0x430E76: doshfunc (exec.c:4920)
==8411== by 0x4302FB: execshfunc (exec.c:4557)
==8411== by 0x42D8C1: execcmd (exec.c:3373)
==8411==
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==7806== Conditional jump or move depends on uninitialised value(s)
==7806== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806== by 0x40EFC2: execbuiltin (builtin.c:450)
==7806== by 0x42D8E9: execcmd (exec.c:3378)
==7806== by 0x428CA0: execpline2 (exec.c:1697)
==7806== by 0x427FD2: execpline (exec.c:1484)
==7806== by 0x42779A: execlist (exec.c:1275)
==7806== by 0x42717C: execode (exec.c:1073)
==7806== by 0x431299: runshfunc (exec.c:5040)
==7806== by 0x430E76: doshfunc (exec.c:4920)
==7806== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806==
--8367-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8367==
==8367== HEAP SUMMARY:
==8367== in use at exit: 3,011,560 bytes in 68,557 blocks
==8367== total heap usage: 834,665 allocs, 766,108 frees, 58,773,806 bytes allocated
==8367==
==8367== Searching for pointers to 68,557 not-freed blocks
--8367-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8367-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8367-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8367-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8367-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8367-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8367-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8367-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8367-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8367-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8367-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8367-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8367-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8367-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8367-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8367-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8367-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8367-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8367-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8367-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8367-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8367-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8367-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8367-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8367-- Scanning root segment: 0x701a000..0x701afff (4096)
--8367-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8367-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8367-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8367-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8367-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8367-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8367-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8367-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8367== Checked 4,663,160 bytes
==8367==
==8367== LEAK SUMMARY:
==8367== definitely lost: 253 bytes in 4 blocks
==8367== indirectly lost: 6,756 bytes in 7 blocks
==8367== possibly lost: 0 bytes in 0 blocks
==8367== still reachable: 3,004,551 bytes in 68,546 blocks
==8367== suppressed: 0 bytes in 0 blocks
==8367== Rerun with --leak-check=full to see details of leaked memory
==8367==
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8367==
==8367== 1 errors in context 1 of 1:
==8367== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8367== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8367== by 0x488CD0: stringsubst (subst.c:301)
==8367== by 0x48801B: prefork (subst.c:77)
==8367== by 0x42B318: execcmd (exec.c:2619)
==8367== by 0x428CA0: execpline2 (exec.c:1697)
==8367== by 0x427FD2: execpline (exec.c:1484)
==8367== by 0x427756: execlist (exec.c:1267)
==8367== by 0x42717C: execode (exec.c:1073)
==8367== by 0x431299: runshfunc (exec.c:5040)
==8367== by 0x430E76: doshfunc (exec.c:4920)
==8367== by 0x4302FB: execshfunc (exec.c:4557)
==8367== by 0x42D8C1: execcmd (exec.c:3373)
==8367==
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8363-- Caught __NR_exit; running __libc_freeres()
--8363-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8363==
==8363== HEAP SUMMARY:
==8363== in use at exit: 2,984,657 bytes in 68,307 blocks
==8363== total heap usage: 830,648 allocs, 762,341 frees, 57,175,989 bytes allocated
==8363==
==8363== Searching for pointers to 68,307 not-freed blocks
--8363-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8363-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8363-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8363-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8363-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8363-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8363-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8363-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8363-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8363-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8363-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8363-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8363-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8363-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8363-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8363-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8363-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8363-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8363-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8363-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8363-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8363-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8363-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8363-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8363-- Scanning root segment: 0x701a000..0x701afff (4096)
--8363-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8363-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8363-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8363-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8363-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8363-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8363-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8363-- Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8363== Checked 4,635,128 bytes
==8363==
==8363== LEAK SUMMARY:
==8363== definitely lost: 253 bytes in 4 blocks
==8363== indirectly lost: 6,756 bytes in 7 blocks
==8363== possibly lost: 0 bytes in 0 blocks
==8363== still reachable: 2,977,648 bytes in 68,296 blocks
==8363== suppressed: 0 bytes in 0 blocks
==8363== Rerun with --leak-check=full to see details of leaked memory
==8363==
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8363==
==8363== 1 errors in context 1 of 1:
==8363== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8363== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8363== by 0x488CD0: stringsubst (subst.c:301)
==8363== by 0x48801B: prefork (subst.c:77)
==8363== by 0x42B318: execcmd (exec.c:2619)
==8363== by 0x428CA0: execpline2 (exec.c:1697)
==8363== by 0x427FD2: execpline (exec.c:1484)
==8363== by 0x427756: execlist (exec.c:1267)
==8363== by 0x42717C: execode (exec.c:1073)
==8363== by 0x431299: runshfunc (exec.c:5040)
==8363== by 0x430E76: doshfunc (exec.c:4920)
==8363== by 0x4302FB: execshfunc (exec.c:4557)
==8363== by 0x42D8C1: execcmd (exec.c:3373)
==8363==
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8361-- Caught __NR_exit; running __libc_freeres()
--8361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8361==
==8361== HEAP SUMMARY:
==8361== in use at exit: 2,983,798 bytes in 68,291 blocks
==8361== total heap usage: 830,615 allocs, 762,324 frees, 57,166,116 bytes allocated
==8361==
==8361== Searching for pointers to 68,291 not-freed blocks
--8361-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8361-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8361-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8361-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8361-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8361-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8361-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8361-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8361-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8361-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8361-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8361-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8361-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8361-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8361-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8361-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8361-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8361-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8361-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8361-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8361-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8361-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8361-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8361-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8361-- Scanning root segment: 0x701a000..0x701afff (4096)
--8361-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8361-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8361-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8361-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8361-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8361-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8361-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8361-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8361== Checked 4,631,120 bytes
==8361==
==8361== LEAK SUMMARY:
==8361== definitely lost: 253 bytes in 4 blocks
==8361== indirectly lost: 6,756 bytes in 7 blocks
==8361== possibly lost: 0 bytes in 0 blocks
==8361== still reachable: 2,976,789 bytes in 68,280 blocks
==8361== suppressed: 0 bytes in 0 blocks
==8361== Rerun with --leak-check=full to see details of leaked memory
==8361==
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8361==
==8361== 1 errors in context 1 of 1:
==8361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8361== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8361== by 0x488CD0: stringsubst (subst.c:301)
==8361== by 0x48801B: prefork (subst.c:77)
==8361== by 0x42B318: execcmd (exec.c:2619)
==8361== by 0x428CA0: execpline2 (exec.c:1697)
==8361== by 0x427FD2: execpline (exec.c:1484)
==8361== by 0x427756: execlist (exec.c:1267)
==8361== by 0x42717C: execode (exec.c:1073)
==8361== by 0x431299: runshfunc (exec.c:5040)
==8361== by 0x430E76: doshfunc (exec.c:4920)
==8361== by 0x4302FB: execshfunc (exec.c:4557)
==8361== by 0x42D8C1: execcmd (exec.c:3373)
==8361==
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8412-by-pythonnut-on-???
==8412== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8412-by-pythonnut-on-???
==8412== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8412-by-pythonnut-on-???
==8412==
==8412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8412== don't want to do, unless you know exactly what you're doing,
==8412== or are doing some strange experiment):
==8412== /usr/lib/valgrind/../../bin/vgdb --pid=8412 ...command...
==8412==
==8412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8412== /path/to/gdb ./zsh
==8412== and then give GDB the following command
==8412== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8412
==8412== --pid is optional if only one valgrind process is running
==8412==
client request: code 4d430005, addr 0xFFEFF263C, len 4
--8413-- Caught __NR_exit; running __libc_freeres()
==8413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8413-by-pythonnut-on-???
==8413== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8413-by-pythonnut-on-???
==8413== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8413-by-pythonnut-on-???
==8413==
==8413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8413== don't want to do, unless you know exactly what you're doing,
==8413== or are doing some strange experiment):
==8413== /usr/lib/valgrind/../../bin/vgdb --pid=8413 ...command...
==8413==
==8413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8413== /path/to/gdb ./zsh
==8413== and then give GDB the following command
==8413== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8413
==8413== --pid is optional if only one valgrind process is running
==8413==
--8413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8413==
==8413== HEAP SUMMARY:
==8413== in use at exit: 2,984,302 bytes in 68,303 blocks
==8413== total heap usage: 830,603 allocs, 762,300 frees, 57,161,447 bytes allocated
==8413==
==8413== Searching for pointers to 68,303 not-freed blocks
--8413-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8413-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8413-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8413-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8413-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8413-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8413-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8413-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8413-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8413-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8413-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8413-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8413-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8413-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8413-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8413-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8413-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8413-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8413-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8413-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8413-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8413-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8413-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8413-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8413-- Scanning root segment: 0x701a000..0x701afff (4096)
--8413-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8413-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8413-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8413-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8413-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8413-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8413-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8413-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8413== Checked 4,633,672 bytes
==8413==
==8413== LEAK SUMMARY:
==8413== definitely lost: 253 bytes in 4 blocks
==8413== indirectly lost: 6,756 bytes in 7 blocks
==8413== possibly lost: 0 bytes in 0 blocks
==8413== still reachable: 2,977,293 bytes in 68,292 blocks
==8413== suppressed: 0 bytes in 0 blocks
==8413== Rerun with --leak-check=full to see details of leaked memory
==8413==
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8413==
==8413== 1 errors in context 1 of 1:
==8413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8413== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8413== by 0x488CD0: stringsubst (subst.c:301)
==8413== by 0x48801B: prefork (subst.c:77)
==8413== by 0x42B318: execcmd (exec.c:2619)
==8413== by 0x428CA0: execpline2 (exec.c:1697)
==8413== by 0x427FD2: execpline (exec.c:1484)
==8413== by 0x427756: execlist (exec.c:1267)
==8413== by 0x42717C: execode (exec.c:1073)
==8413== by 0x431299: runshfunc (exec.c:5040)
==8413== by 0x430E76: doshfunc (exec.c:4920)
==8413== by 0x4302FB: execshfunc (exec.c:4557)
==8413== by 0x42D8C1: execcmd (exec.c:3373)
==8413==
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8415-by-pythonnut-on-???
==8415== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8415-by-pythonnut-on-???
==8415== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8415-by-pythonnut-on-???
==8415==
==8415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8415== don't want to do, unless you know exactly what you're doing,
==8415== or are doing some strange experiment):
==8415== /usr/lib/valgrind/../../bin/vgdb --pid=8415 ...command...
==8415==
==8415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8415== /path/to/gdb ./zsh
==8415== and then give GDB the following command
==8415== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8415
==8415== --pid is optional if only one valgrind process is running
==8415==
--8415-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
client request: code 4d430005, addr 0xFFEFFB37C, len 4
client request: code 4d430005, addr 0xFFEFF836C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF895C, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
client request: code 4d430005, addr 0xFFEFEEBFC, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
==8417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8417-by-pythonnut-on-???
==8417== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8417-by-pythonnut-on-???
==8417== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8417-by-pythonnut-on-???
==8417==
==8417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8417== don't want to do, unless you know exactly what you're doing,
==8417== or are doing some strange experiment):
==8417== /usr/lib/valgrind/../../bin/vgdb --pid=8417 ...command...
==8417==
==8417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8417== /path/to/gdb ./zsh
==8417== and then give GDB the following command
==8417== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8417
==8417== --pid is optional if only one valgrind process is running
==8417==
client request: code 4d430005, addr 0xFFEFF562C, len 4
client request: code 4d430005, addr 0xFFEFF562C, len 4
==8418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8418-by-pythonnut-on-???
==8418== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8418-by-pythonnut-on-???
==8418== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8418-by-pythonnut-on-???
==8418==
==8418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8418== don't want to do, unless you know exactly what you're doing,
==8418== or are doing some strange experiment):
==8418== /usr/lib/valgrind/../../bin/vgdb --pid=8418 ...command...
==8418==
==8418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8418== /path/to/gdb ./zsh
==8418== and then give GDB the following command
==8418== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8418
==8418== --pid is optional if only one valgrind process is running
==8418==
--8418-- Caught __NR_exit; running __libc_freeres()
--8418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8418==
==8418== HEAP SUMMARY:
==8418== in use at exit: 3,016,033 bytes in 68,800 blocks
==8418== total heap usage: 834,352 allocs, 765,552 frees, 58,897,138 bytes allocated
==8418==
==8418== Searching for pointers to 68,800 not-freed blocks
--8418-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8418-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8418-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8418-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8418-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8418-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8418-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8418-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8418-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8418-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8418-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8418-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8418-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8418-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8418-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8418-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8418-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8418-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8418-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8418-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8418-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8418-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8418-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8418-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8418-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8418-- Scanning root segment: 0x701a000..0x701afff (4096)
--8418-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8418-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8418-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8418-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8418-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8418-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8418-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8418-- Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8418== Checked 4,721,768 bytes
==8418==
==8418== LEAK SUMMARY:
==8418== definitely lost: 253 bytes in 4 blocks
==8418== indirectly lost: 6,756 bytes in 7 blocks
==8418== possibly lost: 0 bytes in 0 blocks
==8418== still reachable: 3,009,024 bytes in 68,789 blocks
==8418== suppressed: 0 bytes in 0 blocks
==8418== Rerun with --leak-check=full to see details of leaked memory
==8418==
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8418==
==8418== 1 errors in context 1 of 1:
==8418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8418== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8418== by 0x488CD0: stringsubst (subst.c:301)
==8418== by 0x48801B: prefork (subst.c:77)
==8418== by 0x42B318: execcmd (exec.c:2619)
==8418== by 0x428CA0: execpline2 (exec.c:1697)
==8418== by 0x427FD2: execpline (exec.c:1484)
==8418== by 0x427756: execlist (exec.c:1267)
==8418== by 0x42717C: execode (exec.c:1073)
==8418== by 0x431299: runshfunc (exec.c:5040)
==8418== by 0x430E76: doshfunc (exec.c:4920)
==8418== by 0x4302FB: execshfunc (exec.c:4557)
==8418== by 0x42D8C1: execcmd (exec.c:3373)
==8418==
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8417-- Caught __NR_exit; running __libc_freeres()
--8417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8417==
==8417== HEAP SUMMARY:
==8417== in use at exit: 3,013,883 bytes in 68,721 blocks
==8417== total heap usage: 834,261 allocs, 765,540 frees, 58,698,339 bytes allocated
==8417==
==8417== Searching for pointers to 68,721 not-freed blocks
--8417-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8417-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8417-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8417-- Scanning root segment: 0x4037000..0x403efff (32768)
--8417-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8417-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8417-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8417-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8417-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8417-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8417-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8417-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8417-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8417-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8417-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8417-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8417-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8417-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8417-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8417-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8417-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8417-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8417-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8417-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8417-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8417-- Scanning root segment: 0x701a000..0x701afff (4096)
--8417-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8417-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8417-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8417-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8417-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8417-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8417-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8417-- Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8417== Checked 4,701,520 bytes
==8417==
==8417== LEAK SUMMARY:
==8417== definitely lost: 253 bytes in 4 blocks
==8417== indirectly lost: 6,756 bytes in 7 blocks
==8417== possibly lost: 0 bytes in 0 blocks
==8417== still reachable: 3,006,874 bytes in 68,710 blocks
==8417== suppressed: 0 bytes in 0 blocks
==8417== Rerun with --leak-check=full to see details of leaked memory
==8417==
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8417==
==8417== 1 errors in context 1 of 1:
==8417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8417== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8417== by 0x488CD0: stringsubst (subst.c:301)
==8417== by 0x48801B: prefork (subst.c:77)
==8417== by 0x42B318: execcmd (exec.c:2619)
==8417== by 0x428CA0: execpline2 (exec.c:1697)
==8417== by 0x427FD2: execpline (exec.c:1484)
==8417== by 0x427756: execlist (exec.c:1267)
==8417== by 0x42717C: execode (exec.c:1073)
==8417== by 0x431299: runshfunc (exec.c:5040)
==8417== by 0x430E76: doshfunc (exec.c:4920)
==8417== by 0x4302FB: execshfunc (exec.c:4557)
==8417== by 0x42D8C1: execcmd (exec.c:3373)
==8417==
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8419-by-pythonnut-on-???
==8419== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8419-by-pythonnut-on-???
==8419== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8419-by-pythonnut-on-???
==8419==
==8419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8419== don't want to do, unless you know exactly what you're doing,
==8419== or are doing some strange experiment):
==8419== /usr/lib/valgrind/../../bin/vgdb --pid=8419 ...command...
==8419==
==8419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8419== /path/to/gdb ./zsh
==8419== and then give GDB the following command
==8419== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8419
==8419== --pid is optional if only one valgrind process is running
==8419==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==8420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8420-by-pythonnut-on-???
==8420== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8420-by-pythonnut-on-???
==8420== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8420-by-pythonnut-on-???
==8420==
==8420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8420== don't want to do, unless you know exactly what you're doing,
==8420== or are doing some strange experiment):
==8420== /usr/lib/valgrind/../../bin/vgdb --pid=8420 ...command...
==8420==
==8420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8420== /path/to/gdb ./zsh
==8420== and then give GDB the following command
==8420== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8420
==8420== --pid is optional if only one valgrind process is running
==8420==
--8420-- Caught __NR_exit; running __libc_freeres()
--8420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8420==
==8420== HEAP SUMMARY:
==8420== in use at exit: 3,016,236 bytes in 68,807 blocks
==8420== total heap usage: 834,368 allocs, 765,561 frees, 58,867,251 bytes allocated
==8420==
==8420== Searching for pointers to 68,807 not-freed blocks
--8420-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8420-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8420-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8420-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8420-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8420-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8420-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8420-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8420-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8420-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8420-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8420-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8420-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8420-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8420-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8420-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8420-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8420-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8420-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8420-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8420-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8420-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8420-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8420-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8420-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8420-- Scanning root segment: 0x701a000..0x701afff (4096)
--8420-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8420-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8420-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8420-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8420-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8420-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8420-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8420-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8420== Checked 4,722,456 bytes
==8420==
==8420== LEAK SUMMARY:
==8420== definitely lost: 253 bytes in 4 blocks
==8420== indirectly lost: 6,756 bytes in 7 blocks
==8420== possibly lost: 0 bytes in 0 blocks
==8420== still reachable: 3,009,227 bytes in 68,796 blocks
==8420== suppressed: 0 bytes in 0 blocks
==8420== Rerun with --leak-check=full to see details of leaked memory
==8420==
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8420==
==8420== 1 errors in context 1 of 1:
==8420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8420== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8420== by 0x488CD0: stringsubst (subst.c:301)
==8420== by 0x48801B: prefork (subst.c:77)
==8420== by 0x42B318: execcmd (exec.c:2619)
==8420== by 0x428CA0: execpline2 (exec.c:1697)
==8420== by 0x427FD2: execpline (exec.c:1484)
==8420== by 0x427756: execlist (exec.c:1267)
==8420== by 0x42717C: execode (exec.c:1073)
==8420== by 0x431299: runshfunc (exec.c:5040)
==8420== by 0x430E76: doshfunc (exec.c:4920)
==8420== by 0x4302FB: execshfunc (exec.c:4557)
==8420== by 0x42D8C1: execcmd (exec.c:3373)
==8420==
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8419-- Caught __NR_exit; running __libc_freeres()
--8419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8419==
==8419== HEAP SUMMARY:
==8419== in use at exit: 3,014,096 bytes in 68,728 blocks
==8419== total heap usage: 834,275 allocs, 765,547 frees, 58,701,192 bytes allocated
==8419==
==8419== Searching for pointers to 68,728 not-freed blocks
--8419-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8419-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8419-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8419-- Scanning root segment: 0x4037000..0x403efff (32768)
--8419-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8419-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8419-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8419-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8419-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8419-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8419-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8419-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8419-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8419-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8419-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8419-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8419-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8419-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8419-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8419-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8419-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8419-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8419-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8419-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8419-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8419-- Scanning root segment: 0x701a000..0x701afff (4096)
--8419-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8419-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8419-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8419-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8419-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8419-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8419-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8419-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8419== Checked 4,702,232 bytes
==8419==
==8419== LEAK SUMMARY:
==8419== definitely lost: 253 bytes in 4 blocks
==8419== indirectly lost: 6,756 bytes in 7 blocks
==8419== possibly lost: 0 bytes in 0 blocks
==8419== still reachable: 3,007,087 bytes in 68,717 blocks
==8419== suppressed: 0 bytes in 0 blocks
==8419== Rerun with --leak-check=full to see details of leaked memory
==8419==
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419==
==8419== 1 errors in context 1 of 1:
==8419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8419== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8419== by 0x488CD0: stringsubst (subst.c:301)
==8419== by 0x48801B: prefork (subst.c:77)
==8419== by 0x42B318: execcmd (exec.c:2619)
==8419== by 0x428CA0: execpline2 (exec.c:1697)
==8419== by 0x427FD2: execpline (exec.c:1484)
==8419== by 0x427756: execlist (exec.c:1267)
==8419== by 0x42717C: execode (exec.c:1073)
==8419== by 0x431299: runshfunc (exec.c:5040)
==8419== by 0x430E76: doshfunc (exec.c:4920)
==8419== by 0x4302FB: execshfunc (exec.c:4557)
==8419== by 0x42D8C1: execcmd (exec.c:3373)
==8419==
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8421-by-pythonnut-on-???
==8421== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8421-by-pythonnut-on-???
==8421== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8421-by-pythonnut-on-???
==8421==
==8421== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8421== don't want to do, unless you know exactly what you're doing,
==8421== or are doing some strange experiment):
==8421== /usr/lib/valgrind/../../bin/vgdb --pid=8421 ...command...
==8421==
==8421== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8421== /path/to/gdb ./zsh
==8421== and then give GDB the following command
==8421== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8421
==8421== --pid is optional if only one valgrind process is running
==8421==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==8422== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8422-by-pythonnut-on-???
==8422== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8422-by-pythonnut-on-???
==8422== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8422-by-pythonnut-on-???
==8422==
==8422== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8422== don't want to do, unless you know exactly what you're doing,
==8422== or are doing some strange experiment):
==8422== /usr/lib/valgrind/../../bin/vgdb --pid=8422 ...command...
==8422==
==8422== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8422== /path/to/gdb ./zsh
==8422== and then give GDB the following command
==8422== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8422
==8422== --pid is optional if only one valgrind process is running
==8422==
--8422-- Caught __NR_exit; running __libc_freeres()
--8422-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8422==
==8422== HEAP SUMMARY:
==8422== in use at exit: 3,016,221 bytes in 68,807 blocks
==8422== total heap usage: 834,379 allocs, 765,572 frees, 58,837,208 bytes allocated
==8422==
==8422== Searching for pointers to 68,807 not-freed blocks
--8422-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8422-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8422-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8422-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8422-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8422-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8422-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8422-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8422-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8422-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8422-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8422-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8422-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8422-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8422-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8422-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8422-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8422-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8422-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8422-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8422-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8422-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8422-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8422-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8422-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8422-- Scanning root segment: 0x701a000..0x701afff (4096)
--8422-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8422-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8422-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8422-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8422-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8422-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8422-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8422-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8422== Checked 4,722,456 bytes
==8422==
==8422== LEAK SUMMARY:
==8422== definitely lost: 253 bytes in 4 blocks
==8422== indirectly lost: 6,756 bytes in 7 blocks
==8422== possibly lost: 0 bytes in 0 blocks
==8422== still reachable: 3,009,212 bytes in 68,796 blocks
==8422== suppressed: 0 bytes in 0 blocks
==8422== Rerun with --leak-check=full to see details of leaked memory
==8422==
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8422==
==8422== 1 errors in context 1 of 1:
==8422== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8422== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8422== by 0x488CD0: stringsubst (subst.c:301)
==8422== by 0x48801B: prefork (subst.c:77)
==8422== by 0x42B318: execcmd (exec.c:2619)
==8422== by 0x428CA0: execpline2 (exec.c:1697)
==8422== by 0x427FD2: execpline (exec.c:1484)
==8422== by 0x427756: execlist (exec.c:1267)
==8422== by 0x42717C: execode (exec.c:1073)
==8422== by 0x431299: runshfunc (exec.c:5040)
==8422== by 0x430E76: doshfunc (exec.c:4920)
==8422== by 0x4302FB: execshfunc (exec.c:4557)
==8422== by 0x42D8C1: execcmd (exec.c:3373)
==8422==
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8421-- Caught __NR_exit; running __libc_freeres()
--8421-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8421==
==8421== HEAP SUMMARY:
==8421== in use at exit: 3,014,091 bytes in 68,728 blocks
==8421== total heap usage: 834,286 allocs, 765,558 frees, 58,703,968 bytes allocated
==8421==
==8421== Searching for pointers to 68,728 not-freed blocks
--8421-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8421-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8421-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8421-- Scanning root segment: 0x4037000..0x403efff (32768)
--8421-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8421-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8421-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8421-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8421-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8421-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8421-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8421-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8421-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8421-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8421-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8421-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8421-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8421-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8421-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8421-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8421-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8421-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8421-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8421-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8421-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8421-- Scanning root segment: 0x701a000..0x701afff (4096)
--8421-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8421-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8421-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8421-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8421-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8421-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8421-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8421-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8421== Checked 4,702,224 bytes
==8421==
==8421== LEAK SUMMARY:
==8421== definitely lost: 253 bytes in 4 blocks
==8421== indirectly lost: 6,756 bytes in 7 blocks
==8421== possibly lost: 0 bytes in 0 blocks
==8421== still reachable: 3,007,082 bytes in 68,717 blocks
==8421== suppressed: 0 bytes in 0 blocks
==8421== Rerun with --leak-check=full to see details of leaked memory
==8421==
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421==
==8421== 1 errors in context 1 of 1:
==8421== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8421== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8421== by 0x488CD0: stringsubst (subst.c:301)
==8421== by 0x48801B: prefork (subst.c:77)
==8421== by 0x42B318: execcmd (exec.c:2619)
==8421== by 0x428CA0: execpline2 (exec.c:1697)
==8421== by 0x427FD2: execpline (exec.c:1484)
==8421== by 0x427756: execlist (exec.c:1267)
==8421== by 0x42717C: execode (exec.c:1073)
==8421== by 0x431299: runshfunc (exec.c:5040)
==8421== by 0x430E76: doshfunc (exec.c:4920)
==8421== by 0x4302FB: execshfunc (exec.c:4557)
==8421== by 0x42D8C1: execcmd (exec.c:3373)
==8421==
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8423-by-pythonnut-on-???
==8423== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8423-by-pythonnut-on-???
==8423== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8423-by-pythonnut-on-???
==8423==
==8423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8423== don't want to do, unless you know exactly what you're doing,
==8423== or are doing some strange experiment):
==8423== /usr/lib/valgrind/../../bin/vgdb --pid=8423 ...command...
==8423==
==8423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8423== /path/to/gdb ./zsh
==8423== and then give GDB the following command
==8423== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8423
==8423== --pid is optional if only one valgrind process is running
==8423==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==8424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8424-by-pythonnut-on-???
==8424== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8424-by-pythonnut-on-???
==8424== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8424-by-pythonnut-on-???
==8424==
==8424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8424== don't want to do, unless you know exactly what you're doing,
==8424== or are doing some strange experiment):
==8424== /usr/lib/valgrind/../../bin/vgdb --pid=8424 ...command...
==8424==
==8424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8424== /path/to/gdb ./zsh
==8424== and then give GDB the following command
==8424== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8424
==8424== --pid is optional if only one valgrind process is running
==8424==
--8424-- Caught __NR_exit; running __libc_freeres()
--8424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8424==
==8424== HEAP SUMMARY:
==8424== in use at exit: 3,016,186 bytes in 68,807 blocks
==8424== total heap usage: 834,390 allocs, 765,583 frees, 58,807,135 bytes allocated
==8424==
==8424== Searching for pointers to 68,807 not-freed blocks
--8424-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8424-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8424-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8424-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8424-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8424-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8424-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8424-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8424-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8424-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8424-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8424-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8424-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8424-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8424-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8424-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8424-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8424-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8424-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8424-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8424-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8424-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8424-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8424-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8424-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8424-- Scanning root segment: 0x701a000..0x701afff (4096)
--8424-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8424-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8424-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8424-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8424-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8424-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8424-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8424-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8424== Checked 4,722,424 bytes
==8424==
==8424== LEAK SUMMARY:
==8424== definitely lost: 253 bytes in 4 blocks
==8424== indirectly lost: 6,756 bytes in 7 blocks
==8424== possibly lost: 0 bytes in 0 blocks
==8424== still reachable: 3,009,177 bytes in 68,796 blocks
==8424== suppressed: 0 bytes in 0 blocks
==8424== Rerun with --leak-check=full to see details of leaked memory
==8424==
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8424==
==8424== 1 errors in context 1 of 1:
==8424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8424== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8424== by 0x488CD0: stringsubst (subst.c:301)
==8424== by 0x48801B: prefork (subst.c:77)
==8424== by 0x42B318: execcmd (exec.c:2619)
==8424== by 0x428CA0: execpline2 (exec.c:1697)
==8424== by 0x427FD2: execpline (exec.c:1484)
==8424== by 0x427756: execlist (exec.c:1267)
==8424== by 0x42717C: execode (exec.c:1073)
==8424== by 0x431299: runshfunc (exec.c:5040)
==8424== by 0x430E76: doshfunc (exec.c:4920)
==8424== by 0x4302FB: execshfunc (exec.c:4557)
==8424== by 0x42D8C1: execcmd (exec.c:3373)
==8424==
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8423-- Caught __NR_exit; running __libc_freeres()
--8423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8423==
==8423== HEAP SUMMARY:
==8423== in use at exit: 3,014,086 bytes in 68,728 blocks
==8423== total heap usage: 834,297 allocs, 765,569 frees, 58,706,739 bytes allocated
==8423==
==8423== Searching for pointers to 68,728 not-freed blocks
--8423-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8423-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8423-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8423-- Scanning root segment: 0x4037000..0x403efff (32768)
--8423-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8423-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8423-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8423-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8423-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8423-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8423-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8423-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8423-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8423-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8423-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8423-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8423-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8423-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8423-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8423-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8423-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8423-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8423-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8423-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8423-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8423-- Scanning root segment: 0x701a000..0x701afff (4096)
--8423-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8423-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8423-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8423-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8423-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8423-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8423-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8423-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8423== Checked 4,702,224 bytes
==8423==
==8423== LEAK SUMMARY:
==8423== definitely lost: 253 bytes in 4 blocks
==8423== indirectly lost: 6,756 bytes in 7 blocks
==8423== possibly lost: 0 bytes in 0 blocks
==8423== still reachable: 3,007,077 bytes in 68,717 blocks
==8423== suppressed: 0 bytes in 0 blocks
==8423== Rerun with --leak-check=full to see details of leaked memory
==8423==
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423==
==8423== 1 errors in context 1 of 1:
==8423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8423== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8423== by 0x488CD0: stringsubst (subst.c:301)
==8423== by 0x48801B: prefork (subst.c:77)
==8423== by 0x42B318: execcmd (exec.c:2619)
==8423== by 0x428CA0: execpline2 (exec.c:1697)
==8423== by 0x427FD2: execpline (exec.c:1484)
==8423== by 0x427756: execlist (exec.c:1267)
==8423== by 0x42717C: execode (exec.c:1073)
==8423== by 0x431299: runshfunc (exec.c:5040)
==8423== by 0x430E76: doshfunc (exec.c:4920)
==8423== by 0x4302FB: execshfunc (exec.c:4557)
==8423== by 0x42D8C1: execcmd (exec.c:3373)
==8423==
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8425-by-pythonnut-on-???
==8425== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8425-by-pythonnut-on-???
==8425== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8425-by-pythonnut-on-???
==8425==
==8425== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8425== don't want to do, unless you know exactly what you're doing,
==8425== or are doing some strange experiment):
==8425== /usr/lib/valgrind/../../bin/vgdb --pid=8425 ...command...
==8425==
==8425== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8425== /path/to/gdb ./zsh
==8425== and then give GDB the following command
==8425== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8425
==8425== --pid is optional if only one valgrind process is running
==8425==
==8426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8426-by-pythonnut-on-???
==8426== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8426-by-pythonnut-on-???
==8426== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8426-by-pythonnut-on-???
==8426==
==8426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8426== don't want to do, unless you know exactly what you're doing,
==8426== or are doing some strange experiment):
==8426== /usr/lib/valgrind/../../bin/vgdb --pid=8426 ...command...
==8426==
==8426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8426== /path/to/gdb ./zsh
==8426== and then give GDB the following command
==8426== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8426
==8426== --pid is optional if only one valgrind process is running
==8426==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
--8426-- Caught __NR_exit; running __libc_freeres()
--8426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8426==
==8426== HEAP SUMMARY:
==8426== in use at exit: 3,016,137 bytes in 68,807 blocks
==8426== total heap usage: 834,401 allocs, 765,594 frees, 58,777,042 bytes allocated
==8426==
==8426== Searching for pointers to 68,807 not-freed blocks
--8426-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8426-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8426-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8426-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8426-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8426-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8426-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8426-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8426-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8426-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8426-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8426-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8426-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8426-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8426-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8426-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8426-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8426-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8426-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8426-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8426-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8426-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8426-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8426-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8426-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8426-- Scanning root segment: 0x701a000..0x701afff (4096)
--8426-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8426-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8426-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8426-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8426-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8426-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8426-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8426-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8426== Checked 4,722,376 bytes
==8426==
==8426== LEAK SUMMARY:
==8426== definitely lost: 253 bytes in 4 blocks
==8426== indirectly lost: 6,756 bytes in 7 blocks
==8426== possibly lost: 0 bytes in 0 blocks
==8426== still reachable: 3,009,128 bytes in 68,796 blocks
==8426== suppressed: 0 bytes in 0 blocks
==8426== Rerun with --leak-check=full to see details of leaked memory
==8426==
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8426==
==8426== 1 errors in context 1 of 1:
==8426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8426== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8426== by 0x488CD0: stringsubst (subst.c:301)
==8426== by 0x48801B: prefork (subst.c:77)
==8426== by 0x42B318: execcmd (exec.c:2619)
==8426== by 0x428CA0: execpline2 (exec.c:1697)
==8426== by 0x427FD2: execpline (exec.c:1484)
==8426== by 0x427756: execlist (exec.c:1267)
==8426== by 0x42717C: execode (exec.c:1073)
==8426== by 0x431299: runshfunc (exec.c:5040)
==8426== by 0x430E76: doshfunc (exec.c:4920)
==8426== by 0x4302FB: execshfunc (exec.c:4557)
==8426== by 0x42D8C1: execcmd (exec.c:3373)
==8426==
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8425-- Caught __NR_exit; running __libc_freeres()
--8425-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8425==
==8425== HEAP SUMMARY:
==8425== in use at exit: 3,014,071 bytes in 68,728 blocks
==8425== total heap usage: 834,308 allocs, 765,580 frees, 58,709,495 bytes allocated
==8425==
==8425== Searching for pointers to 68,728 not-freed blocks
--8425-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8425-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8425-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8425-- Scanning root segment: 0x4037000..0x403efff (32768)
--8425-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8425-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8425-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8425-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8425-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8425-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8425-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8425-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8425-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8425-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8425-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8425-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8425-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8425-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8425-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8425-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8425-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8425-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8425-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8425-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8425-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8425-- Scanning root segment: 0x701a000..0x701afff (4096)
--8425-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8425-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8425-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8425-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8425-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8425-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8425-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8425-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8425== Checked 4,702,208 bytes
==8425==
==8425== LEAK SUMMARY:
==8425== definitely lost: 253 bytes in 4 blocks
==8425== indirectly lost: 6,756 bytes in 7 blocks
==8425== possibly lost: 0 bytes in 0 blocks
==8425== still reachable: 3,007,062 bytes in 68,717 blocks
==8425== suppressed: 0 bytes in 0 blocks
==8425== Rerun with --leak-check=full to see details of leaked memory
==8425==
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425==
==8425== 1 errors in context 1 of 1:
==8425== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8425== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8425== by 0x488CD0: stringsubst (subst.c:301)
==8425== by 0x48801B: prefork (subst.c:77)
==8425== by 0x42B318: execcmd (exec.c:2619)
==8425== by 0x428CA0: execpline2 (exec.c:1697)
==8425== by 0x427FD2: execpline (exec.c:1484)
==8425== by 0x427756: execlist (exec.c:1267)
==8425== by 0x42717C: execode (exec.c:1073)
==8425== by 0x431299: runshfunc (exec.c:5040)
==8425== by 0x430E76: doshfunc (exec.c:4920)
==8425== by 0x4302FB: execshfunc (exec.c:4557)
==8425== by 0x42D8C1: execcmd (exec.c:3373)
==8425==
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8427-by-pythonnut-on-???
==8427== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8427-by-pythonnut-on-???
==8427== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8427-by-pythonnut-on-???
==8427==
==8427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8427== don't want to do, unless you know exactly what you're doing,
==8427== or are doing some strange experiment):
==8427== /usr/lib/valgrind/../../bin/vgdb --pid=8427 ...command...
==8427==
==8427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8427== /path/to/gdb ./zsh
==8427== and then give GDB the following command
==8427== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8427
==8427== --pid is optional if only one valgrind process is running
==8427==
==8428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8428-by-pythonnut-on-???
==8428== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8428-by-pythonnut-on-???
==8428== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8428-by-pythonnut-on-???
==8428==
==8428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8428== don't want to do, unless you know exactly what you're doing,
==8428== or are doing some strange experiment):
==8428== /usr/lib/valgrind/../../bin/vgdb --pid=8428 ...command...
==8428==
==8428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8428== /path/to/gdb ./zsh
==8428== and then give GDB the following command
==8428== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8428
==8428== --pid is optional if only one valgrind process is running
==8428==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
--8428-- Caught __NR_exit; running __libc_freeres()
--8428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8428==
==8428== HEAP SUMMARY:
==8428== in use at exit: 3,016,086 bytes in 68,807 blocks
==8428== total heap usage: 834,412 allocs, 765,605 frees, 58,746,932 bytes allocated
==8428==
==8428== Searching for pointers to 68,807 not-freed blocks
--8428-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8428-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8428-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8428-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8428-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8428-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8428-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8428-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8428-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8428-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8428-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8428-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8428-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8428-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8428-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8428-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8428-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8428-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8428-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8428-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8428-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8428-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8428-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8428-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8428-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8428-- Scanning root segment: 0x701a000..0x701afff (4096)
--8428-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8428-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8428-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8428-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8428-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8428-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8428-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8428-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8429-by-pythonnut-on-???
==8429== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8429-by-pythonnut-on-???
==8429== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8429-by-pythonnut-on-???
==8429==
==8429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8429== don't want to do, unless you know exactly what you're doing,
==8429== or are doing some strange experiment):
==8429== /usr/lib/valgrind/../../bin/vgdb --pid=8429 ...command...
==8429==
==8429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8429== /path/to/gdb ./zsh
==8429== and then give GDB the following command
==8429== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8429
==8429== --pid is optional if only one valgrind process is running
==8429==
==8428== Checked 4,722,328 bytes
==8428==
--8429-- Caught __NR_exit; running __libc_freeres()
==8428== LEAK SUMMARY:
==8428== definitely lost: 253 bytes in 4 blocks
==8428== indirectly lost: 6,756 bytes in 7 blocks
==8428== possibly lost: 0 bytes in 0 blocks
==8428== still reachable: 3,009,077 bytes in 68,796 blocks
==8428== suppressed: 0 bytes in 0 blocks
==8428== Rerun with --leak-check=full to see details of leaked memory
==8428==
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8428==
==8428== 1 errors in context 1 of 1:
==8428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8428== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8428== by 0x488CD0: stringsubst (subst.c:301)
==8428== by 0x48801B: prefork (subst.c:77)
==8428== by 0x42B318: execcmd (exec.c:2619)
==8428== by 0x428CA0: execpline2 (exec.c:1697)
==8428== by 0x427FD2: execpline (exec.c:1484)
==8428== by 0x427756: execlist (exec.c:1267)
==8428== by 0x42717C: execode (exec.c:1073)
==8428== by 0x431299: runshfunc (exec.c:5040)
==8428== by 0x430E76: doshfunc (exec.c:4920)
==8428== by 0x4302FB: execshfunc (exec.c:4557)
==8428== by 0x42D8C1: execcmd (exec.c:3373)
==8428==
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427-- Caught __NR_exit; running __libc_freeres()
--8429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429==
==8429== HEAP SUMMARY:
==8429== in use at exit: 1,405,227 bytes in 28,934 blocks
==8429== total heap usage: 787,615 allocs, 758,681 frees, 54,681,487 bytes allocated
==8429==
--8427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429== Searching for pointers to 28,934 not-freed blocks
--8429-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8429-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8429-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8429-- Scanning root segment: 0x4036000..0x4047fff (73728)
--8429-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8429-- Scanning root segment: 0x41d6000..0x421dfff (294912)
==8427==
--8429-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8429-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8429-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8429-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8429-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8429-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8429-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8429-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8429-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8429-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8429-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8429-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8429-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8429-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8429-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8429-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8429-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8429-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8429-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8429-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8429-- Scanning root segment: 0x701a000..0x701afff (4096)
--8429-- Scanning root segment: 0x881b000..0x8838fff (122880)
--8429-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==8427== HEAP SUMMARY:
==8427== in use at exit: 3,014,054 bytes in 68,728 blocks
==8427== total heap usage: 834,319 allocs, 765,591 frees, 58,712,234 bytes allocated
==8427==
--8429-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8429-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8429-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8429-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8429-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8429-- Scanning root segment: 0xb86b000..0xb874fff (40960)
--8429-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8429== Checked 2,194,920 bytes
==8429==
==8427== Searching for pointers to 68,728 not-freed blocks
--8427-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8427-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8427-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8427-- Scanning root segment: 0x4037000..0x403efff (32768)
--8427-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8427-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8427-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8427-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8427-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8427-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
==8429== LEAK SUMMARY:
==8429== definitely lost: 253 bytes in 4 blocks
--8427-- Scanning root segment: 0x5041000..0x5041fff (4096)
==8429== indirectly lost: 6,756 bytes in 7 blocks
==8429== possibly lost: 0 bytes in 0 blocks
==8429== still reachable: 1,398,218 bytes in 28,923 blocks
==8429== suppressed: 0 bytes in 0 blocks
==8429== Rerun with --leak-check=full to see details of leaked memory
==8429==
--8427-- Scanning root segment: 0x5245000..0x5245fff (4096)
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8429==
--8427-- Scanning root segment: 0x54ac000..0x54acfff (4096)
==8429== 1 errors in context 1 of 1:
==8429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8429== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
--8427-- Scanning root segment: 0x54ad000..0x54adfff (4096)
==8429== by 0x488CD0: stringsubst (subst.c:301)
==8429== by 0x48801B: prefork (subst.c:77)
--8427-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
==8429== by 0x42B318: execcmd (exec.c:2619)
==8429== by 0x428CA0: execpline2 (exec.c:1697)
==8429== by 0x427FD2: execpline (exec.c:1484)
--8427-- Scanning root segment: 0x59ba000..0x59bafff (4096)
==8429== by 0x427756: execlist (exec.c:1267)
==8429== by 0x42717C: execode (exec.c:1073)
==8429== by 0x431299: runshfunc (exec.c:5040)
==8429== by 0x430E76: doshfunc (exec.c:4920)
--8427-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
==8429== by 0x4302FB: execshfunc (exec.c:4557)
==8429== by 0x42D8C1: execcmd (exec.c:3373)
==8429==
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8427-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8427-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8427-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8427-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8427-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8427-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8427-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8427-- Scanning root segment: 0x701a000..0x701afff (4096)
--8427-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8427-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8427-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8427-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8427-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8427-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8427-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8427-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8427== Checked 4,702,200 bytes
==8427==
--8368-- Caught __NR_exit; running __libc_freeres()
==8427== LEAK SUMMARY:
==8427== definitely lost: 253 bytes in 4 blocks
==8427== indirectly lost: 6,756 bytes in 7 blocks
==8427== possibly lost: 0 bytes in 0 blocks
==8427== still reachable: 3,007,045 bytes in 68,717 blocks
==8427== suppressed: 0 bytes in 0 blocks
==8427== Rerun with --leak-check=full to see details of leaked memory
==8427==
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427==
==8427== 1 errors in context 1 of 1:
==8427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8427== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8427== by 0x488CD0: stringsubst (subst.c:301)
==8427== by 0x48801B: prefork (subst.c:77)
==8427== by 0x42B318: execcmd (exec.c:2619)
==8427== by 0x428CA0: execpline2 (exec.c:1697)
==8427== by 0x427FD2: execpline (exec.c:1484)
==8427== by 0x427756: execlist (exec.c:1267)
==8427== by 0x42717C: execode (exec.c:1073)
==8427== by 0x431299: runshfunc (exec.c:5040)
==8427== by 0x430E76: doshfunc (exec.c:4920)
==8427== by 0x4302FB: execshfunc (exec.c:4557)
==8427== by 0x42D8C1: execcmd (exec.c:3373)
==8427==
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8430-by-pythonnut-on-???
==8430== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8430-by-pythonnut-on-???
==8430== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8430-by-pythonnut-on-???
==8430==
==8430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8430== don't want to do, unless you know exactly what you're doing,
==8430== or are doing some strange experiment):
==8430== /usr/lib/valgrind/../../bin/vgdb --pid=8430 ...command...
==8430==
==8430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8430== /path/to/gdb ./zsh
==8430== and then give GDB the following command
==8430== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8430
==8430== --pid is optional if only one valgrind process is running
==8430==
==8368==
==8368== HEAP SUMMARY:
==8368== in use at exit: 1,367,183 bytes in 28,848 blocks
==8368== total heap usage: 788,634 allocs, 759,786 frees, 54,712,350 bytes allocated
==8368==
==8368== Searching for pointers to 28,848 not-freed blocks
--8368-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8368-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8368-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8368-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8368-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8368-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8368-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8368-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8368-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8368-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8368-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8368-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8368-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8368-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8368-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8368-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8368-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8368-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8368-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8368-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8368-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8368-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8368-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8368-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8368-- Scanning root segment: 0x701a000..0x701afff (4096)
--8368-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8368-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8368-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8368-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8368-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8368-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8368-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8431-by-pythonnut-on-???
==8431== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8431-by-pythonnut-on-???
==8431== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8431-by-pythonnut-on-???
==8431==
==8431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8431== don't want to do, unless you know exactly what you're doing,
==8431== or are doing some strange experiment):
==8431== /usr/lib/valgrind/../../bin/vgdb --pid=8431 ...command...
==8431==
==8431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8431== /path/to/gdb ./zsh
==8431== and then give GDB the following command
==8431== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8431
==8431== --pid is optional if only one valgrind process is running
==8431==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
--8431-- Caught __NR_exit; running __libc_freeres()
==8368== Checked 1,622,040 bytes
==8368==
==8368== LEAK SUMMARY:
==8368== definitely lost: 253 bytes in 4 blocks
==8368== indirectly lost: 6,756 bytes in 7 blocks
==8368== possibly lost: 0 bytes in 0 blocks
==8368== still reachable: 1,360,174 bytes in 28,837 blocks
==8368== suppressed: 0 bytes in 0 blocks
==8368== Rerun with --leak-check=full to see details of leaked memory
==8368==
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368==
==8368== 1 errors in context 1 of 1:
==8368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8368== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8368== by 0x488CD0: stringsubst (subst.c:301)
==8368== by 0x48801B: prefork (subst.c:77)
==8368== by 0x42B318: execcmd (exec.c:2619)
==8368== by 0x428CA0: execpline2 (exec.c:1697)
==8368== by 0x427FD2: execpline (exec.c:1484)
==8368== by 0x427756: execlist (exec.c:1267)
==8368== by 0x42717C: execode (exec.c:1073)
==8368== by 0x431299: runshfunc (exec.c:5040)
==8368== by 0x430E76: doshfunc (exec.c:4920)
==8368== by 0x4302FB: execshfunc (exec.c:4557)
==8368== by 0x42D8C1: execcmd (exec.c:3373)
==8368==
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8348-- Caught __NR_exit; running __libc_freeres()
==8431==
==8431== HEAP SUMMARY:
==8431== in use at exit: 3,016,059 bytes in 68,807 blocks
==8431== total heap usage: 834,423 allocs, 765,616 frees, 58,716,835 bytes allocated
==8431==
--8348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8348==
==8348== HEAP SUMMARY:
==8348== in use at exit: 1,365,289 bytes in 28,781 blocks
==8348== total heap usage: 787,456 allocs, 758,675 frees, 54,434,629 bytes allocated
==8348==
==8431== Searching for pointers to 68,807 not-freed blocks
client request: code 4d430005, addr 0xFFEFEBCCC, len 4
--8431-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8431-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8431-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8431-- Scanning root segment: 0x4037000..0x4042fff (49152)
--8431-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8431-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8431-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8431-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8431-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8431-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8431-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8431-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8431-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8431-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8431-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8431-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8431-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8431-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8431-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8431-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8431-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8431-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8431-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8431-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8431-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8431-- Scanning root segment: 0x701a000..0x701afff (4096)
--8431-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8431-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8431-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8431-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8431-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8431-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8431-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8431-- Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8348== Searching for pointers to 28,781 not-freed blocks
--8348-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8348-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8348-- Scanning root segment: 0x4022000..0x4027fff (24576)
--8348-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8348-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8348-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8348-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8348-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8348-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8348-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8348-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8348-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8348-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8348-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8348-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8348-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8348-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8348-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8348-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8348-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8348-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8348-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8348-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8348-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8348-- Scanning root segment: 0x701a000..0x701afff (4096)
--8348-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8348-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8348-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8348-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8348-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8348-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8348-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8433== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8433-by-pythonnut-on-???
==8433== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8433-by-pythonnut-on-???
==8433== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8433-by-pythonnut-on-???
==8433==
==8433== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8433== don't want to do, unless you know exactly what you're doing,
==8433== or are doing some strange experiment):
==8433== /usr/lib/valgrind/../../bin/vgdb --pid=8433 ...command...
==8433==
==8433== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8433== /path/to/gdb ./zsh
==8433== and then give GDB the following command
==8433== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8433
==8433== --pid is optional if only one valgrind process is running
==8433==
==8348== Checked 1,619,736 bytes
==8348==
==8348== LEAK SUMMARY:
==8348== definitely lost: 253 bytes in 4 blocks
==8348== indirectly lost: 6,756 bytes in 7 blocks
==8348== possibly lost: 0 bytes in 0 blocks
==8348== still reachable: 1,358,280 bytes in 28,770 blocks
==8348== suppressed: 0 bytes in 0 blocks
==8348== Rerun with --leak-check=full to see details of leaked memory
==8348==
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348==
==8348== 1 errors in context 1 of 1:
==8348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8348== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8348== by 0x488CD0: stringsubst (subst.c:301)
==8348== by 0x48801B: prefork (subst.c:77)
==8348== by 0x42B318: execcmd (exec.c:2619)
==8348== by 0x428CA0: execpline2 (exec.c:1697)
==8348== by 0x427FD2: execpline (exec.c:1484)
==8348== by 0x427756: execlist (exec.c:1267)
==8348== by 0x42717C: execode (exec.c:1073)
==8348== by 0x431299: runshfunc (exec.c:5040)
==8348== by 0x430E76: doshfunc (exec.c:4920)
==8348== by 0x4302FB: execshfunc (exec.c:4557)
==8348== by 0x42D8C1: execcmd (exec.c:3373)
==8348==
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8434-- Caught __NR_exit; running __libc_freeres()
==8434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8434-by-pythonnut-on-???
==8434== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8434-by-pythonnut-on-???
==8434== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8434-by-pythonnut-on-???
==8434==
==8434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8434== don't want to do, unless you know exactly what you're doing,
==8434== or are doing some strange experiment):
==8434== /usr/lib/valgrind/../../bin/vgdb --pid=8434 ...command...
==8434==
==8434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8434== /path/to/gdb ./zsh
==8434== and then give GDB the following command
==8434== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8434
==8434== --pid is optional if only one valgrind process is running
==8434==
client request: code 4d430005, addr 0xFFEFEC63C, len 4
--8434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8434==
==8434== HEAP SUMMARY:
==8434== in use at exit: 3,014,251 bytes in 68,610 blocks
==8434== total heap usage: 831,563 allocs, 762,953 frees, 57,083,130 bytes allocated
==8434==
==8431== Checked 4,722,288 bytes
==8431==
==8434== Searching for pointers to 68,610 not-freed blocks
--8434-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8434-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8434-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8434-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8434-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8434-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8434-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8434-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8434-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8434-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8434-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8434-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8434-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8434-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8434-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8434-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8434-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8434-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8434-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8434-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8434-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8434-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8434-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8434-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8434-- Scanning root segment: 0x701a000..0x701afff (4096)
--8434-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8434-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8434-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8434-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8434-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8434-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8434-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8434-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8431== LEAK SUMMARY:
==8431== definitely lost: 253 bytes in 4 blocks
==8431== indirectly lost: 6,756 bytes in 7 blocks
==8431== possibly lost: 0 bytes in 0 blocks
==8431== still reachable: 3,009,050 bytes in 68,796 blocks
==8431== suppressed: 0 bytes in 0 blocks
==8431== Rerun with --leak-check=full to see details of leaked memory
==8431==
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8431==
==8431== 1 errors in context 1 of 1:
==8431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8431== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8431== by 0x488CD0: stringsubst (subst.c:301)
==8431== by 0x48801B: prefork (subst.c:77)
==8431== by 0x42B318: execcmd (exec.c:2619)
==8431== by 0x428CA0: execpline2 (exec.c:1697)
==8431== by 0x427FD2: execpline (exec.c:1484)
==8431== by 0x427756: execlist (exec.c:1267)
==8431== by 0x42717C: execode (exec.c:1073)
==8431== by 0x431299: runshfunc (exec.c:5040)
==8431== by 0x430E76: doshfunc (exec.c:4920)
==8431== by 0x4302FB: execshfunc (exec.c:4557)
==8431== by 0x42D8C1: execcmd (exec.c:3373)
==8431==
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8430-- Caught __NR_exit; running __libc_freeres()
--8430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430==
==8430== HEAP SUMMARY:
==8430== in use at exit: 3,014,037 bytes in 68,728 blocks
==8430== total heap usage: 834,330 allocs, 765,602 frees, 58,714,956 bytes allocated
==8430==
==8430== Searching for pointers to 68,728 not-freed blocks
--8430-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8430-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8430-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8430-- Scanning root segment: 0x4037000..0x403efff (32768)
--8430-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8430-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8430-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8430-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8430-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8430-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8430-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8430-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8430-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8430-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8430-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8430-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8430-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8430-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8430-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8430-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8430-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8430-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8430-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8430-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8430-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8430-- Scanning root segment: 0x701a000..0x701afff (4096)
--8430-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8430-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8430-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8430-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8430-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8430-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8430-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8430-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8434== Checked 4,660,416 bytes
==8434==
==8434== LEAK SUMMARY:
==8434== definitely lost: 253 bytes in 4 blocks
==8434== indirectly lost: 6,756 bytes in 7 blocks
==8434== possibly lost: 0 bytes in 0 blocks
==8434== still reachable: 3,007,242 bytes in 68,599 blocks
==8434== suppressed: 0 bytes in 0 blocks
==8434== Rerun with --leak-check=full to see details of leaked memory
==8434==
==8434== Use --track-origins=yes to see where uninitialised values come from
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8434==
==8434== 1 errors in context 1 of 2:
==8434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8434== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8434== by 0x488CD0: stringsubst (subst.c:301)
==8434== by 0x48801B: prefork (subst.c:77)
==8434== by 0x42B318: execcmd (exec.c:2619)
==8434== by 0x428CA0: execpline2 (exec.c:1697)
==8434== by 0x427FD2: execpline (exec.c:1484)
==8434== by 0x427756: execlist (exec.c:1267)
==8434== by 0x42717C: execode (exec.c:1073)
==8434== by 0x431299: runshfunc (exec.c:5040)
==8434== by 0x430E76: doshfunc (exec.c:4920)
==8434== by 0x4302FB: execshfunc (exec.c:4557)
==8434== by 0x42D8C1: execcmd (exec.c:3373)
==8434==
==8434==
==8434== 2 errors in context 2 of 2:
==8434== Conditional jump or move depends on uninitialised value(s)
==8434== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8434== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8434== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8434== by 0x40EFC2: execbuiltin (builtin.c:450)
==8434== by 0x42D8E9: execcmd (exec.c:3378)
==8434== by 0x428CA0: execpline2 (exec.c:1697)
==8434== by 0x427FD2: execpline (exec.c:1484)
==8434== by 0x42779A: execlist (exec.c:1275)
==8434== by 0x42717C: execode (exec.c:1073)
==8434== by 0x431299: runshfunc (exec.c:5040)
==8434== by 0x430E76: doshfunc (exec.c:4920)
==8434== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8434==
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8433-- Caught __NR_exit; running __libc_freeres()
--8433-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8433==
==8433== HEAP SUMMARY:
==8433== in use at exit: 3,014,187 bytes in 68,607 blocks
==8433== total heap usage: 831,561 allocs, 762,954 frees, 57,082,889 bytes allocated
==8433==
==8430== Checked 4,702,168 bytes
==8430==
==8433== Searching for pointers to 68,607 not-freed blocks
--8433-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8433-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8433-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8433-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8433-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8433-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8433-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8433-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8433-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8433-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8433-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8433-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8433-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8433-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8433-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8433-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8433-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8433-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8433-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8433-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8433-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8433-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8433-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8433-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8433-- Scanning root segment: 0x701a000..0x701afff (4096)
--8433-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8433-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8433-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8433-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8433-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8433-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8433-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8433-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8430== LEAK SUMMARY:
==8430== definitely lost: 253 bytes in 4 blocks
==8430== indirectly lost: 6,756 bytes in 7 blocks
==8430== possibly lost: 0 bytes in 0 blocks
==8430== still reachable: 3,007,028 bytes in 68,717 blocks
==8430== suppressed: 0 bytes in 0 blocks
==8430== Rerun with --leak-check=full to see details of leaked memory
==8430==
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8430==
==8430== 1 errors in context 1 of 1:
==8430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8430== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8430== by 0x488CD0: stringsubst (subst.c:301)
==8430== by 0x48801B: prefork (subst.c:77)
==8430== by 0x42B318: execcmd (exec.c:2619)
==8430== by 0x428CA0: execpline2 (exec.c:1697)
==8430== by 0x427FD2: execpline (exec.c:1484)
==8430== by 0x427756: execlist (exec.c:1267)
==8430== by 0x42717C: execode (exec.c:1073)
==8430== by 0x431299: runshfunc (exec.c:5040)
==8430== by 0x430E76: doshfunc (exec.c:4920)
==8430== by 0x4302FB: execshfunc (exec.c:4557)
==8430== by 0x42D8C1: execcmd (exec.c:3373)
==8430==
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
client request: code 4d430005, addr 0xFFEFF99DC, len 4
client request: code 4d430005, addr 0xFFEFF99DC, len 4
client request: code 4d430005, addr 0xFFEFF811C, len 4
client request: code 4d430005, addr 0xFFEFF7AEC, len 4
client request: code 4d430005, addr 0xFFEFF7AEC, len 4
client request: code 4d430005, addr 0xFFEFF7AEC, len 4
client request: code 4d430005, addr 0xFFEFF7AEC, len 4
client request: code 4d430005, addr 0xFFEFF7AEC, len 4
client request: code 4d430005, addr 0xFFEFF817C, len 4
client request: code 4d430005, addr 0xFFEFF817C, len 4
client request: code 4d430005, addr 0xFFEFF817C, len 4
client request: code 4d430005, addr 0xFFEFFB6EC, len 4
--8415-- Caught __NR_exit; running __libc_freeres()
--8415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8415==
==8415== HEAP SUMMARY:
==8415== in use at exit: 3,010,574 bytes in 68,542 blocks
==8415== total heap usage: 834,637 allocs, 766,095 frees, 58,767,060 bytes allocated
==8415==
==8433== Checked 4,659,728 bytes
==8433==
==8415== Searching for pointers to 68,542 not-freed blocks
--8415-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8415-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8415-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8415-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8415-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8415-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8415-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8415-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8415-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8415-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8415-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8415-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8415-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8415-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8415-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8415-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8415-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
==8433== LEAK SUMMARY:
==8433== definitely lost: 253 bytes in 4 blocks
==8433== indirectly lost: 6,756 bytes in 7 blocks
==8433== possibly lost: 0 bytes in 0 blocks
==8433== still reachable: 3,007,178 bytes in 68,596 blocks
==8433== suppressed: 0 bytes in 0 blocks
==8433== Rerun with --leak-check=full to see details of leaked memory
==8433==
==8433== Use --track-origins=yes to see where uninitialised values come from
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8433==
==8433== 1 errors in context 1 of 2:
==8433== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--8415-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
==8433== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8433== by 0x488CD0: stringsubst (subst.c:301)
==8433== by 0x48801B: prefork (subst.c:77)
==8433== by 0x42B318: execcmd (exec.c:2619)
--8415-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
==8433== by 0x428CA0: execpline2 (exec.c:1697)
==8433== by 0x427FD2: execpline (exec.c:1484)
==8433== by 0x427756: execlist (exec.c:1267)
==8433== by 0x42717C: execode (exec.c:1073)
==8433== by 0x431299: runshfunc (exec.c:5040)
==8433== by 0x430E76: doshfunc (exec.c:4920)
==8433== by 0x4302FB: execshfunc (exec.c:4557)
==8433== by 0x42D8C1: execcmd (exec.c:3373)
==8433==
==8433==
==8433== 2 errors in context 2 of 2:
==8433== Conditional jump or move depends on uninitialised value(s)
==8433== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8433== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8433== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8433== by 0x40EFC2: execbuiltin (builtin.c:450)
==8433== by 0x42D8E9: execcmd (exec.c:3378)
--8415-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==8433== by 0x428CA0: execpline2 (exec.c:1697)
==8433== by 0x427FD2: execpline (exec.c:1484)
==8433== by 0x42779A: execlist (exec.c:1275)
==8433== by 0x42717C: execode (exec.c:1073)
==8433== by 0x431299: runshfunc (exec.c:5040)
==8433== by 0x430E76: doshfunc (exec.c:4920)
==8433== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8433==
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8415-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8415-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8415-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8415-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8415-- Scanning root segment: 0x701a000..0x701afff (4096)
--8415-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8415-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8415-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8415-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8415-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8415-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8415-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8415-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8438-- Caught __NR_exit; running __libc_freeres()
==8438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8438-by-pythonnut-on-???
==8438== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8438-by-pythonnut-on-???
==8438== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8438-by-pythonnut-on-???
==8438==
==8438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8438== don't want to do, unless you know exactly what you're doing,
==8438== or are doing some strange experiment):
==8438== /usr/lib/valgrind/../../bin/vgdb --pid=8438 ...command...
==8438==
==8438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8438== /path/to/gdb ./zsh
==8438== and then give GDB the following command
==8438== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8438
==8438== --pid is optional if only one valgrind process is running
==8438==
--8438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8438==
==8438== HEAP SUMMARY:
==8438== in use at exit: 3,014,194 bytes in 68,607 blocks
==8438== total heap usage: 831,576 allocs, 762,969 frees, 57,087,887 bytes allocated
==8438==
==8438== Searching for pointers to 68,607 not-freed blocks
--8438-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8438-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8438-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8438-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8438-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8438-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8438-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8438-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8438-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8438-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8438-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8438-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8438-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8438-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8438-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8438-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8438-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8438-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8438-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8438-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8438-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8438-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8438-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8438-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8438-- Scanning root segment: 0x701a000..0x701afff (4096)
--8438-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8438-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8438-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8438-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8438-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8438-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8438-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8438-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8415== Checked 4,659,160 bytes
==8415==
==8415== LEAK SUMMARY:
==8415== definitely lost: 253 bytes in 4 blocks
==8415== indirectly lost: 6,756 bytes in 7 blocks
==8415== possibly lost: 0 bytes in 0 blocks
==8415== still reachable: 3,003,565 bytes in 68,531 blocks
==8415== suppressed: 0 bytes in 0 blocks
==8415== Rerun with --leak-check=full to see details of leaked memory
==8415==
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415==
==8415== 1 errors in context 1 of 1:
==8415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8415== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8415== by 0x488CD0: stringsubst (subst.c:301)
==8415== by 0x48801B: prefork (subst.c:77)
==8415== by 0x42B318: execcmd (exec.c:2619)
==8415== by 0x428CA0: execpline2 (exec.c:1697)
==8415== by 0x427FD2: execpline (exec.c:1484)
==8415== by 0x427756: execlist (exec.c:1267)
==8415== by 0x42717C: execode (exec.c:1073)
==8415== by 0x431299: runshfunc (exec.c:5040)
==8415== by 0x430E76: doshfunc (exec.c:4920)
==8415== by 0x4302FB: execshfunc (exec.c:4557)
==8415== by 0x42D8C1: execcmd (exec.c:3373)
==8415==
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8412-- Caught __NR_exit; running __libc_freeres()
--8412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8412==
==8412== HEAP SUMMARY:
==8412== in use at exit: 2,983,799 bytes in 68,292 blocks
==8412== total heap usage: 830,622 allocs, 762,330 frees, 57,169,523 bytes allocated
==8412==
==8412== Searching for pointers to 68,292 not-freed blocks
--8412-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8412-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8412-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8412-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8412-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8412-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8412-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8412-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8412-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8412-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8412-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8412-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8412-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8412-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8412-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8412-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8412-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8412-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8412-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8412-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8412-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8412-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8412-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8412-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8412-- Scanning root segment: 0x701a000..0x701afff (4096)
--8412-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8412-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8412-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8412-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8412-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8412-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8412-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8412-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8438== Checked 4,659,864 bytes
==8438==
==8438== LEAK SUMMARY:
==8438== definitely lost: 253 bytes in 4 blocks
==8438== indirectly lost: 6,756 bytes in 7 blocks
==8438== possibly lost: 0 bytes in 0 blocks
==8438== still reachable: 3,007,185 bytes in 68,596 blocks
==8438== suppressed: 0 bytes in 0 blocks
==8438== Rerun with --leak-check=full to see details of leaked memory
==8438==
==8438== Use --track-origins=yes to see where uninitialised values come from
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8438==
==8438== 1 errors in context 1 of 2:
==8438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8438== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8438== by 0x488CD0: stringsubst (subst.c:301)
==8438== by 0x48801B: prefork (subst.c:77)
==8438== by 0x42B318: execcmd (exec.c:2619)
==8438== by 0x428CA0: execpline2 (exec.c:1697)
==8438== by 0x427FD2: execpline (exec.c:1484)
==8438== by 0x427756: execlist (exec.c:1267)
==8438== by 0x42717C: execode (exec.c:1073)
==8438== by 0x431299: runshfunc (exec.c:5040)
==8438== by 0x430E76: doshfunc (exec.c:4920)
==8438== by 0x4302FB: execshfunc (exec.c:4557)
==8438== by 0x42D8C1: execcmd (exec.c:3373)
==8438==
==8438==
==8438== 2 errors in context 2 of 2:
==8438== Conditional jump or move depends on uninitialised value(s)
==8438== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8438== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8438== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8438== by 0x40EFC2: execbuiltin (builtin.c:450)
==8438== by 0x42D8E9: execcmd (exec.c:3378)
==8438== by 0x428CA0: execpline2 (exec.c:1697)
==8438== by 0x427FD2: execpline (exec.c:1484)
==8438== by 0x42779A: execlist (exec.c:1275)
==8438== by 0x42717C: execode (exec.c:1073)
==8438== by 0x431299: runshfunc (exec.c:5040)
==8438== by 0x430E76: doshfunc (exec.c:4920)
==8438== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8438==
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8458-- Caught __NR_exit; running __libc_freeres()
==8458== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8458-by-pythonnut-on-???
==8458== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8458-by-pythonnut-on-???
==8458== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8458-by-pythonnut-on-???
==8458==
==8458== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8458== don't want to do, unless you know exactly what you're doing,
==8458== or are doing some strange experiment):
==8458== /usr/lib/valgrind/../../bin/vgdb --pid=8458 ...command...
==8458==
==8458== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8458== /path/to/gdb ./zsh
==8458== and then give GDB the following command
==8458== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8458
==8458== --pid is optional if only one valgrind process is running
==8458==
--8458-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8458==
==8458== HEAP SUMMARY:
==8458== in use at exit: 3,014,290 bytes in 68,607 blocks
==8458== total heap usage: 831,592 allocs, 762,985 frees, 57,092,674 bytes allocated
==8458==
==8412== Checked 4,631,152 bytes
==8412==
==8412== LEAK SUMMARY:
==8412== definitely lost: 253 bytes in 4 blocks
==8412== indirectly lost: 6,756 bytes in 7 blocks
==8412== possibly lost: 0 bytes in 0 blocks
==8412== still reachable: 2,976,790 bytes in 68,281 blocks
==8412== suppressed: 0 bytes in 0 blocks
==8412== Rerun with --leak-check=full to see details of leaked memory
==8412==
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412==
==8412== 1 errors in context 1 of 1:
==8412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8412== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8412== by 0x488CD0: stringsubst (subst.c:301)
==8412== by 0x48801B: prefork (subst.c:77)
==8412== by 0x42B318: execcmd (exec.c:2619)
==8412== by 0x428CA0: execpline2 (exec.c:1697)
==8412== by 0x427FD2: execpline (exec.c:1484)
==8412== by 0x427756: execlist (exec.c:1267)
==8412== by 0x42717C: execode (exec.c:1073)
==8412== by 0x431299: runshfunc (exec.c:5040)
==8412== by 0x430E76: doshfunc (exec.c:4920)
==8412== by 0x4302FB: execshfunc (exec.c:4557)
==8458== Searching for pointers to 68,607 not-freed blocks
==8412== by 0x42D8C1: execcmd (exec.c:3373)
==8412==
--8458-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8458-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8458-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8458-- Scanning root segment: 0x4037000..0x403afff (16384)
--8458-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8458-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8458-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8458-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8458-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8458-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8458-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8458-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8458-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8458-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8458-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8458-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8458-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8458-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8458-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8458-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8458-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8458-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8458-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8458-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8458-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8458-- Scanning root segment: 0x701a000..0x701afff (4096)
--8458-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8458-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8458-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8458-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8458-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8458-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8458-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8458-- Scanning root segment: 0xffeff3000..0xfff000fff (57344)
--8358-- Caught __NR_exit; running __libc_freeres()
--8358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8358==
==8358== HEAP SUMMARY:
==8358== in use at exit: 2,983,200 bytes in 68,279 blocks
==8358== total heap usage: 830,662 allocs, 762,383 frees, 57,164,906 bytes allocated
==8358==
==8358== Searching for pointers to 68,279 not-freed blocks
--8358-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8358-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8358-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8358-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8358-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8358-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8358-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8358-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8358-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8358-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8358-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8358-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8358-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8358-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8358-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8358-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8358-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8358-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8358-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8358-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8358-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8358-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8358-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8358-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8358-- Scanning root segment: 0x701a000..0x701afff (4096)
--8358-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8358-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8358-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8358-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8358-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8358-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8358-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8358-- Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8458== Checked 4,675,528 bytes
==8458==
==8458== LEAK SUMMARY:
==8458== definitely lost: 253 bytes in 4 blocks
==8458== indirectly lost: 6,756 bytes in 7 blocks
==8458== possibly lost: 0 bytes in 0 blocks
==8458== still reachable: 3,007,281 bytes in 68,596 blocks
==8458== suppressed: 0 bytes in 0 blocks
==8458== Rerun with --leak-check=full to see details of leaked memory
==8458==
==8458== Use --track-origins=yes to see where uninitialised values come from
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8458==
==8458== 1 errors in context 1 of 2:
==8458== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8458== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8458== by 0x488CD0: stringsubst (subst.c:301)
==8458== by 0x48801B: prefork (subst.c:77)
==8458== by 0x42B318: execcmd (exec.c:2619)
==8458== by 0x428CA0: execpline2 (exec.c:1697)
==8458== by 0x427FD2: execpline (exec.c:1484)
==8458== by 0x427756: execlist (exec.c:1267)
==8458== by 0x42717C: execode (exec.c:1073)
==8458== by 0x431299: runshfunc (exec.c:5040)
==8458== by 0x430E76: doshfunc (exec.c:4920)
==8458== by 0x4302FB: execshfunc (exec.c:4557)
==8458== by 0x42D8C1: execcmd (exec.c:3373)
==8458==
==8458==
==8458== 2 errors in context 2 of 2:
==8458== Conditional jump or move depends on uninitialised value(s)
==8458== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8458== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8458== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8458== by 0x40EFC2: execbuiltin (builtin.c:450)
==8458== by 0x42D8E9: execcmd (exec.c:3378)
==8458== by 0x428CA0: execpline2 (exec.c:1697)
==8458== by 0x427FD2: execpline (exec.c:1484)
==8458== by 0x42779A: execlist (exec.c:1275)
==8458== by 0x42717C: execode (exec.c:1073)
==8458== by 0x431299: runshfunc (exec.c:5040)
==8458== by 0x430E76: doshfunc (exec.c:4920)
==8458== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8458==
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEA45C, len 4
==8358== Checked 4,629,880 bytes
==8358==
==8563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8563-by-pythonnut-on-???
==8563== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8563-by-pythonnut-on-???
==8563== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8563-by-pythonnut-on-???
==8563==
==8563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8563== don't want to do, unless you know exactly what you're doing,
==8563== or are doing some strange experiment):
==8563== /usr/lib/valgrind/../../bin/vgdb --pid=8563 ...command...
==8563==
==8563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8563== /path/to/gdb ./zsh
==8563== and then give GDB the following command
==8563== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8563
==8563== --pid is optional if only one valgrind process is running
==8563==
--8563-- Caught __NR_exit; running __libc_freeres()
==8358== LEAK SUMMARY:
==8358== definitely lost: 253 bytes in 4 blocks
==8358== indirectly lost: 6,756 bytes in 7 blocks
==8358== possibly lost: 0 bytes in 0 blocks
==8358== still reachable: 2,976,191 bytes in 68,268 blocks
==8358== suppressed: 0 bytes in 0 blocks
==8358== Rerun with --leak-check=full to see details of leaked memory
==8358==
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8358==
==8358== 1 errors in context 1 of 1:
==8358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8358== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8358== by 0x488CD0: stringsubst (subst.c:301)
==8358== by 0x48801B: prefork (subst.c:77)
==8358== by 0x42B318: execcmd (exec.c:2619)
==8358== by 0x428CA0: execpline2 (exec.c:1697)
==8358== by 0x427FD2: execpline (exec.c:1484)
==8358== by 0x427756: execlist (exec.c:1267)
==8358== by 0x42717C: execode (exec.c:1073)
==8358== by 0x431299: runshfunc (exec.c:5040)
==8358== by 0x430E76: doshfunc (exec.c:4920)
==8358== by 0x4302FB: execshfunc (exec.c:4557)
==8358== by 0x42D8C1: execcmd (exec.c:3373)
==8358==
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8564-by-pythonnut-on-???
==8564== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8564-by-pythonnut-on-???
==8564== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8564-by-pythonnut-on-???
==8564==
==8564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8564== don't want to do, unless you know exactly what you're doing,
==8564== or are doing some strange experiment):
==8564== /usr/lib/valgrind/../../bin/vgdb --pid=8564 ...command...
==8564==
==8564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8564== /path/to/gdb ./zsh
==8564== and then give GDB the following command
==8564== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8564
==8564== --pid is optional if only one valgrind process is running
==8564==
--8563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8563==
==8563== HEAP SUMMARY:
==8563== in use at exit: 3,018,391 bytes in 68,693 blocks
==8563== total heap usage: 832,015 allocs, 763,322 frees, 57,327,847 bytes allocated
==8563==
--8564-- Caught __NR_exit; running __libc_freeres()
==8563== Searching for pointers to 68,693 not-freed blocks
--8563-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8563-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8563-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8563-- Scanning root segment: 0x4037000..0x403afff (16384)
--8563-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8563-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8563-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8563-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8563-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8563-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8563-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8563-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8563-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8563-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8563-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8563-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8563-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8563-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8563-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8563-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8563-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8563-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8563-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8563-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8563-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8563-- Scanning root segment: 0x701a000..0x701afff (4096)
--8563-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8563-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8563-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8563-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8563-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8563-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8563-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8563-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8564==
==8564== HEAP SUMMARY:
==8564== in use at exit: 3,015,182 bytes in 68,630 blocks
==8564== total heap usage: 832,162 allocs, 763,532 frees, 57,344,270 bytes allocated
==8564==
==8564== Searching for pointers to 68,630 not-freed blocks
--8564-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8564-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8564-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8564-- Scanning root segment: 0x4037000..0x403afff (16384)
--8564-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8564-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8564-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8564-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8564-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8564-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8564-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8564-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8564-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8564-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8564-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8564-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8564-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8564-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8564-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8564-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8564-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8564-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8564-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8564-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8564-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8564-- Scanning root segment: 0x701a000..0x701afff (4096)
--8564-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8564-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8564-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8564-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8564-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8564-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8564-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8564-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8563== Checked 4,680,888 bytes
==8563==
==8563== LEAK SUMMARY:
==8563== definitely lost: 253 bytes in 4 blocks
==8563== indirectly lost: 6,756 bytes in 7 blocks
==8563== possibly lost: 0 bytes in 0 blocks
==8563== still reachable: 3,011,382 bytes in 68,682 blocks
==8563== suppressed: 0 bytes in 0 blocks
==8563== Rerun with --leak-check=full to see details of leaked memory
==8563==
==8563== Use --track-origins=yes to see where uninitialised values come from
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8563==
==8563== 1 errors in context 1 of 2:
==8563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8563== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8563== by 0x488CD0: stringsubst (subst.c:301)
==8563== by 0x48801B: prefork (subst.c:77)
==8563== by 0x42B318: execcmd (exec.c:2619)
==8563== by 0x428CA0: execpline2 (exec.c:1697)
==8563== by 0x427FD2: execpline (exec.c:1484)
==8563== by 0x427756: execlist (exec.c:1267)
==8563== by 0x42717C: execode (exec.c:1073)
==8563== by 0x431299: runshfunc (exec.c:5040)
==8563== by 0x430E76: doshfunc (exec.c:4920)
==8563== by 0x4302FB: execshfunc (exec.c:4557)
==8563== by 0x42D8C1: execcmd (exec.c:3373)
==8563==
==8563==
==8563== 2 errors in context 2 of 2:
==8563== Conditional jump or move depends on uninitialised value(s)
==8563== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8563== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8563== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8563== by 0x40EFC2: execbuiltin (builtin.c:450)
==8563== by 0x42D8E9: execcmd (exec.c:3378)
==8563== by 0x428CA0: execpline2 (exec.c:1697)
==8563== by 0x427FD2: execpline (exec.c:1484)
==8563== by 0x42779A: execlist (exec.c:1275)
==8563== by 0x42717C: execode (exec.c:1073)
==8563== by 0x431299: runshfunc (exec.c:5040)
==8563== by 0x430E76: doshfunc (exec.c:4920)
==8563== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8563==
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564== Checked 4,676,336 bytes
==8564==
==8564== LEAK SUMMARY:
==8564== definitely lost: 253 bytes in 4 blocks
==8564== indirectly lost: 6,756 bytes in 7 blocks
==8564== possibly lost: 0 bytes in 0 blocks
==8564== still reachable: 3,008,173 bytes in 68,619 blocks
==8564== suppressed: 0 bytes in 0 blocks
==8564== Rerun with --leak-check=full to see details of leaked memory
==8564==
==8564== Use --track-origins=yes to see where uninitialised values come from
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564==
==8564== 1 errors in context 1 of 2:
==8564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8564== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8564== by 0x488CD0: stringsubst (subst.c:301)
==8564== by 0x48801B: prefork (subst.c:77)
==8564== by 0x42B318: execcmd (exec.c:2619)
==8564== by 0x428CA0: execpline2 (exec.c:1697)
==8564== by 0x427FD2: execpline (exec.c:1484)
==8564== by 0x427756: execlist (exec.c:1267)
==8564== by 0x42717C: execode (exec.c:1073)
==8564== by 0x431299: runshfunc (exec.c:5040)
==8564== by 0x430E76: doshfunc (exec.c:4920)
==8564== by 0x4302FB: execshfunc (exec.c:4557)
==8564== by 0x42D8C1: execcmd (exec.c:3373)
==8564==
==8564==
==8564== 2 errors in context 2 of 2:
==8564== Conditional jump or move depends on uninitialised value(s)
==8564== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8564== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8564== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8564== by 0x40EFC2: execbuiltin (builtin.c:450)
==8564== by 0x42D8E9: execcmd (exec.c:3378)
==8564== by 0x428CA0: execpline2 (exec.c:1697)
==8564== by 0x427FD2: execpline (exec.c:1484)
==8564== by 0x42779A: execlist (exec.c:1275)
==8564== by 0x42717C: execode (exec.c:1073)
==8564== by 0x431299: runshfunc (exec.c:5040)
==8564== by 0x430E76: doshfunc (exec.c:4920)
==8564== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8564==
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8638-- Caught __NR_exit; running __libc_freeres()
==8638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8638-by-pythonnut-on-???
==8638== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8638-by-pythonnut-on-???
==8638== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8638-by-pythonnut-on-???
==8638==
==8638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8638== don't want to do, unless you know exactly what you're doing,
==8638== or are doing some strange experiment):
==8638== /usr/lib/valgrind/../../bin/vgdb --pid=8638 ...command...
==8638==
==8638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8638== /path/to/gdb ./zsh
==8638== and then give GDB the following command
==8638== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8638
==8638== --pid is optional if only one valgrind process is running
==8638==
--8638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8638==
==8638== HEAP SUMMARY:
==8638== in use at exit: 3,015,118 bytes in 68,630 blocks
==8638== total heap usage: 832,142 allocs, 763,512 frees, 57,342,040 bytes allocated
==8638==
==8638== Searching for pointers to 68,630 not-freed blocks
--8638-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8638-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8638-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8638-- Scanning root segment: 0x4037000..0x403afff (16384)
--8638-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8638-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8638-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8638-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8638-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8638-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8638-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8638-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8638-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8638-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8638-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8638-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8638-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8638-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8638-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8638-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8638-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8638-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8638-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8638-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8638-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8638-- Scanning root segment: 0x701a000..0x701afff (4096)
--8638-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8638-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8638-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8638-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8638-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8638-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8638-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8638-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8638== Checked 4,676,256 bytes
==8638==
==8638== LEAK SUMMARY:
==8638== definitely lost: 253 bytes in 4 blocks
==8638== indirectly lost: 6,756 bytes in 7 blocks
==8638== possibly lost: 0 bytes in 0 blocks
==8638== still reachable: 3,008,109 bytes in 68,619 blocks
==8638== suppressed: 0 bytes in 0 blocks
==8638== Rerun with --leak-check=full to see details of leaked memory
==8638==
==8638== Use --track-origins=yes to see where uninitialised values come from
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8638==
==8638== 1 errors in context 1 of 2:
==8638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8638== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8638== by 0x488CD0: stringsubst (subst.c:301)
==8638== by 0x48801B: prefork (subst.c:77)
==8638== by 0x42B318: execcmd (exec.c:2619)
==8638== by 0x428CA0: execpline2 (exec.c:1697)
==8638== by 0x427FD2: execpline (exec.c:1484)
==8638== by 0x427756: execlist (exec.c:1267)
==8638== by 0x42717C: execode (exec.c:1073)
==8638== by 0x431299: runshfunc (exec.c:5040)
==8638== by 0x430E76: doshfunc (exec.c:4920)
==8638== by 0x4302FB: execshfunc (exec.c:4557)
==8638== by 0x42D8C1: execcmd (exec.c:3373)
==8638==
==8638==
==8638== 2 errors in context 2 of 2:
==8638== Conditional jump or move depends on uninitialised value(s)
==8638== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8638== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8638== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8638== by 0x40EFC2: execbuiltin (builtin.c:450)
==8638== by 0x42D8E9: execcmd (exec.c:3378)
==8638== by 0x428CA0: execpline2 (exec.c:1697)
==8638== by 0x427FD2: execpline (exec.c:1484)
==8638== by 0x42779A: execlist (exec.c:1275)
==8638== by 0x42717C: execode (exec.c:1073)
==8638== by 0x431299: runshfunc (exec.c:5040)
==8638== by 0x430E76: doshfunc (exec.c:4920)
==8638== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8638==
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8697-by-pythonnut-on-???
==8697== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8697-by-pythonnut-on-???
==8697== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8697-by-pythonnut-on-???
==8697==
==8697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8697== don't want to do, unless you know exactly what you're doing,
==8697== or are doing some strange experiment):
==8697== /usr/lib/valgrind/../../bin/vgdb --pid=8697 ...command...
==8697==
==8697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8697== /path/to/gdb ./zsh
==8697== and then give GDB the following command
==8697== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8697
==8697== --pid is optional if only one valgrind process is running
==8697==
--8697-- Caught __NR_exit; running __libc_freeres()
--8697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8697==
==8697== HEAP SUMMARY:
==8697== in use at exit: 3,015,148 bytes in 68,631 blocks
==8697== total heap usage: 832,155 allocs, 763,524 frees, 57,344,729 bytes allocated
==8697==
==8697== Searching for pointers to 68,631 not-freed blocks
--8697-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8697-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8697-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8697-- Scanning root segment: 0x4037000..0x403afff (16384)
--8697-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8697-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8697-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8697-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8697-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8697-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8697-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8697-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8697-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8697-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8697-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8697-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8697-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8697-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8697-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8697-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8697-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8697-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8697-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8697-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8697-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8697-- Scanning root segment: 0x701a000..0x701afff (4096)
--8697-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8697-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8697-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8697-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8697-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8697-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8697-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8697-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8697== Checked 4,675,768 bytes
==8697==
==8697== LEAK SUMMARY:
==8697== definitely lost: 253 bytes in 4 blocks
==8697== indirectly lost: 6,756 bytes in 7 blocks
==8697== possibly lost: 0 bytes in 0 blocks
==8697== still reachable: 3,008,139 bytes in 68,620 blocks
==8697== suppressed: 0 bytes in 0 blocks
==8697== Rerun with --leak-check=full to see details of leaked memory
==8697==
==8697== Use --track-origins=yes to see where uninitialised values come from
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697==
==8697== 1 errors in context 1 of 2:
==8697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8697== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8697== by 0x488CD0: stringsubst (subst.c:301)
==8697== by 0x48801B: prefork (subst.c:77)
==8697== by 0x42B318: execcmd (exec.c:2619)
==8697== by 0x428CA0: execpline2 (exec.c:1697)
==8697== by 0x427FD2: execpline (exec.c:1484)
==8697== by 0x427756: execlist (exec.c:1267)
==8697== by 0x42717C: execode (exec.c:1073)
==8697== by 0x431299: runshfunc (exec.c:5040)
==8697== by 0x430E76: doshfunc (exec.c:4920)
==8697== by 0x4302FB: execshfunc (exec.c:4557)
==8697== by 0x42D8C1: execcmd (exec.c:3373)
==8697==
==8697==
==8697== 2 errors in context 2 of 2:
==8697== Conditional jump or move depends on uninitialised value(s)
==8697== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8697== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8697== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8697== by 0x40EFC2: execbuiltin (builtin.c:450)
==8697== by 0x42D8E9: execcmd (exec.c:3378)
==8697== by 0x428CA0: execpline2 (exec.c:1697)
==8697== by 0x427FD2: execpline (exec.c:1484)
==8697== by 0x42779A: execlist (exec.c:1275)
==8697== by 0x42717C: execode (exec.c:1073)
==8697== by 0x431299: runshfunc (exec.c:5040)
==8697== by 0x430E76: doshfunc (exec.c:4920)
==8697== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8697==
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8698-- Caught __NR_exit; running __libc_freeres()
==8698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8698-by-pythonnut-on-???
==8698== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8698-by-pythonnut-on-???
==8698== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8698-by-pythonnut-on-???
==8698==
==8698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8698== don't want to do, unless you know exactly what you're doing,
==8698== or are doing some strange experiment):
==8698== /usr/lib/valgrind/../../bin/vgdb --pid=8698 ...command...
==8698==
==8698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8698== /path/to/gdb ./zsh
==8698== and then give GDB the following command
==8698== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8698
==8698== --pid is optional if only one valgrind process is running
==8698==
--8698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8698==
==8698== HEAP SUMMARY:
==8698== in use at exit: 3,014,858 bytes in 68,622 blocks
==8698== total heap usage: 832,337 allocs, 763,715 frees, 57,364,228 bytes allocated
==8698==
==8698== Searching for pointers to 68,622 not-freed blocks
--8698-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8698-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8698-- Scanning root segment: 0x4022000..0x4026fff (20480)
--8698-- Scanning root segment: 0x4049000..0x404cfff (16384)
--8698-- Scanning root segment: 0x4222000..0x4222fff (4096)
--8698-- Scanning root segment: 0x4223000..0x4223fff (4096)
--8698-- Scanning root segment: 0x4224000..0x4224fff (4096)
--8698-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8698-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8698-- Scanning root segment: 0x5041000..0x5041fff (4096)
--8698-- Scanning root segment: 0x5245000..0x5245fff (4096)
--8698-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--8698-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--8698-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8698-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--8698-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8698-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8698-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8698-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8698-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8698-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8698-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8698-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8698-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8698-- Scanning root segment: 0x701a000..0x701afff (4096)
--8698-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8698-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8698-- Scanning root segment: 0xae51000..0xae52fff (8192)
--8698-- Scanning root segment: 0xb054000..0xb054fff (4096)
--8698-- Scanning root segment: 0xb268000..0xb268fff (4096)
--8698-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--8698-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8698-- Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8698== Checked 4,659,864 bytes
==8698==
==8698== LEAK SUMMARY:
==8698== definitely lost: 253 bytes in 4 blocks
==8698== indirectly lost: 6,756 bytes in 7 blocks
==8698== possibly lost: 0 bytes in 0 blocks
==8698== still reachable: 3,007,849 bytes in 68,611 blocks
==8698== suppressed: 0 bytes in 0 blocks
==8698== Rerun with --leak-check=full to see details of leaked memory
==8698==
==8698== Use --track-origins=yes to see where uninitialised values come from
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8698==
==8698== 1 errors in context 1 of 2:
==8698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8698== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8698== by 0x488CD0: stringsubst (subst.c:301)
==8698== by 0x48801B: prefork (subst.c:77)
==8698== by 0x42B318: execcmd (exec.c:2619)
==8698== by 0x428CA0: execpline2 (exec.c:1697)
==8698== by 0x427FD2: execpline (exec.c:1484)
==8698== by 0x427756: execlist (exec.c:1267)
==8698== by 0x42717C: execode (exec.c:1073)
==8698== by 0x431299: runshfunc (exec.c:5040)
==8698== by 0x430E76: doshfunc (exec.c:4920)
==8698== by 0x4302FB: execshfunc (exec.c:4557)
==8698== by 0x42D8C1: execcmd (exec.c:3373)
==8698==
==8698==
==8698== 2 errors in context 2 of 2:
==8698== Conditional jump or move depends on uninitialised value(s)
==8698== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8698== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8698== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8698== by 0x40EFC2: execbuiltin (builtin.c:450)
==8698== by 0x42D8E9: execcmd (exec.c:3378)
==8698== by 0x428CA0: execpline2 (exec.c:1697)
==8698== by 0x427FD2: execpline (exec.c:1484)
==8698== by 0x42779A: execlist (exec.c:1275)
==8698== by 0x42717C: execode (exec.c:1073)
==8698== by 0x431299: runshfunc (exec.c:5040)
==8698== by 0x430E76: doshfunc (exec.c:4920)
==8698== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8698==
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/computil.so
--7806-- svma 0x00000026c0, avma 0x000ba726c0
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806-- new: 0x05a3d2e0 (__GI_strncmp ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806-- new: 0x05a3b1f0 (__GI_strchr ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806-- new: 0x05a4b610 (__GI_strncpy ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
==9244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9244-by-pythonnut-on-???
==9244== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9244-by-pythonnut-on-???
==9244== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9244-by-pythonnut-on-???
==9244==
==9244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9244== don't want to do, unless you know exactly what you're doing,
==9244== or are doing some strange experiment):
==9244== /usr/lib/valgrind/../../bin/vgdb --pid=9244 ...command...
==9244==
==9244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9244== /path/to/gdb ./zsh
==9244== and then give GDB the following command
==9244== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9244
==9244== --pid is optional if only one valgrind process is running
==9244==
--9244-- Caught __NR_exit; running __libc_freeres()
--9244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9244==
==9244== HEAP SUMMARY:
==9244== in use at exit: 3,144,593 bytes in 69,587 blocks
==9244== total heap usage: 924,938 allocs, 855,351 frees, 65,162,922 bytes allocated
==9244==
==9244== Searching for pointers to 69,587 not-freed blocks
--9244-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9244-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9244-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9244-- Scanning root segment: 0x4037000..0x403afff (16384)
--9244-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9244-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9244-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9244-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9244-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9244-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9244-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9244-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9244-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9244-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9244-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9244-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9244-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9244-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9244-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9244-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9244-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9244-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9244-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9244-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9244-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9244-- Scanning root segment: 0x701a000..0x701afff (4096)
--9244-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9244-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9244-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9244-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9244-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9244-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9244-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9244-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9244-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9244== Checked 4,820,928 bytes
==9244==
==9244== LEAK SUMMARY:
==9244== definitely lost: 1,533 bytes in 8 blocks
==9244== indirectly lost: 6,756 bytes in 7 blocks
==9244== possibly lost: 0 bytes in 0 blocks
==9244== still reachable: 3,136,304 bytes in 69,572 blocks
==9244== suppressed: 0 bytes in 0 blocks
==9244== Rerun with --leak-check=full to see details of leaked memory
==9244==
==9244== Use --track-origins=yes to see where uninitialised values come from
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9244==
==9244== 1 errors in context 1 of 2:
==9244== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9244== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9244== by 0x488CD0: stringsubst (subst.c:301)
==9244== by 0x48801B: prefork (subst.c:77)
==9244== by 0x42B318: execcmd (exec.c:2619)
==9244== by 0x428CA0: execpline2 (exec.c:1697)
==9244== by 0x427FD2: execpline (exec.c:1484)
==9244== by 0x427756: execlist (exec.c:1267)
==9244== by 0x42717C: execode (exec.c:1073)
==9244== by 0x431299: runshfunc (exec.c:5040)
==9244== by 0x430E76: doshfunc (exec.c:4920)
==9244== by 0x4302FB: execshfunc (exec.c:4557)
==9244== by 0x42D8C1: execcmd (exec.c:3373)
==9244==
==9244==
==9244== 2 errors in context 2 of 2:
==9244== Conditional jump or move depends on uninitialised value(s)
==9244== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9244== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9244== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9244== by 0x40EFC2: execbuiltin (builtin.c:450)
==9244== by 0x42D8E9: execcmd (exec.c:3378)
==9244== by 0x428CA0: execpline2 (exec.c:1697)
==9244== by 0x427FD2: execpline (exec.c:1484)
==9244== by 0x42779A: execlist (exec.c:1275)
==9244== by 0x42717C: execode (exec.c:1073)
==9244== by 0x431299: runshfunc (exec.c:5040)
==9244== by 0x430E76: doshfunc (exec.c:4920)
==9244== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9244==
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9250-by-pythonnut-on-???
==9250== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9250-by-pythonnut-on-???
==9250== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9250-by-pythonnut-on-???
==9250==
==9250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9250== don't want to do, unless you know exactly what you're doing,
==9250== or are doing some strange experiment):
==9250== /usr/lib/valgrind/../../bin/vgdb --pid=9250 ...command...
==9250==
==9250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9250== /path/to/gdb ./zsh
==9250== and then give GDB the following command
==9250== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9250
==9250== --pid is optional if only one valgrind process is running
==9250==
==9249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9249-by-pythonnut-on-???
==9249== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9249-by-pythonnut-on-???
==9249== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9249-by-pythonnut-on-???
==9249==
==9249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9249== don't want to do, unless you know exactly what you're doing,
==9249== or are doing some strange experiment):
==9249== /usr/lib/valgrind/../../bin/vgdb --pid=9249 ...command...
==9249==
==9249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9249== /path/to/gdb ./zsh
==9249== and then give GDB the following command
==9249== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9249
==9249== --pid is optional if only one valgrind process is running
==9249==
--9250-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
--9250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9250==
==9250== HEAP SUMMARY:
==9250== in use at exit: 3,118,133 bytes in 69,054 blocks
==9250== total heap usage: 925,536 allocs, 856,482 frees, 65,307,509 bytes allocated
==9250==
==9250== Searching for pointers to 69,054 not-freed blocks
--9250-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9250-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9250-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9250-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9250-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9250-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9250-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9250-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9250-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9250-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9250-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9250-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9250-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9250-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9250-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9250-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9250-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9250-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9250-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9250-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9250-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9250-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9250-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9250-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9250-- Scanning root segment: 0x701a000..0x701afff (4096)
--9250-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9250-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9250-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9250-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9250-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9250-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9250-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9250-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9250-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9250== Checked 4,767,176 bytes
==9250==
==9250== LEAK SUMMARY:
==9250== definitely lost: 1,533 bytes in 8 blocks
==9250== indirectly lost: 6,756 bytes in 7 blocks
==9250== possibly lost: 0 bytes in 0 blocks
==9250== still reachable: 3,109,844 bytes in 69,039 blocks
==9250== suppressed: 0 bytes in 0 blocks
==9250== Rerun with --leak-check=full to see details of leaked memory
==9250==
==9250== Use --track-origins=yes to see where uninitialised values come from
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250==
==9250== 1 errors in context 1 of 2:
==9250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9250== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9250== by 0x488CD0: stringsubst (subst.c:301)
==9250== by 0x48801B: prefork (subst.c:77)
==9250== by 0x42B318: execcmd (exec.c:2619)
==9250== by 0x428CA0: execpline2 (exec.c:1697)
==9250== by 0x427FD2: execpline (exec.c:1484)
==9250== by 0x427756: execlist (exec.c:1267)
==9250== by 0x42717C: execode (exec.c:1073)
==9250== by 0x431299: runshfunc (exec.c:5040)
==9250== by 0x430E76: doshfunc (exec.c:4920)
==9250== by 0x4302FB: execshfunc (exec.c:4557)
==9250== by 0x42D8C1: execcmd (exec.c:3373)
==9250==
==9250==
==9250== 2 errors in context 2 of 2:
==9250== Conditional jump or move depends on uninitialised value(s)
==9250== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9250== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9250== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9250== by 0x40EFC2: execbuiltin (builtin.c:450)
==9250== by 0x42D8E9: execcmd (exec.c:3378)
==9250== by 0x428CA0: execpline2 (exec.c:1697)
==9250== by 0x427FD2: execpline (exec.c:1484)
==9250== by 0x42779A: execlist (exec.c:1275)
==9250== by 0x42717C: execode (exec.c:1073)
==9250== by 0x431299: runshfunc (exec.c:5040)
==9250== by 0x430E76: doshfunc (exec.c:4920)
==9250== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9250==
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9249-- Caught __NR_exit; running __libc_freeres()
--9249-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9249==
==9249== HEAP SUMMARY:
==9249== in use at exit: 3,118,069 bytes in 69,051 blocks
==9249== total heap usage: 925,534 allocs, 856,483 frees, 65,307,268 bytes allocated
==9249==
==9249== Searching for pointers to 69,051 not-freed blocks
--9249-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9249-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9249-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9249-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9249-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9249-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9249-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9249-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9249-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9249-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9249-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9249-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9249-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9249-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9249-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9249-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9249-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9249-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9249-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9249-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9249-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9249-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9249-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9249-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9249-- Scanning root segment: 0x701a000..0x701afff (4096)
--9249-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9249-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9249-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9249-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9249-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9249-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9249-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9249-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9249-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9249== Checked 4,766,488 bytes
==9249==
==9249== LEAK SUMMARY:
==9249== definitely lost: 1,533 bytes in 8 blocks
==9249== indirectly lost: 6,756 bytes in 7 blocks
==9249== possibly lost: 0 bytes in 0 blocks
==9249== still reachable: 3,109,780 bytes in 69,036 blocks
==9249== suppressed: 0 bytes in 0 blocks
==9249== Rerun with --leak-check=full to see details of leaked memory
==9249==
==9249== Use --track-origins=yes to see where uninitialised values come from
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9249==
==9249== 1 errors in context 1 of 2:
==9249== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9249== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9249== by 0x488CD0: stringsubst (subst.c:301)
==9249== by 0x48801B: prefork (subst.c:77)
==9249== by 0x42B318: execcmd (exec.c:2619)
==9249== by 0x428CA0: execpline2 (exec.c:1697)
==9249== by 0x427FD2: execpline (exec.c:1484)
==9249== by 0x427756: execlist (exec.c:1267)
==9249== by 0x42717C: execode (exec.c:1073)
==9249== by 0x431299: runshfunc (exec.c:5040)
==9249== by 0x430E76: doshfunc (exec.c:4920)
==9249== by 0x4302FB: execshfunc (exec.c:4557)
==9249== by 0x42D8C1: execcmd (exec.c:3373)
==9249==
==9249==
==9249== 2 errors in context 2 of 2:
==9249== Conditional jump or move depends on uninitialised value(s)
==9249== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9249== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9249== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9249== by 0x40EFC2: execbuiltin (builtin.c:450)
==9249== by 0x42D8E9: execcmd (exec.c:3378)
==9249== by 0x428CA0: execpline2 (exec.c:1697)
==9249== by 0x427FD2: execpline (exec.c:1484)
==9249== by 0x42779A: execlist (exec.c:1275)
==9249== by 0x42717C: execode (exec.c:1073)
==9249== by 0x431299: runshfunc (exec.c:5040)
==9249== by 0x430E76: doshfunc (exec.c:4920)
==9249== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9249==
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9252-- Caught __NR_exit; running __libc_freeres()
==9252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9252-by-pythonnut-on-???
==9252== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9252-by-pythonnut-on-???
==9252== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9252-by-pythonnut-on-???
==9252==
==9252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9252== don't want to do, unless you know exactly what you're doing,
==9252== or are doing some strange experiment):
==9252== /usr/lib/valgrind/../../bin/vgdb --pid=9252 ...command...
==9252==
==9252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9252== /path/to/gdb ./zsh
==9252== and then give GDB the following command
==9252== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9252
==9252== --pid is optional if only one valgrind process is running
==9252==
--9252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9252==
==9252== HEAP SUMMARY:
==9252== in use at exit: 3,118,076 bytes in 69,051 blocks
==9252== total heap usage: 925,549 allocs, 856,498 frees, 65,312,266 bytes allocated
==9252==
==9252== Searching for pointers to 69,051 not-freed blocks
--9252-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9252-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9252-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9252-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9252-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9252-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9252-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9252-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9252-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9252-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9252-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9252-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9252-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9252-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9252-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9252-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9252-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9252-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9252-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9252-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9252-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9252-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9252-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9252-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9252-- Scanning root segment: 0x701a000..0x701afff (4096)
--9252-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9252-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9252-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9252-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9252-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9252-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9252-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9252-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9252-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9252== Checked 4,766,640 bytes
==9252==
==9252== LEAK SUMMARY:
==9252== definitely lost: 1,533 bytes in 8 blocks
==9252== indirectly lost: 6,756 bytes in 7 blocks
==9252== possibly lost: 0 bytes in 0 blocks
==9252== still reachable: 3,109,787 bytes in 69,036 blocks
==9252== suppressed: 0 bytes in 0 blocks
==9252== Rerun with --leak-check=full to see details of leaked memory
==9252==
==9252== Use --track-origins=yes to see where uninitialised values come from
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9252==
==9252== 1 errors in context 1 of 2:
==9252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9252== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9252== by 0x488CD0: stringsubst (subst.c:301)
==9252== by 0x48801B: prefork (subst.c:77)
==9252== by 0x42B318: execcmd (exec.c:2619)
==9252== by 0x428CA0: execpline2 (exec.c:1697)
==9252== by 0x427FD2: execpline (exec.c:1484)
==9252== by 0x427756: execlist (exec.c:1267)
==9252== by 0x42717C: execode (exec.c:1073)
==9252== by 0x431299: runshfunc (exec.c:5040)
==9252== by 0x430E76: doshfunc (exec.c:4920)
==9252== by 0x4302FB: execshfunc (exec.c:4557)
==9252== by 0x42D8C1: execcmd (exec.c:3373)
==9252==
==9252==
==9252== 2 errors in context 2 of 2:
==9252== Conditional jump or move depends on uninitialised value(s)
==9252== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9252== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9252== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9252== by 0x40EFC2: execbuiltin (builtin.c:450)
==9252== by 0x42D8E9: execcmd (exec.c:3378)
==9252== by 0x428CA0: execpline2 (exec.c:1697)
==9252== by 0x427FD2: execpline (exec.c:1484)
==9252== by 0x42779A: execlist (exec.c:1275)
==9252== by 0x42717C: execode (exec.c:1073)
==9252== by 0x431299: runshfunc (exec.c:5040)
==9252== by 0x430E76: doshfunc (exec.c:4920)
==9252== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9252==
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9253-- Caught __NR_exit; running __libc_freeres()
==9253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9253-by-pythonnut-on-???
==9253== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9253-by-pythonnut-on-???
==9253== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9253-by-pythonnut-on-???
==9253==
==9253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9253== don't want to do, unless you know exactly what you're doing,
==9253== or are doing some strange experiment):
==9253== /usr/lib/valgrind/../../bin/vgdb --pid=9253 ...command...
==9253==
==9253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9253== /path/to/gdb ./zsh
==9253== and then give GDB the following command
==9253== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9253
==9253== --pid is optional if only one valgrind process is running
==9253==
--9253-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9253==
==9253== HEAP SUMMARY:
==9253== in use at exit: 3,118,172 bytes in 69,051 blocks
==9253== total heap usage: 925,565 allocs, 856,514 frees, 65,317,053 bytes allocated
==9253==
==9253== Searching for pointers to 69,051 not-freed blocks
--9253-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9253-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9253-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9253-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9253-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9253-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9253-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9253-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9253-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9253-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9253-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9253-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9253-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9253-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9253-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9253-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9253-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9253-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9253-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9253-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9253-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9253-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9253-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9253-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9253-- Scanning root segment: 0x701a000..0x701afff (4096)
--9253-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9253-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9253-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9253-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9253-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9253-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9253-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9253-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9253-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9253== Checked 4,765,952 bytes
==9253==
==9253== LEAK SUMMARY:
==9253== definitely lost: 1,533 bytes in 8 blocks
==9253== indirectly lost: 6,756 bytes in 7 blocks
==9253== possibly lost: 0 bytes in 0 blocks
==9253== still reachable: 3,109,883 bytes in 69,036 blocks
==9253== suppressed: 0 bytes in 0 blocks
==9253== Rerun with --leak-check=full to see details of leaked memory
==9253==
==9253== Use --track-origins=yes to see where uninitialised values come from
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9253==
==9253== 1 errors in context 1 of 2:
==9253== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9253== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9253== by 0x488CD0: stringsubst (subst.c:301)
==9253== by 0x48801B: prefork (subst.c:77)
==9253== by 0x42B318: execcmd (exec.c:2619)
==9253== by 0x428CA0: execpline2 (exec.c:1697)
==9253== by 0x427FD2: execpline (exec.c:1484)
==9253== by 0x427756: execlist (exec.c:1267)
==9253== by 0x42717C: execode (exec.c:1073)
==9253== by 0x431299: runshfunc (exec.c:5040)
==9253== by 0x430E76: doshfunc (exec.c:4920)
==9253== by 0x4302FB: execshfunc (exec.c:4557)
==9253== by 0x42D8C1: execcmd (exec.c:3373)
==9253==
==9253==
==9253== 2 errors in context 2 of 2:
==9253== Conditional jump or move depends on uninitialised value(s)
==9253== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9253== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9253== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9253== by 0x40EFC2: execbuiltin (builtin.c:450)
==9253== by 0x42D8E9: execcmd (exec.c:3378)
==9253== by 0x428CA0: execpline2 (exec.c:1697)
==9253== by 0x427FD2: execpline (exec.c:1484)
==9253== by 0x42779A: execlist (exec.c:1275)
==9253== by 0x42717C: execode (exec.c:1073)
==9253== by 0x431299: runshfunc (exec.c:5040)
==9253== by 0x430E76: doshfunc (exec.c:4920)
==9253== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9253==
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9254-by-pythonnut-on-???
==9254== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9254-by-pythonnut-on-???
==9254== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9254-by-pythonnut-on-???
==9254==
==9254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9254== don't want to do, unless you know exactly what you're doing,
==9254== or are doing some strange experiment):
==9254== /usr/lib/valgrind/../../bin/vgdb --pid=9254 ...command...
==9254==
==9254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9254== /path/to/gdb ./zsh
==9254== and then give GDB the following command
==9254== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9254
==9254== --pid is optional if only one valgrind process is running
==9254==
--9254-- Caught __NR_exit; running __libc_freeres()
--9254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9254==
==9254== HEAP SUMMARY:
==9254== in use at exit: 3,118,418 bytes in 69,057 blocks
==9254== total heap usage: 925,613 allocs, 856,556 frees, 65,326,077 bytes allocated
==9254==
==9254== Searching for pointers to 69,057 not-freed blocks
--9254-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9254-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9254-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9254-- Scanning root segment: 0x4037000..0x403afff (16384)
--9254-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9254-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9254-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9254-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9254-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9254-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9254-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9254-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9254-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9254-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9254-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9254-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9254-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9254-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9254-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9254-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9254-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9254-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9254-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9254-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9254-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9254-- Scanning root segment: 0x701a000..0x701afff (4096)
--9254-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9254-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9254-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9254-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9254-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9254-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9254-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9254-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9254-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9254== Checked 4,782,512 bytes
==9254==
==9254== LEAK SUMMARY:
==9254== definitely lost: 1,533 bytes in 8 blocks
==9254== indirectly lost: 6,756 bytes in 7 blocks
==9254== possibly lost: 0 bytes in 0 blocks
==9254== still reachable: 3,110,129 bytes in 69,042 blocks
==9254== suppressed: 0 bytes in 0 blocks
==9254== Rerun with --leak-check=full to see details of leaked memory
==9254==
==9254== Use --track-origins=yes to see where uninitialised values come from
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254==
==9254== 1 errors in context 1 of 2:
==9254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9254== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9254== by 0x488CD0: stringsubst (subst.c:301)
==9254== by 0x48801B: prefork (subst.c:77)
==9254== by 0x42B318: execcmd (exec.c:2619)
==9254== by 0x428CA0: execpline2 (exec.c:1697)
==9254== by 0x427FD2: execpline (exec.c:1484)
==9254== by 0x427756: execlist (exec.c:1267)
==9254== by 0x42717C: execode (exec.c:1073)
==9254== by 0x431299: runshfunc (exec.c:5040)
==9254== by 0x430E76: doshfunc (exec.c:4920)
==9254== by 0x4302FB: execshfunc (exec.c:4557)
==9254== by 0x42D8C1: execcmd (exec.c:3373)
==9254==
==9254==
==9254== 2 errors in context 2 of 2:
==9254== Conditional jump or move depends on uninitialised value(s)
==9254== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9254== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9254== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9254== by 0x40EFC2: execbuiltin (builtin.c:450)
==9254== by 0x42D8E9: execcmd (exec.c:3378)
==9254== by 0x428CA0: execpline2 (exec.c:1697)
==9254== by 0x427FD2: execpline (exec.c:1484)
==9254== by 0x42779A: execlist (exec.c:1275)
==9254== by 0x42717C: execode (exec.c:1073)
==9254== by 0x431299: runshfunc (exec.c:5040)
==9254== by 0x430E76: doshfunc (exec.c:4920)
==9254== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9254==
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9255-- Caught __NR_exit; running __libc_freeres()
==9255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9255-by-pythonnut-on-???
==9255== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9255-by-pythonnut-on-???
==9255== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9255-by-pythonnut-on-???
==9255==
==9255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9255== don't want to do, unless you know exactly what you're doing,
==9255== or are doing some strange experiment):
==9255== /usr/lib/valgrind/../../bin/vgdb --pid=9255 ...command...
==9255==
==9255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9255== /path/to/gdb ./zsh
==9255== and then give GDB the following command
==9255== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9255
==9255== --pid is optional if only one valgrind process is running
==9255==
--9255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9255==
==9255== HEAP SUMMARY:
==9255== in use at exit: 3,118,354 bytes in 69,057 blocks
==9255== total heap usage: 925,593 allocs, 856,536 frees, 65,323,847 bytes allocated
==9255==
==9255== Searching for pointers to 69,057 not-freed blocks
--9255-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9255-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9255-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9255-- Scanning root segment: 0x4037000..0x403afff (16384)
--9255-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9255-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9255-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9255-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9255-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9255-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9255-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9255-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9255-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9255-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9255-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9255-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9255-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9255-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9255-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9255-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9255-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9255-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9255-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9255-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9255-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9255-- Scanning root segment: 0x701a000..0x701afff (4096)
--9255-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9255-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9255-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9255-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9255-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9255-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9255-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9255-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9255-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9255== Checked 4,782,432 bytes
==9255==
==9255== LEAK SUMMARY:
==9255== definitely lost: 1,533 bytes in 8 blocks
==9255== indirectly lost: 6,756 bytes in 7 blocks
==9255== possibly lost: 0 bytes in 0 blocks
==9255== still reachable: 3,110,065 bytes in 69,042 blocks
==9255== suppressed: 0 bytes in 0 blocks
==9255== Rerun with --leak-check=full to see details of leaked memory
==9255==
==9255== Use --track-origins=yes to see where uninitialised values come from
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9255==
==9255== 1 errors in context 1 of 2:
==9255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9255== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9255== by 0x488CD0: stringsubst (subst.c:301)
==9255== by 0x48801B: prefork (subst.c:77)
==9255== by 0x42B318: execcmd (exec.c:2619)
==9255== by 0x428CA0: execpline2 (exec.c:1697)
==9255== by 0x427FD2: execpline (exec.c:1484)
==9255== by 0x427756: execlist (exec.c:1267)
==9255== by 0x42717C: execode (exec.c:1073)
==9255== by 0x431299: runshfunc (exec.c:5040)
==9255== by 0x430E76: doshfunc (exec.c:4920)
==9255== by 0x4302FB: execshfunc (exec.c:4557)
==9255== by 0x42D8C1: execcmd (exec.c:3373)
==9255==
==9255==
==9255== 2 errors in context 2 of 2:
==9255== Conditional jump or move depends on uninitialised value(s)
==9255== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9255== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9255== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9255== by 0x40EFC2: execbuiltin (builtin.c:450)
==9255== by 0x42D8E9: execcmd (exec.c:3378)
==9255== by 0x428CA0: execpline2 (exec.c:1697)
==9255== by 0x427FD2: execpline (exec.c:1484)
==9255== by 0x42779A: execlist (exec.c:1275)
==9255== by 0x42717C: execode (exec.c:1073)
==9255== by 0x431299: runshfunc (exec.c:5040)
==9255== by 0x430E76: doshfunc (exec.c:4920)
==9255== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9255==
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9258-by-pythonnut-on-???
==9258== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9258-by-pythonnut-on-???
==9258== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9258-by-pythonnut-on-???
==9258==
==9258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9258== don't want to do, unless you know exactly what you're doing,
==9258== or are doing some strange experiment):
==9258== /usr/lib/valgrind/../../bin/vgdb --pid=9258 ...command...
==9258==
==9258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9258== /path/to/gdb ./zsh
==9258== and then give GDB the following command
==9258== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9258
==9258== --pid is optional if only one valgrind process is running
==9258==
--9258-- Caught __NR_exit; running __libc_freeres()
--9258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9258==
==9258== HEAP SUMMARY:
==9258== in use at exit: 3,118,384 bytes in 69,058 blocks
==9258== total heap usage: 925,606 allocs, 856,548 frees, 65,326,536 bytes allocated
==9258==
==9258== Searching for pointers to 69,058 not-freed blocks
--9258-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9258-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9258-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9258-- Scanning root segment: 0x4037000..0x403afff (16384)
--9258-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9258-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9258-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9258-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9258-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9258-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9258-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9258-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9258-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9258-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9258-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9258-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9258-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9258-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9258-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9258-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9258-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9258-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9258-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9258-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9258-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9258-- Scanning root segment: 0x701a000..0x701afff (4096)
--9258-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9258-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9258-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9258-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9258-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9258-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9258-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9258-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9258-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9258== Checked 4,781,944 bytes
==9258==
==9258== LEAK SUMMARY:
==9258== definitely lost: 1,533 bytes in 8 blocks
==9258== indirectly lost: 6,756 bytes in 7 blocks
==9258== possibly lost: 0 bytes in 0 blocks
==9258== still reachable: 3,110,095 bytes in 69,043 blocks
==9258== suppressed: 0 bytes in 0 blocks
==9258== Rerun with --leak-check=full to see details of leaked memory
==9258==
==9258== Use --track-origins=yes to see where uninitialised values come from
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258==
==9258== 1 errors in context 1 of 2:
==9258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9258== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9258== by 0x488CD0: stringsubst (subst.c:301)
==9258== by 0x48801B: prefork (subst.c:77)
==9258== by 0x42B318: execcmd (exec.c:2619)
==9258== by 0x428CA0: execpline2 (exec.c:1697)
==9258== by 0x427FD2: execpline (exec.c:1484)
==9258== by 0x427756: execlist (exec.c:1267)
==9258== by 0x42717C: execode (exec.c:1073)
==9258== by 0x431299: runshfunc (exec.c:5040)
==9258== by 0x430E76: doshfunc (exec.c:4920)
==9258== by 0x4302FB: execshfunc (exec.c:4557)
==9258== by 0x42D8C1: execcmd (exec.c:3373)
==9258==
==9258==
==9258== 2 errors in context 2 of 2:
==9258== Conditional jump or move depends on uninitialised value(s)
==9258== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9258== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9258== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9258== by 0x40EFC2: execbuiltin (builtin.c:450)
==9258== by 0x42D8E9: execcmd (exec.c:3378)
==9258== by 0x428CA0: execpline2 (exec.c:1697)
==9258== by 0x427FD2: execpline (exec.c:1484)
==9258== by 0x42779A: execlist (exec.c:1275)
==9258== by 0x42717C: execode (exec.c:1073)
==9258== by 0x431299: runshfunc (exec.c:5040)
==9258== by 0x430E76: doshfunc (exec.c:4920)
==9258== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9258==
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9259-- Caught __NR_exit; running __libc_freeres()
==9259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9259-by-pythonnut-on-???
==9259== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9259-by-pythonnut-on-???
==9259== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9259-by-pythonnut-on-???
==9259==
==9259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9259== don't want to do, unless you know exactly what you're doing,
==9259== or are doing some strange experiment):
==9259== /usr/lib/valgrind/../../bin/vgdb --pid=9259 ...command...
==9259==
==9259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9259== /path/to/gdb ./zsh
==9259== and then give GDB the following command
==9259== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9259
==9259== --pid is optional if only one valgrind process is running
==9259==
--9259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9259==
==9259== HEAP SUMMARY:
==9259== in use at exit: 3,122,304 bytes in 69,069 blocks
==9259== total heap usage: 927,059 allocs, 857,990 frees, 65,417,903 bytes allocated
==9259==
==9259== Searching for pointers to 69,069 not-freed blocks
--9259-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9259-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9259-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9259-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9259-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9259-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9259-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9259-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9259-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9259-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9259-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9259-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9259-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9259-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9259-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9259-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9259-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9259-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9259-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9259-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9259-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9259-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9259-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9259-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9259-- Scanning root segment: 0x701a000..0x701afff (4096)
--9259-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9259-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9259-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9259-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9259-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9259-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9259-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9259-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9259-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9259== Checked 4,771,064 bytes
==9259==
==9259== LEAK SUMMARY:
==9259== definitely lost: 1,533 bytes in 8 blocks
==9259== indirectly lost: 6,756 bytes in 7 blocks
==9259== possibly lost: 0 bytes in 0 blocks
==9259== still reachable: 3,114,015 bytes in 69,054 blocks
==9259== suppressed: 0 bytes in 0 blocks
==9259== Rerun with --leak-check=full to see details of leaked memory
==9259==
==9259== Use --track-origins=yes to see where uninitialised values come from
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9259==
==9259== 1 errors in context 1 of 2:
==9259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9259== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9259== by 0x488CD0: stringsubst (subst.c:301)
==9259== by 0x48801B: prefork (subst.c:77)
==9259== by 0x42B318: execcmd (exec.c:2619)
==9259== by 0x428CA0: execpline2 (exec.c:1697)
==9259== by 0x427FD2: execpline (exec.c:1484)
==9259== by 0x427756: execlist (exec.c:1267)
==9259== by 0x42717C: execode (exec.c:1073)
==9259== by 0x431299: runshfunc (exec.c:5040)
==9259== by 0x430E76: doshfunc (exec.c:4920)
==9259== by 0x4302FB: execshfunc (exec.c:4557)
==9259== by 0x42D8C1: execcmd (exec.c:3373)
==9259==
==9259==
==9259== 2 errors in context 2 of 2:
==9259== Conditional jump or move depends on uninitialised value(s)
==9259== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9259== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9259== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9259== by 0x40EFC2: execbuiltin (builtin.c:450)
==9259== by 0x42D8E9: execcmd (exec.c:3378)
==9259== by 0x428CA0: execpline2 (exec.c:1697)
==9259== by 0x427FD2: execpline (exec.c:1484)
==9259== by 0x42779A: execlist (exec.c:1275)
==9259== by 0x42717C: execode (exec.c:1073)
==9259== by 0x431299: runshfunc (exec.c:5040)
==9259== by 0x430E76: doshfunc (exec.c:4920)
==9259== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9259==
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9260-by-pythonnut-on-???
==9260== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9260-by-pythonnut-on-???
==9260== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9260-by-pythonnut-on-???
==9260==
==9260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9260== don't want to do, unless you know exactly what you're doing,
==9260== or are doing some strange experiment):
==9260== /usr/lib/valgrind/../../bin/vgdb --pid=9260 ...command...
==9260==
==9260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9260== /path/to/gdb ./zsh
==9260== and then give GDB the following command
==9260== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9260
==9260== --pid is optional if only one valgrind process is running
==9260==
--9260-- Caught __NR_exit; running __libc_freeres()
--9260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9260==
==9260== HEAP SUMMARY:
==9260== in use at exit: 3,122,672 bytes in 69,071 blocks
==9260== total heap usage: 927,067 allocs, 857,996 frees, 65,426,783 bytes allocated
==9260==
==9260== Searching for pointers to 69,071 not-freed blocks
--9260-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9260-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9260-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9260-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9260-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9260-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9260-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9260-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9260-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9260-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9260-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9260-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9260-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9260-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9260-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9260-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9260-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9260-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9260-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9260-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9260-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9260-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9260-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9260-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9260-- Scanning root segment: 0x701a000..0x701afff (4096)
--9260-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9260-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9260-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9260-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9260-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9260-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9260-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9260-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9260-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9260== Checked 4,773,440 bytes
==9260==
==9260== LEAK SUMMARY:
==9260== definitely lost: 1,533 bytes in 8 blocks
==9260== indirectly lost: 6,756 bytes in 7 blocks
==9260== possibly lost: 0 bytes in 0 blocks
==9260== still reachable: 3,114,383 bytes in 69,056 blocks
==9260== suppressed: 0 bytes in 0 blocks
==9260== Rerun with --leak-check=full to see details of leaked memory
==9260==
==9260== Use --track-origins=yes to see where uninitialised values come from
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260==
==9260== 1 errors in context 1 of 2:
==9260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9260== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9260== by 0x488CD0: stringsubst (subst.c:301)
==9260== by 0x48801B: prefork (subst.c:77)
==9260== by 0x42B318: execcmd (exec.c:2619)
==9260== by 0x428CA0: execpline2 (exec.c:1697)
==9260== by 0x427FD2: execpline (exec.c:1484)
==9260== by 0x427756: execlist (exec.c:1267)
==9260== by 0x42717C: execode (exec.c:1073)
==9260== by 0x431299: runshfunc (exec.c:5040)
==9260== by 0x430E76: doshfunc (exec.c:4920)
==9260== by 0x4302FB: execshfunc (exec.c:4557)
==9260== by 0x42D8C1: execcmd (exec.c:3373)
==9260==
==9260==
==9260== 2 errors in context 2 of 2:
==9260== Conditional jump or move depends on uninitialised value(s)
==9260== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9260== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9260== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9260== by 0x40EFC2: execbuiltin (builtin.c:450)
==9260== by 0x42D8E9: execcmd (exec.c:3378)
==9260== by 0x428CA0: execpline2 (exec.c:1697)
==9260== by 0x427FD2: execpline (exec.c:1484)
==9260== by 0x42779A: execlist (exec.c:1275)
==9260== by 0x42717C: execode (exec.c:1073)
==9260== by 0x431299: runshfunc (exec.c:5040)
==9260== by 0x430E76: doshfunc (exec.c:4920)
==9260== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9260==
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806-- new: 0x05a3f790 (__GI_strstr ) R-> (2031.0) 0x04c313c0 strstr
==9261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9261-by-pythonnut-on-???
==9261== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9261-by-pythonnut-on-???
==9261== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9261-by-pythonnut-on-???
==9261==
==9261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9261== don't want to do, unless you know exactly what you're doing,
==9261== or are doing some strange experiment):
==9261== /usr/lib/valgrind/../../bin/vgdb --pid=9261 ...command...
==9261==
==9261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9261== /path/to/gdb ./zsh
==9261== and then give GDB the following command
==9261== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9261
==9261== --pid is optional if only one valgrind process is running
==9261==
==9262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9262-by-pythonnut-on-???
==9262== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9262-by-pythonnut-on-???
==9262== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9262-by-pythonnut-on-???
==9262==
==9262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9262== don't want to do, unless you know exactly what you're doing,
==9262== or are doing some strange experiment):
==9262== /usr/lib/valgrind/../../bin/vgdb --pid=9262 ...command...
==9262==
==9262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9262== /path/to/gdb ./zsh
==9262== and then give GDB the following command
==9262== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9262
==9262== --pid is optional if only one valgrind process is running
==9262==
==9263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9263-by-pythonnut-on-???
==9263== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9263-by-pythonnut-on-???
==9263== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9263-by-pythonnut-on-???
==9263==
==9263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9263== don't want to do, unless you know exactly what you're doing,
==9263== or are doing some strange experiment):
==9263== /usr/lib/valgrind/../../bin/vgdb --pid=9263 ...command...
==9263==
==9263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9263== /path/to/gdb ./zsh
==9263== and then give GDB the following command
==9263== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9263
==9263== --pid is optional if only one valgrind process is running
==9263==
client request: code 4d430005, addr 0xFFEFE9C1C, len 4
--9263-- Caught __NR_exit; running __libc_freeres()
--9263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9263==
==9263== HEAP SUMMARY:
==9263== in use at exit: 3,126,864 bytes in 69,144 blocks
==9263== total heap usage: 927,236 allocs, 858,092 frees, 65,456,527 bytes allocated
==9263==
==9263== Searching for pointers to 69,144 not-freed blocks
--9263-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9263-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9263-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9263-- Scanning root segment: 0x4037000..0x403afff (16384)
--9263-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9263-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9263-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9263-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9263-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9263-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9263-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9263-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9263-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9263-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9263-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9263-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9263-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9263-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9263-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9263-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9263-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9263-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9263-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9263-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9263-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9263-- Scanning root segment: 0x701a000..0x701afff (4096)
--9263-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9263-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9263-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9263-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9263-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9263-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9263-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9263-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9263-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9263== Checked 4,796,112 bytes
==9263==
==9263== LEAK SUMMARY:
==9263== definitely lost: 1,533 bytes in 8 blocks
==9263== indirectly lost: 6,756 bytes in 7 blocks
==9263== possibly lost: 0 bytes in 0 blocks
==9263== still reachable: 3,118,575 bytes in 69,129 blocks
==9263== suppressed: 0 bytes in 0 blocks
==9263== Rerun with --leak-check=full to see details of leaked memory
==9263==
==9263== Use --track-origins=yes to see where uninitialised values come from
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9263==
==9263== 1 errors in context 1 of 2:
==9263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9263== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9263== by 0x488CD0: stringsubst (subst.c:301)
==9263== by 0x48801B: prefork (subst.c:77)
==9263== by 0x42B318: execcmd (exec.c:2619)
==9263== by 0x428CA0: execpline2 (exec.c:1697)
==9263== by 0x427FD2: execpline (exec.c:1484)
==9263== by 0x427756: execlist (exec.c:1267)
==9263== by 0x42717C: execode (exec.c:1073)
==9263== by 0x431299: runshfunc (exec.c:5040)
==9263== by 0x430E76: doshfunc (exec.c:4920)
==9263== by 0x4302FB: execshfunc (exec.c:4557)
==9263== by 0x42D8C1: execcmd (exec.c:3373)
==9263==
==9263==
==9263== 2 errors in context 2 of 2:
==9263== Conditional jump or move depends on uninitialised value(s)
==9263== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9263== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9263== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9263== by 0x40EFC2: execbuiltin (builtin.c:450)
==9263== by 0x42D8E9: execcmd (exec.c:3378)
==9263== by 0x428CA0: execpline2 (exec.c:1697)
==9263== by 0x427FD2: execpline (exec.c:1484)
==9263== by 0x42779A: execlist (exec.c:1275)
==9263== by 0x42717C: execode (exec.c:1073)
==9263== by 0x431299: runshfunc (exec.c:5040)
==9263== by 0x430E76: doshfunc (exec.c:4920)
==9263== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9263==
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9266-- Caught __NR_exit; running __libc_freeres()
==9266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9266-by-pythonnut-on-???
==9266== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9266-by-pythonnut-on-???
==9266== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9266-by-pythonnut-on-???
==9266==
==9266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9266== don't want to do, unless you know exactly what you're doing,
==9266== or are doing some strange experiment):
==9266== /usr/lib/valgrind/../../bin/vgdb --pid=9266 ...command...
==9266==
==9266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9266== /path/to/gdb ./zsh
==9266== and then give GDB the following command
==9266== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9266
==9266== --pid is optional if only one valgrind process is running
==9266==
==9267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9267-by-pythonnut-on-???
==9267== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9267-by-pythonnut-on-???
==9267== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9267-by-pythonnut-on-???
==9267==
==9267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9267== don't want to do, unless you know exactly what you're doing,
==9267== or are doing some strange experiment):
==9267== /usr/lib/valgrind/../../bin/vgdb --pid=9267 ...command...
==9267==
==9267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9267== /path/to/gdb ./zsh
==9267== and then give GDB the following command
==9267== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9267
==9267== --pid is optional if only one valgrind process is running
==9267==
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9266==
==9266== HEAP SUMMARY:
==9266== in use at exit: 3,163,731 bytes in 69,151 blocks
==9266== total heap usage: 927,243 allocs, 858,092 frees, 65,496,450 bytes allocated
==9266==
==9266== Searching for pointers to 69,151 not-freed blocks
--9266-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9266-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9266-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9266-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9266-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9266-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9266-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9266-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9266-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9266-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9266-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9266-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9266-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9266-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9266-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9266-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9266-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9266-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9266-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9266-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9266-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9266-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9266-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9266-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9266-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9266-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9266-- Scanning root segment: 0x701a000..0x701afff (4096)
--9266-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9266-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9266-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9266-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9266-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9266-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9266-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9266-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9266-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9266== Checked 4,907,912 bytes
==9266==
==9266== LEAK SUMMARY:
==9266== definitely lost: 1,533 bytes in 8 blocks
==9266== indirectly lost: 6,756 bytes in 7 blocks
==9266== possibly lost: 0 bytes in 0 blocks
==9266== still reachable: 3,155,442 bytes in 69,136 blocks
==9266== suppressed: 0 bytes in 0 blocks
==9266== Rerun with --leak-check=full to see details of leaked memory
==9266==
==9266== Use --track-origins=yes to see where uninitialised values come from
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9266==
==9266== 1 errors in context 1 of 2:
==9266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9266== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9266== by 0x488CD0: stringsubst (subst.c:301)
==9266== by 0x48801B: prefork (subst.c:77)
==9266== by 0x42B318: execcmd (exec.c:2619)
==9266== by 0x428CA0: execpline2 (exec.c:1697)
==9266== by 0x427FD2: execpline (exec.c:1484)
==9266== by 0x427756: execlist (exec.c:1267)
==9266== by 0x42717C: execode (exec.c:1073)
==9266== by 0x431299: runshfunc (exec.c:5040)
==9266== by 0x430E76: doshfunc (exec.c:4920)
==9266== by 0x4302FB: execshfunc (exec.c:4557)
==9266== by 0x42D8C1: execcmd (exec.c:3373)
==9266==
==9266==
==9266== 2 errors in context 2 of 2:
==9266== Conditional jump or move depends on uninitialised value(s)
==9266== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9266== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9266== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9266== by 0x40EFC2: execbuiltin (builtin.c:450)
==9266== by 0x42D8E9: execcmd (exec.c:3378)
==9266== by 0x428CA0: execpline2 (exec.c:1697)
==9266== by 0x427FD2: execpline (exec.c:1484)
==9266== by 0x42779A: execlist (exec.c:1275)
==9266== by 0x42717C: execode (exec.c:1073)
==9266== by 0x431299: runshfunc (exec.c:5040)
==9266== by 0x430E76: doshfunc (exec.c:4920)
==9266== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9266==
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9265-by-pythonnut-on-???
==9265== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9265-by-pythonnut-on-???
==9265== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9265-by-pythonnut-on-???
==9265==
==9265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9265== don't want to do, unless you know exactly what you're doing,
==9265== or are doing some strange experiment):
==9265== /usr/lib/valgrind/../../bin/vgdb --pid=9265 ...command...
==9265==
==9265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9265== /path/to/gdb ./zsh
==9265== and then give GDB the following command
==9265== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9265
==9265== --pid is optional if only one valgrind process is running
==9265==
--9265-- Caught __NR_exit; running __libc_freeres()
--9265-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9265==
==9265== HEAP SUMMARY:
==9265== in use at exit: 3,163,667 bytes in 69,148 blocks
==9265== total heap usage: 927,245 allocs, 858,097 frees, 65,496,994 bytes allocated
==9265==
==9265== Searching for pointers to 69,148 not-freed blocks
--9265-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9265-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9265-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9265-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9265-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9265-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9265-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9265-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9265-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9265-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9265-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9265-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9265-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9265-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9265-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9265-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9265-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9265-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9265-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9265-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9265-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9265-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9265-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9265-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9265-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9265-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9265-- Scanning root segment: 0x701a000..0x701afff (4096)
--9265-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9265-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9265-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9265-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9265-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9265-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9265-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9265-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9265-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9265== Checked 4,907,224 bytes
==9265==
==9265== LEAK SUMMARY:
==9265== definitely lost: 1,533 bytes in 8 blocks
==9265== indirectly lost: 6,756 bytes in 7 blocks
==9265== possibly lost: 0 bytes in 0 blocks
==9265== still reachable: 3,155,378 bytes in 69,133 blocks
==9265== suppressed: 0 bytes in 0 blocks
==9265== Rerun with --leak-check=full to see details of leaked memory
==9265==
==9265== Use --track-origins=yes to see where uninitialised values come from
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265==
==9265== 1 errors in context 1 of 2:
==9265== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9265== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9265== by 0x488CD0: stringsubst (subst.c:301)
==9265== by 0x48801B: prefork (subst.c:77)
==9265== by 0x42B318: execcmd (exec.c:2619)
==9265== by 0x428CA0: execpline2 (exec.c:1697)
==9265== by 0x427FD2: execpline (exec.c:1484)
==9265== by 0x427756: execlist (exec.c:1267)
==9265== by 0x42717C: execode (exec.c:1073)
==9265== by 0x431299: runshfunc (exec.c:5040)
==9265== by 0x430E76: doshfunc (exec.c:4920)
==9265== by 0x4302FB: execshfunc (exec.c:4557)
==9265== by 0x42D8C1: execcmd (exec.c:3373)
==9265==
==9265==
==9265== 2 errors in context 2 of 2:
==9265== Conditional jump or move depends on uninitialised value(s)
==9265== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9265== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9265== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9265== by 0x40EFC2: execbuiltin (builtin.c:450)
==9265== by 0x42D8E9: execcmd (exec.c:3378)
==9265== by 0x428CA0: execpline2 (exec.c:1697)
==9265== by 0x427FD2: execpline (exec.c:1484)
==9265== by 0x42779A: execlist (exec.c:1275)
==9265== by 0x42717C: execode (exec.c:1073)
==9265== by 0x431299: runshfunc (exec.c:5040)
==9265== by 0x430E76: doshfunc (exec.c:4920)
==9265== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9265==
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9270-by-pythonnut-on-???
==9270== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9270-by-pythonnut-on-???
==9270== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9270-by-pythonnut-on-???
==9270==
==9270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9270== don't want to do, unless you know exactly what you're doing,
==9270== or are doing some strange experiment):
==9270== /usr/lib/valgrind/../../bin/vgdb --pid=9270 ...command...
==9270==
==9270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9270== /path/to/gdb ./zsh
==9270== and then give GDB the following command
==9270== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9270
==9270== --pid is optional if only one valgrind process is running
==9270==
==9271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9271-by-pythonnut-on-???
==9271== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9271-by-pythonnut-on-???
==9271== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9271-by-pythonnut-on-???
==9271==
==9271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9271== don't want to do, unless you know exactly what you're doing,
==9271== or are doing some strange experiment):
==9271== /usr/lib/valgrind/../../bin/vgdb --pid=9271 ...command...
==9271==
==9271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9271== /path/to/gdb ./zsh
==9271== and then give GDB the following command
==9271== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9271
==9271== --pid is optional if only one valgrind process is running
==9271==
--9271-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9271==
==9271== HEAP SUMMARY:
==9271== in use at exit: 3,200,345 bytes in 69,154 blocks
==9271== total heap usage: 927,252 allocs, 858,098 frees, 65,535,277 bytes allocated
==9271==
==9271== Searching for pointers to 69,154 not-freed blocks
--9271-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9271-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9271-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9271-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9271-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9271-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9271-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9271-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9271-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9271-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9271-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9271-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9271-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9271-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9271-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9271-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9271-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9271-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9271-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9271-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9271-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9271-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9271-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9271-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9271-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9271-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9271-- Scanning root segment: 0x701a000..0x701afff (4096)
--9271-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9271-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9271-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9271-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9271-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9271-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9271-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9271-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9271-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9271== Checked 4,981,400 bytes
==9271==
==9271== LEAK SUMMARY:
==9271== definitely lost: 1,533 bytes in 8 blocks
==9271== indirectly lost: 6,756 bytes in 7 blocks
==9271== possibly lost: 0 bytes in 0 blocks
==9271== still reachable: 3,192,056 bytes in 69,139 blocks
==9271== suppressed: 0 bytes in 0 blocks
==9271== Rerun with --leak-check=full to see details of leaked memory
==9271==
==9271== Use --track-origins=yes to see where uninitialised values come from
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9271==
==9271== 1 errors in context 1 of 2:
==9271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9271== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9271== by 0x488CD0: stringsubst (subst.c:301)
==9271== by 0x48801B: prefork (subst.c:77)
==9271== by 0x42B318: execcmd (exec.c:2619)
==9271== by 0x428CA0: execpline2 (exec.c:1697)
==9271== by 0x427FD2: execpline (exec.c:1484)
==9271== by 0x427756: execlist (exec.c:1267)
==9271== by 0x42717C: execode (exec.c:1073)
==9271== by 0x431299: runshfunc (exec.c:5040)
==9271== by 0x430E76: doshfunc (exec.c:4920)
==9271== by 0x4302FB: execshfunc (exec.c:4557)
==9271== by 0x42D8C1: execcmd (exec.c:3373)
==9271==
==9271==
==9271== 2 errors in context 2 of 2:
==9271== Conditional jump or move depends on uninitialised value(s)
==9271== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9271== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9271== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9271== by 0x40EFC2: execbuiltin (builtin.c:450)
==9271== by 0x42D8E9: execcmd (exec.c:3378)
==9271== by 0x428CA0: execpline2 (exec.c:1697)
==9271== by 0x427FD2: execpline (exec.c:1484)
==9271== by 0x42779A: execlist (exec.c:1275)
==9271== by 0x42717C: execode (exec.c:1073)
==9271== by 0x431299: runshfunc (exec.c:5040)
==9271== by 0x430E76: doshfunc (exec.c:4920)
==9271== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9271==
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9270-- Caught __NR_exit; running __libc_freeres()
--9270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9270==
==9270== HEAP SUMMARY:
==9270== in use at exit: 3,163,705 bytes in 69,151 blocks
==9270== total heap usage: 927,255 allocs, 858,104 frees, 65,535,853 bytes allocated
==9270==
==9270== Searching for pointers to 69,151 not-freed blocks
--9270-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9270-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9270-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9270-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9270-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9270-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9270-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9270-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9270-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9270-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9270-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9270-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9270-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9270-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9270-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9270-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9270-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9270-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9270-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9270-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9270-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9270-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9270-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9270-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9270-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9270-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9270-- Scanning root segment: 0x701a000..0x701afff (4096)
--9270-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9270-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9270-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9270-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9270-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9270-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9270-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9270-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9270-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9270== Checked 4,944,136 bytes
==9270==
==9270== LEAK SUMMARY:
==9270== definitely lost: 1,533 bytes in 8 blocks
==9270== indirectly lost: 6,756 bytes in 7 blocks
==9270== possibly lost: 0 bytes in 0 blocks
==9270== still reachable: 3,155,416 bytes in 69,136 blocks
==9270== suppressed: 0 bytes in 0 blocks
==9270== Rerun with --leak-check=full to see details of leaked memory
==9270==
==9270== Use --track-origins=yes to see where uninitialised values come from
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270==
==9270== 1 errors in context 1 of 2:
==9270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9270== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9270== by 0x488CD0: stringsubst (subst.c:301)
==9270== by 0x48801B: prefork (subst.c:77)
==9270== by 0x42B318: execcmd (exec.c:2619)
==9270== by 0x428CA0: execpline2 (exec.c:1697)
==9270== by 0x427FD2: execpline (exec.c:1484)
==9270== by 0x427756: execlist (exec.c:1267)
==9270== by 0x42717C: execode (exec.c:1073)
==9270== by 0x431299: runshfunc (exec.c:5040)
==9270== by 0x430E76: doshfunc (exec.c:4920)
==9270== by 0x4302FB: execshfunc (exec.c:4557)
==9270== by 0x42D8C1: execcmd (exec.c:3373)
==9270==
==9270==
==9270== 2 errors in context 2 of 2:
==9270== Conditional jump or move depends on uninitialised value(s)
==9270== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9270== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9270== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9270== by 0x40EFC2: execbuiltin (builtin.c:450)
==9270== by 0x42D8E9: execcmd (exec.c:3378)
==9270== by 0x428CA0: execpline2 (exec.c:1697)
==9270== by 0x427FD2: execpline (exec.c:1484)
==9270== by 0x42779A: execlist (exec.c:1275)
==9270== by 0x42717C: execode (exec.c:1073)
==9270== by 0x431299: runshfunc (exec.c:5040)
==9270== by 0x430E76: doshfunc (exec.c:4920)
==9270== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9270==
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9274-by-pythonnut-on-???
==9274== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9274-by-pythonnut-on-???
==9274== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9274-by-pythonnut-on-???
==9274==
==9274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9274== don't want to do, unless you know exactly what you're doing,
==9274== or are doing some strange experiment):
==9274== /usr/lib/valgrind/../../bin/vgdb --pid=9274 ...command...
==9274==
==9274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9274== /path/to/gdb ./zsh
==9274== and then give GDB the following command
==9274== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9274
==9274== --pid is optional if only one valgrind process is running
==9274==
--9274-- Caught __NR_exit; running __libc_freeres()
==9273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9273-by-pythonnut-on-???
==9273== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9273-by-pythonnut-on-???
==9273== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9273-by-pythonnut-on-???
==9273==
==9273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9273== don't want to do, unless you know exactly what you're doing,
==9273== or are doing some strange experiment):
==9273== /usr/lib/valgrind/../../bin/vgdb --pid=9273 ...command...
==9273==
==9273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9273== /path/to/gdb ./zsh
==9273== and then give GDB the following command
==9273== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9273
==9273== --pid is optional if only one valgrind process is running
==9273==
--9274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9274==
==9274== HEAP SUMMARY:
==9274== in use at exit: 3,164,390 bytes in 69,157 blocks
==9274== total heap usage: 927,264 allocs, 858,107 frees, 65,503,298 bytes allocated
==9274==
==9274== Searching for pointers to 69,157 not-freed blocks
--9274-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9274-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9274-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9274-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9274-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9274-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9274-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9274-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9274-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9274-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9274-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9274-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9274-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9274-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9274-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9274-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9274-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9274-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9274-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9274-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9274-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9274-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9274-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9274-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9274-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9274-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9274-- Scanning root segment: 0x701a000..0x701afff (4096)
--9274-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9274-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9274-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9274-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9274-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9274-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9274-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9274-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9274-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9274== Checked 4,908,312 bytes
==9274==
==9274== LEAK SUMMARY:
==9274== definitely lost: 1,533 bytes in 8 blocks
==9274== indirectly lost: 6,756 bytes in 7 blocks
==9274== possibly lost: 0 bytes in 0 blocks
==9274== still reachable: 3,156,101 bytes in 69,142 blocks
==9274== suppressed: 0 bytes in 0 blocks
==9274== Rerun with --leak-check=full to see details of leaked memory
==9274==
==9274== Use --track-origins=yes to see where uninitialised values come from
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274==
==9274== 1 errors in context 1 of 2:
==9274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9274== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9274== by 0x488CD0: stringsubst (subst.c:301)
==9274== by 0x48801B: prefork (subst.c:77)
==9274== by 0x42B318: execcmd (exec.c:2619)
==9274== by 0x428CA0: execpline2 (exec.c:1697)
==9274== by 0x427FD2: execpline (exec.c:1484)
==9274== by 0x427756: execlist (exec.c:1267)
==9274== by 0x42717C: execode (exec.c:1073)
==9274== by 0x431299: runshfunc (exec.c:5040)
==9274== by 0x430E76: doshfunc (exec.c:4920)
==9274== by 0x4302FB: execshfunc (exec.c:4557)
==9274== by 0x42D8C1: execcmd (exec.c:3373)
==9274==
==9274==
==9274== 2 errors in context 2 of 2:
==9274== Conditional jump or move depends on uninitialised value(s)
==9274== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9274== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9274== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9274== by 0x40EFC2: execbuiltin (builtin.c:450)
==9274== by 0x42D8E9: execcmd (exec.c:3378)
==9274== by 0x428CA0: execpline2 (exec.c:1697)
==9274== by 0x427FD2: execpline (exec.c:1484)
==9274== by 0x42779A: execlist (exec.c:1275)
==9274== by 0x42717C: execode (exec.c:1073)
==9274== by 0x431299: runshfunc (exec.c:5040)
==9274== by 0x430E76: doshfunc (exec.c:4920)
==9274== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9274==
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9273-- Caught __NR_exit; running __libc_freeres()
--9273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9273==
==9273== HEAP SUMMARY:
==9273== in use at exit: 3,164,283 bytes in 69,157 blocks
==9273== total heap usage: 927,301 allocs, 858,144 frees, 65,512,839 bytes allocated
==9273==
==9273== Searching for pointers to 69,157 not-freed blocks
--9273-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9273-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9273-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9273-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9273-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9273-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9273-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9273-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9273-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9273-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9273-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9273-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9273-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9273-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9273-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9273-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9273-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9273-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9273-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9273-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9273-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9273-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9273-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9273-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9273-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9273-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9273-- Scanning root segment: 0x701a000..0x701afff (4096)
--9273-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9273-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9273-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9273-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9273-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9273-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9273-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9273-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9273-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9273== Checked 4,907,616 bytes
==9273==
==9273== LEAK SUMMARY:
==9273== definitely lost: 1,533 bytes in 8 blocks
==9273== indirectly lost: 6,756 bytes in 7 blocks
==9273== possibly lost: 0 bytes in 0 blocks
==9273== still reachable: 3,155,994 bytes in 69,142 blocks
==9273== suppressed: 0 bytes in 0 blocks
==9273== Rerun with --leak-check=full to see details of leaked memory
==9273==
==9273== Use --track-origins=yes to see where uninitialised values come from
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9273==
==9273== 1 errors in context 1 of 2:
==9273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9273== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9273== by 0x488CD0: stringsubst (subst.c:301)
==9273== by 0x48801B: prefork (subst.c:77)
==9273== by 0x42B318: execcmd (exec.c:2619)
==9273== by 0x428CA0: execpline2 (exec.c:1697)
==9273== by 0x427FD2: execpline (exec.c:1484)
==9273== by 0x427756: execlist (exec.c:1267)
==9273== by 0x42717C: execode (exec.c:1073)
==9273== by 0x431299: runshfunc (exec.c:5040)
==9273== by 0x430E76: doshfunc (exec.c:4920)
==9273== by 0x4302FB: execshfunc (exec.c:4557)
==9273== by 0x42D8C1: execcmd (exec.c:3373)
==9273==
==9273==
==9273== 2 errors in context 2 of 2:
==9273== Conditional jump or move depends on uninitialised value(s)
==9273== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9273== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9273== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9273== by 0x40EFC2: execbuiltin (builtin.c:450)
==9273== by 0x42D8E9: execcmd (exec.c:3378)
==9273== by 0x428CA0: execpline2 (exec.c:1697)
==9273== by 0x427FD2: execpline (exec.c:1484)
==9273== by 0x42779A: execlist (exec.c:1275)
==9273== by 0x42717C: execode (exec.c:1073)
==9273== by 0x431299: runshfunc (exec.c:5040)
==9273== by 0x430E76: doshfunc (exec.c:4920)
==9273== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9273==
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9275-by-pythonnut-on-???
==9275== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9275-by-pythonnut-on-???
==9275== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9275-by-pythonnut-on-???
==9275==
==9275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9275== don't want to do, unless you know exactly what you're doing,
==9275== or are doing some strange experiment):
==9275== /usr/lib/valgrind/../../bin/vgdb --pid=9275 ...command...
==9275==
==9275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9275== /path/to/gdb ./zsh
==9275== and then give GDB the following command
==9275== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9275
==9275== --pid is optional if only one valgrind process is running
==9275==
--9275-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEAE9C, len 4
--9275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9276-- Caught __NR_exit; running __libc_freeres()
==9275==
==9275== HEAP SUMMARY:
==9275== in use at exit: 3,128,075 bytes in 69,157 blocks
==9275== total heap usage: 927,273 allocs, 858,116 frees, 65,507,514 bytes allocated
==9275==
==9276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9276-by-pythonnut-on-???
==9276== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9276-by-pythonnut-on-???
==9276== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9276-by-pythonnut-on-???
==9276==
==9276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9276== don't want to do, unless you know exactly what you're doing,
==9276== or are doing some strange experiment):
==9276== /usr/lib/valgrind/../../bin/vgdb --pid=9276 ...command...
==9276==
==9276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9276== /path/to/gdb ./zsh
==9276== and then give GDB the following command
==9276== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9276
==9276== --pid is optional if only one valgrind process is running
==9276==
--9276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9275== Searching for pointers to 69,157 not-freed blocks
--9275-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9275-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9275-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9275-- Scanning root segment: 0x4037000..0x4043fff (53248)
==9276==
--9275-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9275-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9275-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9275-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9275-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9275-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9275-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9275-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9275-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9275-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9275-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9275-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9275-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9275-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9275-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9275-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9275-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9275-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9275-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9275-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9275-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9275-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9275-- Scanning root segment: 0x701a000..0x701afff (4096)
--9275-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9275-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9275-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9275-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9275-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9275-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9275-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9275-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9275-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9276== HEAP SUMMARY:
==9276== in use at exit: 3,127,819 bytes in 69,157 blocks
==9276== total heap usage: 927,279 allocs, 858,122 frees, 65,509,634 bytes allocated
==9276==
==9276== Searching for pointers to 69,157 not-freed blocks
--9276-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9276-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9276-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9276-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9276-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9276-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9276-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9276-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9276-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9276-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9276-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9276-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9276-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9276-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9276-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9276-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9276-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9276-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9276-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9276-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9276-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9276-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9276-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9276-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9276-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9276-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9276-- Scanning root segment: 0x701a000..0x701afff (4096)
--9276-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9276-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9276-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9276-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9276-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9276-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9276-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9276-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9276-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9275== Checked 4,870,984 bytes
==9275==
==9275== LEAK SUMMARY:
==9275== definitely lost: 1,533 bytes in 8 blocks
==9275== indirectly lost: 6,756 bytes in 7 blocks
==9275== possibly lost: 0 bytes in 0 blocks
==9275== still reachable: 3,119,786 bytes in 69,142 blocks
==9275== suppressed: 0 bytes in 0 blocks
==9275== Rerun with --leak-check=full to see details of leaked memory
==9275==
==9275== Use --track-origins=yes to see where uninitialised values come from
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275==
==9275== 1 errors in context 1 of 2:
==9275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9275== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9275== by 0x488CD0: stringsubst (subst.c:301)
==9275== by 0x48801B: prefork (subst.c:77)
==9275== by 0x42B318: execcmd (exec.c:2619)
==9275== by 0x428CA0: execpline2 (exec.c:1697)
==9275== by 0x427FD2: execpline (exec.c:1484)
==9275== by 0x427756: execlist (exec.c:1267)
==9275== by 0x42717C: execode (exec.c:1073)
==9275== by 0x431299: runshfunc (exec.c:5040)
==9275== by 0x430E76: doshfunc (exec.c:4920)
==9275== by 0x4302FB: execshfunc (exec.c:4557)
==9275== by 0x42D8C1: execcmd (exec.c:3373)
==9275==
==9275==
==9275== 2 errors in context 2 of 2:
==9275== Conditional jump or move depends on uninitialised value(s)
==9275== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9275== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9275== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9275== by 0x40EFC2: execbuiltin (builtin.c:450)
==9275== by 0x42D8E9: execcmd (exec.c:3378)
==9275== by 0x428CA0: execpline2 (exec.c:1697)
==9275== by 0x427FD2: execpline (exec.c:1484)
==9275== by 0x42779A: execlist (exec.c:1275)
==9275== by 0x42717C: execode (exec.c:1073)
==9275== by 0x431299: runshfunc (exec.c:5040)
==9275== by 0x430E76: doshfunc (exec.c:4920)
==9275== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9275==
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276== Checked 4,870,824 bytes
==9276==
==9276== LEAK SUMMARY:
==9276== definitely lost: 1,557 bytes in 9 blocks
==9276== indirectly lost: 6,796 bytes in 9 blocks
==9276== possibly lost: 0 bytes in 0 blocks
==9276== still reachable: 3,119,466 bytes in 69,139 blocks
==9276== suppressed: 0 bytes in 0 blocks
==9276== Rerun with --leak-check=full to see details of leaked memory
==9276==
==9276== Use --track-origins=yes to see where uninitialised values come from
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276==
==9276== 1 errors in context 1 of 2:
==9276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9276== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9276== by 0x488CD0: stringsubst (subst.c:301)
==9276== by 0x48801B: prefork (subst.c:77)
==9276== by 0x42B318: execcmd (exec.c:2619)
==9276== by 0x428CA0: execpline2 (exec.c:1697)
==9276== by 0x427FD2: execpline (exec.c:1484)
==9276== by 0x427756: execlist (exec.c:1267)
==9276== by 0x42717C: execode (exec.c:1073)
==9276== by 0x431299: runshfunc (exec.c:5040)
==9276== by 0x430E76: doshfunc (exec.c:4920)
==9276== by 0x4302FB: execshfunc (exec.c:4557)
==9276== by 0x42D8C1: execcmd (exec.c:3373)
==9276==
==9276==
==9276== 2 errors in context 2 of 2:
==9276== Conditional jump or move depends on uninitialised value(s)
==9276== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9276== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9276== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9276== by 0x40EFC2: execbuiltin (builtin.c:450)
==9276== by 0x42D8E9: execcmd (exec.c:3378)
==9276== by 0x428CA0: execpline2 (exec.c:1697)
==9276== by 0x427FD2: execpline (exec.c:1484)
==9276== by 0x42779A: execlist (exec.c:1275)
==9276== by 0x42717C: execode (exec.c:1073)
==9276== by 0x431299: runshfunc (exec.c:5040)
==9276== by 0x430E76: doshfunc (exec.c:4920)
==9276== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9276==
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9280-by-pythonnut-on-???
==9280== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9280-by-pythonnut-on-???
==9280== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9280-by-pythonnut-on-???
==9280==
==9280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9280== don't want to do, unless you know exactly what you're doing,
==9280== or are doing some strange experiment):
==9280== /usr/lib/valgrind/../../bin/vgdb --pid=9280 ...command...
==9280==
==9280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9280== /path/to/gdb ./zsh
==9280== and then give GDB the following command
==9280== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9280
==9280== --pid is optional if only one valgrind process is running
==9280==
client request: code 4d430005, addr 0xFFEFEB81C, len 4
--9262-- Caught __NR_exit; running __libc_freeres()
--9262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9262==
==9262== HEAP SUMMARY:
==9262== in use at exit: 3,126,377 bytes in 69,133 blocks
==9262== total heap usage: 927,280 allocs, 858,147 frees, 65,510,202 bytes allocated
==9262==
==9262== Searching for pointers to 69,133 not-freed blocks
--9262-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9262-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9262-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9262-- Scanning root segment: 0x4037000..0x403afff (16384)
--9262-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9262-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9262-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9262-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9262-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9262-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9262-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9262-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9262-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9262-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9262-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9262-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9262-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9262-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9262-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9262-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9262-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9262-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9262-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9262-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9262-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9262-- Scanning root segment: 0x701a000..0x701afff (4096)
--9262-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9262-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9262-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9262-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9262-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9262-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9262-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9262-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9262-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9262== Checked 4,793,592 bytes
==9262==
==9262== LEAK SUMMARY:
==9262== definitely lost: 1,533 bytes in 8 blocks
==9262== indirectly lost: 6,756 bytes in 7 blocks
==9262== possibly lost: 0 bytes in 0 blocks
==9262== still reachable: 3,118,088 bytes in 69,118 blocks
==9262== suppressed: 0 bytes in 0 blocks
==9262== Rerun with --leak-check=full to see details of leaked memory
==9262==
==9262== Use --track-origins=yes to see where uninitialised values come from
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9262==
==9262== 1 errors in context 1 of 2:
==9262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9262== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9262== by 0x488CD0: stringsubst (subst.c:301)
==9262== by 0x48801B: prefork (subst.c:77)
==9262== by 0x42B318: execcmd (exec.c:2619)
==9262== by 0x428CA0: execpline2 (exec.c:1697)
==9262== by 0x427FD2: execpline (exec.c:1484)
==9262== by 0x427756: execlist (exec.c:1267)
==9262== by 0x42717C: execode (exec.c:1073)
==9262== by 0x431299: runshfunc (exec.c:5040)
==9262== by 0x430E76: doshfunc (exec.c:4920)
==9262== by 0x4302FB: execshfunc (exec.c:4557)
==9262== by 0x42D8C1: execcmd (exec.c:3373)
==9262==
==9262==
==9262== 2 errors in context 2 of 2:
==9262== Conditional jump or move depends on uninitialised value(s)
==9262== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9262== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9262== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9262== by 0x40EFC2: execbuiltin (builtin.c:450)
==9262== by 0x42D8E9: execcmd (exec.c:3378)
==9262== by 0x428CA0: execpline2 (exec.c:1697)
==9262== by 0x427FD2: execpline (exec.c:1484)
==9262== by 0x42779A: execlist (exec.c:1275)
==9262== by 0x42717C: execode (exec.c:1073)
==9262== by 0x431299: runshfunc (exec.c:5040)
==9262== by 0x430E76: doshfunc (exec.c:4920)
==9262== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9262==
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9281-by-pythonnut-on-???
==9281== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9281-by-pythonnut-on-???
==9281== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9281-by-pythonnut-on-???
==9281==
==9281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9281== don't want to do, unless you know exactly what you're doing,
==9281== or are doing some strange experiment):
==9281== /usr/lib/valgrind/../../bin/vgdb --pid=9281 ...command...
==9281==
==9281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9281== /path/to/gdb ./zsh
==9281== and then give GDB the following command
==9281== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9281
==9281== --pid is optional if only one valgrind process is running
==9281==
--9282-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEC14C, len 4
==9282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9282-by-pythonnut-on-???
==9282== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9282-by-pythonnut-on-???
==9282== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9282-by-pythonnut-on-???
==9282==
==9282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9282== don't want to do, unless you know exactly what you're doing,
==9282== or are doing some strange experiment):
==9282== /usr/lib/valgrind/../../bin/vgdb --pid=9282 ...command...
==9282==
==9282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9282== /path/to/gdb ./zsh
==9282== and then give GDB the following command
==9282== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9282
==9282== --pid is optional if only one valgrind process is running
==9282==
client request: code 4d430005, addr 0xFFEFEC0AC, len 4
--9282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9282==
==9282== HEAP SUMMARY:
==9282== in use at exit: 3,126,705 bytes in 69,134 blocks
==9282== total heap usage: 927,223 allocs, 858,089 frees, 65,459,440 bytes allocated
==9282==
==9282== Searching for pointers to 69,134 not-freed blocks
--9282-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9282-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9282-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9282-- Scanning root segment: 0x4037000..0x403afff (16384)
--9282-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9282-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9282-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9282-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9282-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9282-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9282-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9282-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9282-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9282-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9282-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9282-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9282-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9282-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9282-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9282-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9282-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9282-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9282-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9282-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9282-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9282-- Scanning root segment: 0x701a000..0x701afff (4096)
--9282-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9282-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9282-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9282-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9282-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9282-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9282-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9282-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9282-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9282== Checked 4,795,128 bytes
==9282==
==9282== LEAK SUMMARY:
==9282== definitely lost: 1,533 bytes in 8 blocks
==9282== indirectly lost: 6,756 bytes in 7 blocks
==9282== possibly lost: 0 bytes in 0 blocks
==9282== still reachable: 3,118,416 bytes in 69,119 blocks
==9282== suppressed: 0 bytes in 0 blocks
==9282== Rerun with --leak-check=full to see details of leaked memory
==9282==
==9282== Use --track-origins=yes to see where uninitialised values come from
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9282==
==9282== 1 errors in context 1 of 2:
==9282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9282== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9282== by 0x488CD0: stringsubst (subst.c:301)
==9282== by 0x48801B: prefork (subst.c:77)
==9282== by 0x42B318: execcmd (exec.c:2619)
==9282== by 0x428CA0: execpline2 (exec.c:1697)
==9282== by 0x427FD2: execpline (exec.c:1484)
==9282== by 0x427756: execlist (exec.c:1267)
==9282== by 0x42717C: execode (exec.c:1073)
==9282== by 0x431299: runshfunc (exec.c:5040)
==9282== by 0x430E76: doshfunc (exec.c:4920)
==9282== by 0x4302FB: execshfunc (exec.c:4557)
==9282== by 0x42D8C1: execcmd (exec.c:3373)
==9282==
==9282==
==9282== 2 errors in context 2 of 2:
==9282== Conditional jump or move depends on uninitialised value(s)
==9282== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9282== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9282== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9282== by 0x40EFC2: execbuiltin (builtin.c:450)
==9282== by 0x42D8E9: execcmd (exec.c:3378)
==9282== by 0x428CA0: execpline2 (exec.c:1697)
==9282== by 0x427FD2: execpline (exec.c:1484)
==9282== by 0x42779A: execlist (exec.c:1275)
==9282== by 0x42717C: execode (exec.c:1073)
==9282== by 0x431299: runshfunc (exec.c:5040)
==9282== by 0x430E76: doshfunc (exec.c:4920)
==9282== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9282==
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9281-- Caught __NR_exit; running __libc_freeres()
--9281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9281==
==9281== HEAP SUMMARY:
==9281== in use at exit: 3,126,417 bytes in 69,131 blocks
==9281== total heap usage: 927,229 allocs, 858,098 frees, 65,460,328 bytes allocated
==9281==
==9281== Searching for pointers to 69,131 not-freed blocks
--9281-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9281-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9281-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9281-- Scanning root segment: 0x4037000..0x403afff (16384)
--9281-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9281-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9281-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9281-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9281-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9281-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9281-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9281-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9281-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9281-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9281-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9281-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9281-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9281-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9281-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9281-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9281-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9281-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9281-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9281-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9281-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9281-- Scanning root segment: 0x701a000..0x701afff (4096)
--9281-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9281-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9281-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9281-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9281-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9281-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9281-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9281-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9281-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9281== Checked 4,794,208 bytes
==9281==
==9281== LEAK SUMMARY:
==9281== definitely lost: 1,533 bytes in 8 blocks
==9281== indirectly lost: 6,756 bytes in 7 blocks
==9281== possibly lost: 0 bytes in 0 blocks
==9281== still reachable: 3,118,128 bytes in 69,116 blocks
==9281== suppressed: 0 bytes in 0 blocks
==9281== Rerun with --leak-check=full to see details of leaked memory
==9281==
==9281== Use --track-origins=yes to see where uninitialised values come from
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281==
==9281== 1 errors in context 1 of 2:
==9281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9281== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9281== by 0x488CD0: stringsubst (subst.c:301)
==9281== by 0x48801B: prefork (subst.c:77)
==9281== by 0x42B318: execcmd (exec.c:2619)
==9281== by 0x428CA0: execpline2 (exec.c:1697)
==9281== by 0x427FD2: execpline (exec.c:1484)
==9281== by 0x427756: execlist (exec.c:1267)
==9281== by 0x42717C: execode (exec.c:1073)
==9281== by 0x431299: runshfunc (exec.c:5040)
==9281== by 0x430E76: doshfunc (exec.c:4920)
==9281== by 0x4302FB: execshfunc (exec.c:4557)
==9281== by 0x42D8C1: execcmd (exec.c:3373)
==9281==
==9281==
==9281== 2 errors in context 2 of 2:
==9281== Conditional jump or move depends on uninitialised value(s)
==9281== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9281== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9281== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9281== by 0x40EFC2: execbuiltin (builtin.c:450)
==9281== by 0x42D8E9: execcmd (exec.c:3378)
==9281== by 0x428CA0: execpline2 (exec.c:1697)
==9281== by 0x427FD2: execpline (exec.c:1484)
==9281== by 0x42779A: execlist (exec.c:1275)
==9281== by 0x42717C: execode (exec.c:1073)
==9281== by 0x431299: runshfunc (exec.c:5040)
==9281== by 0x430E76: doshfunc (exec.c:4920)
==9281== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9281==
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9285-by-pythonnut-on-???
==9285== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9285-by-pythonnut-on-???
==9285== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9285-by-pythonnut-on-???
==9285==
==9285== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9285== don't want to do, unless you know exactly what you're doing,
==9285== or are doing some strange experiment):
==9285== /usr/lib/valgrind/../../bin/vgdb --pid=9285 ...command...
==9285==
==9285== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9285== /path/to/gdb ./zsh
==9285== and then give GDB the following command
==9285== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9285
==9285== --pid is optional if only one valgrind process is running
==9285==
==9286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9286-by-pythonnut-on-???
==9286== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9286-by-pythonnut-on-???
==9286== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9286-by-pythonnut-on-???
==9286==
==9286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9286== don't want to do, unless you know exactly what you're doing,
==9286== or are doing some strange experiment):
==9286== /usr/lib/valgrind/../../bin/vgdb --pid=9286 ...command...
==9286==
==9286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9286== /path/to/gdb ./zsh
==9286== and then give GDB the following command
==9286== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9286
==9286== --pid is optional if only one valgrind process is running
==9286==
--9286-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEACEC, len 4
client request: code 4d430005, addr 0xFFEFEAC4C, len 4
--9286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9286==
==9286== HEAP SUMMARY:
==9286== in use at exit: 3,126,683 bytes in 69,137 blocks
==9286== total heap usage: 927,257 allocs, 858,120 frees, 65,472,653 bytes allocated
==9286==
==9286== Searching for pointers to 69,137 not-freed blocks
--9286-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9286-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9286-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9286-- Scanning root segment: 0x4037000..0x403afff (16384)
--9286-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9286-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9286-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9286-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9286-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9286-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9286-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9286-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9286-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9286-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9286-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9286-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9286-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9286-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9286-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9286-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9286-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9286-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9286-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9286-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9286-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9286-- Scanning root segment: 0x701a000..0x701afff (4096)
--9286-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9286-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9286-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9286-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9286-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9286-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9286-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9286-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9286-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9286== Checked 4,796,376 bytes
==9286==
==9286== LEAK SUMMARY:
==9286== definitely lost: 1,533 bytes in 8 blocks
==9286== indirectly lost: 6,756 bytes in 7 blocks
==9286== possibly lost: 0 bytes in 0 blocks
==9286== still reachable: 3,118,394 bytes in 69,122 blocks
==9286== suppressed: 0 bytes in 0 blocks
==9286== Rerun with --leak-check=full to see details of leaked memory
==9286==
==9286== Use --track-origins=yes to see where uninitialised values come from
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9286==
==9286== 1 errors in context 1 of 2:
==9286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9286== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9286== by 0x488CD0: stringsubst (subst.c:301)
==9286== by 0x48801B: prefork (subst.c:77)
==9286== by 0x42B318: execcmd (exec.c:2619)
==9286== by 0x428CA0: execpline2 (exec.c:1697)
==9286== by 0x427FD2: execpline (exec.c:1484)
==9286== by 0x427756: execlist (exec.c:1267)
==9286== by 0x42717C: execode (exec.c:1073)
==9286== by 0x431299: runshfunc (exec.c:5040)
==9286== by 0x430E76: doshfunc (exec.c:4920)
==9286== by 0x4302FB: execshfunc (exec.c:4557)
==9286== by 0x42D8C1: execcmd (exec.c:3373)
==9286==
==9286==
==9286== 2 errors in context 2 of 2:
==9286== Conditional jump or move depends on uninitialised value(s)
==9286== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9286== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9286== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9286== by 0x40EFC2: execbuiltin (builtin.c:450)
==9286== by 0x42D8E9: execcmd (exec.c:3378)
==9286== by 0x428CA0: execpline2 (exec.c:1697)
==9286== by 0x427FD2: execpline (exec.c:1484)
==9286== by 0x42779A: execlist (exec.c:1275)
==9286== by 0x42717C: execode (exec.c:1073)
==9286== by 0x431299: runshfunc (exec.c:5040)
==9286== by 0x430E76: doshfunc (exec.c:4920)
==9286== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9286==
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9285-- Caught __NR_exit; running __libc_freeres()
--9285-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9285==
==9285== HEAP SUMMARY:
==9285== in use at exit: 3,126,688 bytes in 69,138 blocks
==9285== total heap usage: 927,253 allocs, 858,115 frees, 65,469,069 bytes allocated
==9285==
==9285== Searching for pointers to 69,138 not-freed blocks
--9285-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9285-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9285-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9285-- Scanning root segment: 0x4037000..0x403afff (16384)
--9285-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9285-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9285-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9285-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9285-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9285-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9285-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9285-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9285-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9285-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9285-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9285-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9285-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9285-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9285-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9285-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9285-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9285-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9285-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9285-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9285-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9285-- Scanning root segment: 0x701a000..0x701afff (4096)
--9285-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9285-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9285-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9285-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9285-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9285-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9285-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9285-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9285-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9285== Checked 4,796,072 bytes
==9285==
==9285== LEAK SUMMARY:
==9285== definitely lost: 1,533 bytes in 8 blocks
==9285== indirectly lost: 6,756 bytes in 7 blocks
==9285== possibly lost: 0 bytes in 0 blocks
==9285== still reachable: 3,118,399 bytes in 69,123 blocks
==9285== suppressed: 0 bytes in 0 blocks
==9285== Rerun with --leak-check=full to see details of leaked memory
==9285==
==9285== Use --track-origins=yes to see where uninitialised values come from
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285==
==9285== 1 errors in context 1 of 2:
==9285== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9285== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9285== by 0x488CD0: stringsubst (subst.c:301)
==9285== by 0x48801B: prefork (subst.c:77)
==9285== by 0x42B318: execcmd (exec.c:2619)
==9285== by 0x428CA0: execpline2 (exec.c:1697)
==9285== by 0x427FD2: execpline (exec.c:1484)
==9285== by 0x427756: execlist (exec.c:1267)
==9285== by 0x42717C: execode (exec.c:1073)
==9285== by 0x431299: runshfunc (exec.c:5040)
==9285== by 0x430E76: doshfunc (exec.c:4920)
==9285== by 0x4302FB: execshfunc (exec.c:4557)
==9285== by 0x42D8C1: execcmd (exec.c:3373)
==9285==
==9285==
==9285== 2 errors in context 2 of 2:
==9285== Conditional jump or move depends on uninitialised value(s)
==9285== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9285== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9285== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9285== by 0x40EFC2: execbuiltin (builtin.c:450)
==9285== by 0x42D8E9: execcmd (exec.c:3378)
==9285== by 0x428CA0: execpline2 (exec.c:1697)
==9285== by 0x427FD2: execpline (exec.c:1484)
==9285== by 0x42779A: execlist (exec.c:1275)
==9285== by 0x42717C: execode (exec.c:1073)
==9285== by 0x431299: runshfunc (exec.c:5040)
==9285== by 0x430E76: doshfunc (exec.c:4920)
==9285== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9285==
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEB23C, len 4
--9289-- Caught __NR_exit; running __libc_freeres()
==9289== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9289-by-pythonnut-on-???
==9289== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9289-by-pythonnut-on-???
==9289== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9289-by-pythonnut-on-???
==9289==
==9289== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9289== don't want to do, unless you know exactly what you're doing,
==9289== or are doing some strange experiment):
==9289== /usr/lib/valgrind/../../bin/vgdb --pid=9289 ...command...
==9289==
==9289== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9289== /path/to/gdb ./zsh
==9289== and then give GDB the following command
==9289== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9289
==9289== --pid is optional if only one valgrind process is running
==9289==
--9289-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9289==
==9289== HEAP SUMMARY:
==9289== in use at exit: 3,127,032 bytes in 69,143 blocks
==9289== total heap usage: 927,264 allocs, 858,121 frees, 65,474,299 bytes allocated
==9289==
==9289== Searching for pointers to 69,143 not-freed blocks
--9289-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9289-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9289-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9289-- Scanning root segment: 0x4037000..0x403afff (16384)
--9289-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9289-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9289-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9289-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9289-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9289-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9289-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9289-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9289-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9289-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9289-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9289-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9289-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9289-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9289-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9289-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9289-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9289-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9289-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9289-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9289-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9289-- Scanning root segment: 0x701a000..0x701afff (4096)
--9289-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9289-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9289-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9289-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9289-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9289-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9289-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9289-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9289-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9289== Checked 4,796,136 bytes
==9289==
==9289== LEAK SUMMARY:
==9289== definitely lost: 1,533 bytes in 8 blocks
==9289== indirectly lost: 6,756 bytes in 7 blocks
==9289== possibly lost: 0 bytes in 0 blocks
==9289== still reachable: 3,118,743 bytes in 69,128 blocks
==9289== suppressed: 0 bytes in 0 blocks
==9289== Rerun with --leak-check=full to see details of leaked memory
==9289==
==9289== Use --track-origins=yes to see where uninitialised values come from
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9289==
==9289== 1 errors in context 1 of 2:
==9289== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9289== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9289== by 0x488CD0: stringsubst (subst.c:301)
==9289== by 0x48801B: prefork (subst.c:77)
==9289== by 0x42B318: execcmd (exec.c:2619)
==9289== by 0x428CA0: execpline2 (exec.c:1697)
==9289== by 0x427FD2: execpline (exec.c:1484)
==9289== by 0x427756: execlist (exec.c:1267)
==9289== by 0x42717C: execode (exec.c:1073)
==9289== by 0x431299: runshfunc (exec.c:5040)
==9289== by 0x430E76: doshfunc (exec.c:4920)
==9289== by 0x4302FB: execshfunc (exec.c:4557)
==9289== by 0x42D8C1: execcmd (exec.c:3373)
==9289==
==9289==
==9289== 2 errors in context 2 of 2:
==9289== Conditional jump or move depends on uninitialised value(s)
==9289== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9289== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9289== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9289== by 0x40EFC2: execbuiltin (builtin.c:450)
==9289== by 0x42D8E9: execcmd (exec.c:3378)
==9289== by 0x428CA0: execpline2 (exec.c:1697)
==9289== by 0x427FD2: execpline (exec.c:1484)
==9289== by 0x42779A: execlist (exec.c:1275)
==9289== by 0x42717C: execode (exec.c:1073)
==9289== by 0x431299: runshfunc (exec.c:5040)
==9289== by 0x430E76: doshfunc (exec.c:4920)
==9289== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9289==
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEAD8C, len 4
--9293-- Caught __NR_exit; running __libc_freeres()
==9293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9293-by-pythonnut-on-???
==9293== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9293-by-pythonnut-on-???
==9293== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9293-by-pythonnut-on-???
==9293==
==9293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9293== don't want to do, unless you know exactly what you're doing,
==9293== or are doing some strange experiment):
==9293== /usr/lib/valgrind/../../bin/vgdb --pid=9293 ...command...
==9293==
==9293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9293== /path/to/gdb ./zsh
==9293== and then give GDB the following command
==9293== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9293
==9293== --pid is optional if only one valgrind process is running
==9293==
--9293-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9293==
==9293== HEAP SUMMARY:
==9293== in use at exit: 3,127,061 bytes in 69,144 blocks
==9293== total heap usage: 927,269 allocs, 858,125 frees, 65,476,440 bytes allocated
==9293==
==9293== Searching for pointers to 69,144 not-freed blocks
--9293-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9293-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9293-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9293-- Scanning root segment: 0x4037000..0x403afff (16384)
--9293-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9293-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9293-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9293-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9293-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9293-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9293-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9293-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9293-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9293-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9293-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9293-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9293-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9293-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9293-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9293-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9293-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9293-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9293-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9293-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9293-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9293-- Scanning root segment: 0x701a000..0x701afff (4096)
--9293-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9293-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9293-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9293-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9293-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9293-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9293-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9293-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9293-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9293== Checked 4,796,432 bytes
==9293==
==9293== LEAK SUMMARY:
==9293== definitely lost: 1,533 bytes in 8 blocks
==9293== indirectly lost: 6,756 bytes in 7 blocks
==9293== possibly lost: 0 bytes in 0 blocks
==9293== still reachable: 3,118,772 bytes in 69,129 blocks
==9293== suppressed: 0 bytes in 0 blocks
==9293== Rerun with --leak-check=full to see details of leaked memory
==9293==
==9293== Use --track-origins=yes to see where uninitialised values come from
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9293==
==9293== 1 errors in context 1 of 2:
==9293== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9293== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9293== by 0x488CD0: stringsubst (subst.c:301)
==9293== by 0x48801B: prefork (subst.c:77)
==9293== by 0x42B318: execcmd (exec.c:2619)
==9293== by 0x428CA0: execpline2 (exec.c:1697)
==9293== by 0x427FD2: execpline (exec.c:1484)
==9293== by 0x427756: execlist (exec.c:1267)
==9293== by 0x42717C: execode (exec.c:1073)
==9293== by 0x431299: runshfunc (exec.c:5040)
==9293== by 0x430E76: doshfunc (exec.c:4920)
==9293== by 0x4302FB: execshfunc (exec.c:4557)
==9293== by 0x42D8C1: execcmd (exec.c:3373)
==9293==
==9293==
==9293== 2 errors in context 2 of 2:
==9293== Conditional jump or move depends on uninitialised value(s)
==9293== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9293== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9293== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9293== by 0x40EFC2: execbuiltin (builtin.c:450)
==9293== by 0x42D8E9: execcmd (exec.c:3378)
==9293== by 0x428CA0: execpline2 (exec.c:1697)
==9293== by 0x427FD2: execpline (exec.c:1484)
==9293== by 0x42779A: execlist (exec.c:1275)
==9293== by 0x42717C: execode (exec.c:1073)
==9293== by 0x431299: runshfunc (exec.c:5040)
==9293== by 0x430E76: doshfunc (exec.c:4920)
==9293== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9293==
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEB70C, len 4
client request: code 4d430005, addr 0xFFEFEB08C, len 4
--9261-- Caught __NR_exit; running __libc_freeres()
--9261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9261==
==9261== HEAP SUMMARY:
==9261== in use at exit: 3,125,013 bytes in 69,094 blocks
==9261== total heap usage: 927,278 allocs, 858,184 frees, 65,480,380 bytes allocated
==9261==
==9261== Searching for pointers to 69,094 not-freed blocks
--9261-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9261-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9261-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9261-- Scanning root segment: 0x4037000..0x403afff (16384)
--9261-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9261-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9261-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9261-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9261-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9261-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9261-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9261-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9261-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9261-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9261-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9261-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9261-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9261-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9261-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9261-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9261-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9261-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9261-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9261-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9261-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9261-- Scanning root segment: 0x701a000..0x701afff (4096)
--9261-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9261-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9261-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9261-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9261-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9261-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9261-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9261-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9261-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9261== Checked 4,790,488 bytes
==9261==
==9261== LEAK SUMMARY:
==9261== definitely lost: 1,533 bytes in 8 blocks
==9261== indirectly lost: 6,756 bytes in 7 blocks
==9261== possibly lost: 0 bytes in 0 blocks
==9261== still reachable: 3,116,724 bytes in 69,079 blocks
==9261== suppressed: 0 bytes in 0 blocks
==9261== Rerun with --leak-check=full to see details of leaked memory
==9261==
==9261== Use --track-origins=yes to see where uninitialised values come from
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9261==
==9261== 1 errors in context 1 of 2:
==9261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9261== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9261== by 0x488CD0: stringsubst (subst.c:301)
==9261== by 0x48801B: prefork (subst.c:77)
==9261== by 0x42B318: execcmd (exec.c:2619)
==9261== by 0x428CA0: execpline2 (exec.c:1697)
==9261== by 0x427FD2: execpline (exec.c:1484)
==9261== by 0x427756: execlist (exec.c:1267)
==9261== by 0x42717C: execode (exec.c:1073)
==9261== by 0x431299: runshfunc (exec.c:5040)
==9261== by 0x430E76: doshfunc (exec.c:4920)
==9261== by 0x4302FB: execshfunc (exec.c:4557)
==9261== by 0x42D8C1: execcmd (exec.c:3373)
==9261==
==9261==
==9261== 2 errors in context 2 of 2:
==9261== Conditional jump or move depends on uninitialised value(s)
==9261== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9261== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9261== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9261== by 0x40EFC2: execbuiltin (builtin.c:450)
==9261== by 0x42D8E9: execcmd (exec.c:3378)
==9261== by 0x428CA0: execpline2 (exec.c:1697)
==9261== by 0x427FD2: execpline (exec.c:1484)
==9261== by 0x42779A: execlist (exec.c:1275)
==9261== by 0x42717C: execode (exec.c:1073)
==9261== by 0x431299: runshfunc (exec.c:5040)
==9261== by 0x430E76: doshfunc (exec.c:4920)
==9261== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9261==
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9297-by-pythonnut-on-???
==9297== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9297-by-pythonnut-on-???
==9297== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9297-by-pythonnut-on-???
==9297==
==9297== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9297== don't want to do, unless you know exactly what you're doing,
==9297== or are doing some strange experiment):
==9297== /usr/lib/valgrind/../../bin/vgdb --pid=9297 ...command...
==9297==
==9297== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9297== /path/to/gdb ./zsh
==9297== and then give GDB the following command
==9297== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9297
==9297== --pid is optional if only one valgrind process is running
==9297==
--9297-- Caught __NR_exit; running __libc_freeres()
--9297-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9297==
==9297== HEAP SUMMARY:
==9297== in use at exit: 3,130,729 bytes in 69,276 blocks
==9297== total heap usage: 927,394 allocs, 858,118 frees, 65,446,267 bytes allocated
==9297==
==9297== Searching for pointers to 69,276 not-freed blocks
--9297-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9297-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9297-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9297-- Scanning root segment: 0x4037000..0x403afff (16384)
--9297-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9297-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9297-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9297-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9297-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9297-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9297-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9297-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9297-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9297-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9297-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9297-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9297-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9297-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9297-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9297-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9297-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9297-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9297-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9297-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9297-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9297-- Scanning root segment: 0x701a000..0x701afff (4096)
--9297-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9297-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9297-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9297-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9297-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9297-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9297-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9297-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9297-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9297== Checked 4,802,320 bytes
==9297==
==9297== LEAK SUMMARY:
==9297== definitely lost: 1,533 bytes in 8 blocks
==9297== indirectly lost: 6,756 bytes in 7 blocks
==9297== possibly lost: 0 bytes in 0 blocks
==9297== still reachable: 3,122,440 bytes in 69,261 blocks
==9297== suppressed: 0 bytes in 0 blocks
==9297== Rerun with --leak-check=full to see details of leaked memory
==9297==
==9297== Use --track-origins=yes to see where uninitialised values come from
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297==
==9297== 1 errors in context 1 of 2:
==9297== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9297== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9297== by 0x488CD0: stringsubst (subst.c:301)
==9297== by 0x48801B: prefork (subst.c:77)
==9297== by 0x42B318: execcmd (exec.c:2619)
==9297== by 0x428CA0: execpline2 (exec.c:1697)
==9297== by 0x427FD2: execpline (exec.c:1484)
==9297== by 0x427756: execlist (exec.c:1267)
==9297== by 0x42717C: execode (exec.c:1073)
==9297== by 0x431299: runshfunc (exec.c:5040)
==9297== by 0x430E76: doshfunc (exec.c:4920)
==9297== by 0x4302FB: execshfunc (exec.c:4557)
==9297== by 0x42D8C1: execcmd (exec.c:3373)
==9297==
==9297==
==9297== 2 errors in context 2 of 2:
==9297== Conditional jump or move depends on uninitialised value(s)
==9297== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9297== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9297== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9297== by 0x40EFC2: execbuiltin (builtin.c:450)
==9297== by 0x42D8E9: execcmd (exec.c:3378)
==9297== by 0x428CA0: execpline2 (exec.c:1697)
==9297== by 0x427FD2: execpline (exec.c:1484)
==9297== by 0x42779A: execlist (exec.c:1275)
==9297== by 0x42717C: execode (exec.c:1073)
==9297== by 0x431299: runshfunc (exec.c:5040)
==9297== by 0x430E76: doshfunc (exec.c:4920)
==9297== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9297==
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9298-by-pythonnut-on-???
==9298== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9298-by-pythonnut-on-???
==9298== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9298-by-pythonnut-on-???
==9298==
==9298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9298== don't want to do, unless you know exactly what you're doing,
==9298== or are doing some strange experiment):
==9298== /usr/lib/valgrind/../../bin/vgdb --pid=9298 ...command...
==9298==
==9298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9298== /path/to/gdb ./zsh
==9298== and then give GDB the following command
==9298== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9298
==9298== --pid is optional if only one valgrind process is running
==9298==
--9298-- Caught __NR_exit; running __libc_freeres()
--9298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9298==
==9298== HEAP SUMMARY:
==9298== in use at exit: 3,130,873 bytes in 69,276 blocks
==9298== total heap usage: 927,402 allocs, 858,126 frees, 65,449,323 bytes allocated
==9298==
==9298== Searching for pointers to 69,276 not-freed blocks
--9298-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9298-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9298-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9298-- Scanning root segment: 0x4037000..0x403afff (16384)
--9298-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9298-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9298-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9298-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9298-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9298-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9298-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9298-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9298-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9298-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9298-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9298-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9298-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9298-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9298-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9298-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9298-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9298-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9298-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9298-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9298-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9298-- Scanning root segment: 0x701a000..0x701afff (4096)
--9298-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9298-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9298-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9298-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9298-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9298-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9298-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9298-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9298-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9298== Checked 4,803,816 bytes
==9298==
==9298== LEAK SUMMARY:
==9298== definitely lost: 1,533 bytes in 8 blocks
==9298== indirectly lost: 6,756 bytes in 7 blocks
==9298== possibly lost: 0 bytes in 0 blocks
==9298== still reachable: 3,122,584 bytes in 69,261 blocks
==9298== suppressed: 0 bytes in 0 blocks
==9298== Rerun with --leak-check=full to see details of leaked memory
==9298==
==9298== Use --track-origins=yes to see where uninitialised values come from
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298==
==9298== 1 errors in context 1 of 2:
==9298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9298== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9298== by 0x488CD0: stringsubst (subst.c:301)
==9298== by 0x48801B: prefork (subst.c:77)
==9298== by 0x42B318: execcmd (exec.c:2619)
==9298== by 0x428CA0: execpline2 (exec.c:1697)
==9298== by 0x427FD2: execpline (exec.c:1484)
==9298== by 0x427756: execlist (exec.c:1267)
==9298== by 0x42717C: execode (exec.c:1073)
==9298== by 0x431299: runshfunc (exec.c:5040)
==9298== by 0x430E76: doshfunc (exec.c:4920)
==9298== by 0x4302FB: execshfunc (exec.c:4557)
==9298== by 0x42D8C1: execcmd (exec.c:3373)
==9298==
==9298==
==9298== 2 errors in context 2 of 2:
==9298== Conditional jump or move depends on uninitialised value(s)
==9298== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9298== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9298== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9298== by 0x40EFC2: execbuiltin (builtin.c:450)
==9298== by 0x42D8E9: execcmd (exec.c:3378)
==9298== by 0x428CA0: execpline2 (exec.c:1697)
==9298== by 0x427FD2: execpline (exec.c:1484)
==9298== by 0x42779A: execlist (exec.c:1275)
==9298== by 0x42717C: execode (exec.c:1073)
==9298== by 0x431299: runshfunc (exec.c:5040)
==9298== by 0x430E76: doshfunc (exec.c:4920)
==9298== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9298==
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9299-by-pythonnut-on-???
==9299== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9299-by-pythonnut-on-???
==9299== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9299-by-pythonnut-on-???
==9299==
==9299== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9299== don't want to do, unless you know exactly what you're doing,
==9299== or are doing some strange experiment):
==9299== /usr/lib/valgrind/../../bin/vgdb --pid=9299 ...command...
==9299==
==9299== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9299== /path/to/gdb ./zsh
==9299== and then give GDB the following command
==9299== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9299
==9299== --pid is optional if only one valgrind process is running
==9299==
--9299-- Caught __NR_exit; running __libc_freeres()
--9299-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9299==
==9299== HEAP SUMMARY:
==9299== in use at exit: 3,130,749 bytes in 69,276 blocks
==9299== total heap usage: 927,898 allocs, 858,622 frees, 65,491,670 bytes allocated
==9299==
==9299== Searching for pointers to 69,276 not-freed blocks
--9299-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9299-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9299-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9299-- Scanning root segment: 0x4037000..0x403afff (16384)
--9299-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9299-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9299-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9299-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9299-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9299-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9299-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9299-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9299-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9299-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9299-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9299-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9299-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9299-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9299-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9299-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9299-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9299-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9299-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9299-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9299-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9299-- Scanning root segment: 0x701a000..0x701afff (4096)
--9299-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9299-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9299-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9299-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9299-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9299-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9299-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9299-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9299-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9299== Checked 4,802,336 bytes
==9299==
==9299== LEAK SUMMARY:
==9299== definitely lost: 1,533 bytes in 8 blocks
==9299== indirectly lost: 6,756 bytes in 7 blocks
==9299== possibly lost: 0 bytes in 0 blocks
==9299== still reachable: 3,122,460 bytes in 69,261 blocks
==9299== suppressed: 0 bytes in 0 blocks
==9299== Rerun with --leak-check=full to see details of leaked memory
==9299==
==9299== Use --track-origins=yes to see where uninitialised values come from
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299==
==9299== 1 errors in context 1 of 2:
==9299== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9299== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9299== by 0x488CD0: stringsubst (subst.c:301)
==9299== by 0x48801B: prefork (subst.c:77)
==9299== by 0x42B318: execcmd (exec.c:2619)
==9299== by 0x428CA0: execpline2 (exec.c:1697)
==9299== by 0x427FD2: execpline (exec.c:1484)
==9299== by 0x427756: execlist (exec.c:1267)
==9299== by 0x42717C: execode (exec.c:1073)
==9299== by 0x431299: runshfunc (exec.c:5040)
==9299== by 0x430E76: doshfunc (exec.c:4920)
==9299== by 0x4302FB: execshfunc (exec.c:4557)
==9299== by 0x42D8C1: execcmd (exec.c:3373)
==9299==
==9299==
==9299== 2 errors in context 2 of 2:
==9299== Conditional jump or move depends on uninitialised value(s)
==9299== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9299== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9299== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9299== by 0x40EFC2: execbuiltin (builtin.c:450)
==9299== by 0x42D8E9: execcmd (exec.c:3378)
==9299== by 0x428CA0: execpline2 (exec.c:1697)
==9299== by 0x427FD2: execpline (exec.c:1484)
==9299== by 0x42779A: execlist (exec.c:1275)
==9299== by 0x42717C: execode (exec.c:1073)
==9299== by 0x431299: runshfunc (exec.c:5040)
==9299== by 0x430E76: doshfunc (exec.c:4920)
==9299== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9299==
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9300-by-pythonnut-on-???
==9300== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9300-by-pythonnut-on-???
==9300== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9300-by-pythonnut-on-???
==9300==
==9300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9300== don't want to do, unless you know exactly what you're doing,
==9300== or are doing some strange experiment):
==9300== /usr/lib/valgrind/../../bin/vgdb --pid=9300 ...command...
==9300==
==9300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9300== /path/to/gdb ./zsh
==9300== and then give GDB the following command
==9300== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9300
==9300== --pid is optional if only one valgrind process is running
==9300==
--9300-- Caught __NR_exit; running __libc_freeres()
--9300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9300==
==9300== HEAP SUMMARY:
==9300== in use at exit: 3,130,892 bytes in 69,276 blocks
==9300== total heap usage: 927,906 allocs, 858,630 frees, 65,494,726 bytes allocated
==9300==
==9300== Searching for pointers to 69,276 not-freed blocks
--9300-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9300-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9300-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9300-- Scanning root segment: 0x4037000..0x403afff (16384)
--9300-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9300-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9300-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9300-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9300-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9300-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9300-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9300-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9300-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9300-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9300-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9300-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9300-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9300-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9300-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9300-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9300-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9300-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9300-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9300-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9300-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9300-- Scanning root segment: 0x701a000..0x701afff (4096)
--9300-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9300-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9300-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9300-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9300-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9300-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9300-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9300-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9300-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9300== Checked 4,803,832 bytes
==9300==
==9300== LEAK SUMMARY:
==9300== definitely lost: 1,533 bytes in 8 blocks
==9300== indirectly lost: 6,756 bytes in 7 blocks
==9300== possibly lost: 0 bytes in 0 blocks
==9300== still reachable: 3,122,603 bytes in 69,261 blocks
==9300== suppressed: 0 bytes in 0 blocks
==9300== Rerun with --leak-check=full to see details of leaked memory
==9300==
==9300== Use --track-origins=yes to see where uninitialised values come from
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300==
==9300== 1 errors in context 1 of 2:
==9300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9300== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9300== by 0x488CD0: stringsubst (subst.c:301)
==9300== by 0x48801B: prefork (subst.c:77)
==9300== by 0x42B318: execcmd (exec.c:2619)
==9300== by 0x428CA0: execpline2 (exec.c:1697)
==9300== by 0x427FD2: execpline (exec.c:1484)
==9300== by 0x427756: execlist (exec.c:1267)
==9300== by 0x42717C: execode (exec.c:1073)
==9300== by 0x431299: runshfunc (exec.c:5040)
==9300== by 0x430E76: doshfunc (exec.c:4920)
==9300== by 0x4302FB: execshfunc (exec.c:4557)
==9300== by 0x42D8C1: execcmd (exec.c:3373)
==9300==
==9300==
==9300== 2 errors in context 2 of 2:
==9300== Conditional jump or move depends on uninitialised value(s)
==9300== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9300== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9300== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9300== by 0x40EFC2: execbuiltin (builtin.c:450)
==9300== by 0x42D8E9: execcmd (exec.c:3378)
==9300== by 0x428CA0: execpline2 (exec.c:1697)
==9300== by 0x427FD2: execpline (exec.c:1484)
==9300== by 0x42779A: execlist (exec.c:1275)
==9300== by 0x42717C: execode (exec.c:1073)
==9300== by 0x431299: runshfunc (exec.c:5040)
==9300== by 0x430E76: doshfunc (exec.c:4920)
==9300== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9300==
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9303-by-pythonnut-on-???
==9303== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9303-by-pythonnut-on-???
==9303== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9303-by-pythonnut-on-???
==9303==
==9303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9303== don't want to do, unless you know exactly what you're doing,
==9303== or are doing some strange experiment):
==9303== /usr/lib/valgrind/../../bin/vgdb --pid=9303 ...command...
==9303==
==9303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9303== /path/to/gdb ./zsh
==9303== and then give GDB the following command
==9303== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9303
==9303== --pid is optional if only one valgrind process is running
==9303==
--9304-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==9304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9304-by-pythonnut-on-???
==9304== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9304-by-pythonnut-on-???
==9304== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9304-by-pythonnut-on-???
==9304==
==9304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9304== don't want to do, unless you know exactly what you're doing,
==9304== or are doing some strange experiment):
==9304== /usr/lib/valgrind/../../bin/vgdb --pid=9304 ...command...
==9304==
==9304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9304== /path/to/gdb ./zsh
==9304== and then give GDB the following command
==9304== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9304
==9304== --pid is optional if only one valgrind process is running
==9304==
--9304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9304==
==9304== HEAP SUMMARY:
==9304== in use at exit: 3,111,044 bytes in 68,842 blocks
==9304== total heap usage: 928,186 allocs, 859,344 frees, 65,531,250 bytes allocated
==9304==
==9304== Searching for pointers to 68,842 not-freed blocks
--9304-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9304-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9304-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9304-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9304-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9304-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9304-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9304-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9304-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9304-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9304-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9304-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9304-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9304-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9304-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9304-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9304-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9304-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9304-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9304-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9304-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9304-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9304-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9304-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9304-- Scanning root segment: 0x701a000..0x701afff (4096)
--9304-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9304-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9304-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9304-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9304-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9304-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9304-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9304-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9304-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9304== Checked 4,754,112 bytes
==9304==
==9304== LEAK SUMMARY:
==9304== definitely lost: 1,533 bytes in 8 blocks
==9304== indirectly lost: 6,756 bytes in 7 blocks
==9304== possibly lost: 0 bytes in 0 blocks
==9304== still reachable: 3,102,755 bytes in 68,827 blocks
==9304== suppressed: 0 bytes in 0 blocks
==9304== Rerun with --leak-check=full to see details of leaked memory
==9304==
==9304== Use --track-origins=yes to see where uninitialised values come from
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9304==
==9304== 1 errors in context 1 of 2:
==9304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9304== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9304== by 0x488CD0: stringsubst (subst.c:301)
==9304== by 0x48801B: prefork (subst.c:77)
==9304== by 0x42B318: execcmd (exec.c:2619)
==9304== by 0x428CA0: execpline2 (exec.c:1697)
==9304== by 0x427FD2: execpline (exec.c:1484)
==9304== by 0x427756: execlist (exec.c:1267)
==9304== by 0x42717C: execode (exec.c:1073)
==9304== by 0x431299: runshfunc (exec.c:5040)
==9304== by 0x430E76: doshfunc (exec.c:4920)
==9304== by 0x4302FB: execshfunc (exec.c:4557)
==9304== by 0x42D8C1: execcmd (exec.c:3373)
==9304==
==9304==
==9304== 2 errors in context 2 of 2:
==9304== Conditional jump or move depends on uninitialised value(s)
==9304== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9304== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9304== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9304== by 0x40EFC2: execbuiltin (builtin.c:450)
==9304== by 0x42D8E9: execcmd (exec.c:3378)
==9304== by 0x428CA0: execpline2 (exec.c:1697)
==9304== by 0x427FD2: execpline (exec.c:1484)
==9304== by 0x42779A: execlist (exec.c:1275)
==9304== by 0x42717C: execode (exec.c:1073)
==9304== by 0x431299: runshfunc (exec.c:5040)
==9304== by 0x430E76: doshfunc (exec.c:4920)
==9304== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9304==
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9303-- Caught __NR_exit; running __libc_freeres()
--9303-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9303==
==9303== HEAP SUMMARY:
==9303== in use at exit: 3,110,685 bytes in 68,832 blocks
==9303== total heap usage: 928,189 allocs, 859,357 frees, 65,531,890 bytes allocated
==9303==
==9303== Searching for pointers to 68,832 not-freed blocks
--9303-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9303-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9303-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9303-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9303-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9303-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9303-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9303-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9303-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9303-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9303-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9303-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9303-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9303-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9303-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9303-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9303-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9303-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9303-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9303-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9303-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9303-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9303-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9303-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9303-- Scanning root segment: 0x701a000..0x701afff (4096)
--9303-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9303-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9303-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9303-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9303-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9303-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9303-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9303-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9303-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9303== Checked 4,751,792 bytes
==9303==
==9303== LEAK SUMMARY:
==9303== definitely lost: 1,533 bytes in 8 blocks
==9303== indirectly lost: 6,756 bytes in 7 blocks
==9303== possibly lost: 0 bytes in 0 blocks
==9303== still reachable: 3,102,396 bytes in 68,817 blocks
==9303== suppressed: 0 bytes in 0 blocks
==9303== Rerun with --leak-check=full to see details of leaked memory
==9303==
==9303== Use --track-origins=yes to see where uninitialised values come from
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303==
==9303== 1 errors in context 1 of 2:
==9303== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9303== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9303== by 0x488CD0: stringsubst (subst.c:301)
==9303== by 0x48801B: prefork (subst.c:77)
==9303== by 0x42B318: execcmd (exec.c:2619)
==9303== by 0x428CA0: execpline2 (exec.c:1697)
==9303== by 0x427FD2: execpline (exec.c:1484)
==9303== by 0x427756: execlist (exec.c:1267)
==9303== by 0x42717C: execode (exec.c:1073)
==9303== by 0x431299: runshfunc (exec.c:5040)
==9303== by 0x430E76: doshfunc (exec.c:4920)
==9303== by 0x4302FB: execshfunc (exec.c:4557)
==9303== by 0x42D8C1: execcmd (exec.c:3373)
==9303==
==9303==
==9303== 2 errors in context 2 of 2:
==9303== Conditional jump or move depends on uninitialised value(s)
==9303== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9303== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9303== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9303== by 0x40EFC2: execbuiltin (builtin.c:450)
==9303== by 0x42D8E9: execcmd (exec.c:3378)
==9303== by 0x428CA0: execpline2 (exec.c:1697)
==9303== by 0x427FD2: execpline (exec.c:1484)
==9303== by 0x42779A: execlist (exec.c:1275)
==9303== by 0x42717C: execode (exec.c:1073)
==9303== by 0x431299: runshfunc (exec.c:5040)
==9303== by 0x430E76: doshfunc (exec.c:4920)
==9303== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9303==
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9307-- Caught __NR_exit; running __libc_freeres()
==9307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9307-by-pythonnut-on-???
==9307== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9307-by-pythonnut-on-???
==9307== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9307-by-pythonnut-on-???
==9307==
==9307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9307== don't want to do, unless you know exactly what you're doing,
==9307== or are doing some strange experiment):
==9307== /usr/lib/valgrind/../../bin/vgdb --pid=9307 ...command...
==9307==
==9307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9307== /path/to/gdb ./zsh
==9307== and then give GDB the following command
==9307== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9307
==9307== --pid is optional if only one valgrind process is running
==9307==
client request: code 4d430005, addr 0xFFEFF268C, len 4
client request: code 4d430005, addr 0xFFEFF25EC, len 4
--9307-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9307==
==9307== HEAP SUMMARY:
==9307== in use at exit: 3,111,401 bytes in 68,846 blocks
==9307== total heap usage: 928,222 allocs, 859,376 frees, 65,544,646 bytes allocated
==9307==
==9307== Searching for pointers to 68,846 not-freed blocks
--9307-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9307-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9307-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9307-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9307-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9307-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9307-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9307-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9307-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9307-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9307-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9307-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9307-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9307-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9307-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9307-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9307-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9307-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9307-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9307-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9307-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9307-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9307-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9307-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9307-- Scanning root segment: 0x701a000..0x701afff (4096)
--9307-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9307-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9307-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9307-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9307-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9307-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9307-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9307-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9307-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9307== Checked 4,756,424 bytes
==9307==
==9307== LEAK SUMMARY:
==9307== definitely lost: 1,533 bytes in 8 blocks
==9307== indirectly lost: 6,756 bytes in 7 blocks
==9307== possibly lost: 0 bytes in 0 blocks
==9307== still reachable: 3,103,112 bytes in 68,831 blocks
==9307== suppressed: 0 bytes in 0 blocks
==9307== Rerun with --leak-check=full to see details of leaked memory
==9307==
==9307== Use --track-origins=yes to see where uninitialised values come from
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9307==
==9307== 1 errors in context 1 of 2:
==9307== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9307== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9307== by 0x488CD0: stringsubst (subst.c:301)
==9307== by 0x48801B: prefork (subst.c:77)
==9307== by 0x42B318: execcmd (exec.c:2619)
==9307== by 0x428CA0: execpline2 (exec.c:1697)
==9307== by 0x427FD2: execpline (exec.c:1484)
==9307== by 0x427756: execlist (exec.c:1267)
==9307== by 0x42717C: execode (exec.c:1073)
==9307== by 0x431299: runshfunc (exec.c:5040)
==9307== by 0x430E76: doshfunc (exec.c:4920)
==9307== by 0x4302FB: execshfunc (exec.c:4557)
==9307== by 0x42D8C1: execcmd (exec.c:3373)
==9307==
==9307==
==9307== 2 errors in context 2 of 2:
==9307== Conditional jump or move depends on uninitialised value(s)
==9307== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9307== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9307== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9307== by 0x40EFC2: execbuiltin (builtin.c:450)
==9307== by 0x42D8E9: execcmd (exec.c:3378)
==9307== by 0x428CA0: execpline2 (exec.c:1697)
==9307== by 0x427FD2: execpline (exec.c:1484)
==9307== by 0x42779A: execlist (exec.c:1275)
==9307== by 0x42717C: execode (exec.c:1073)
==9307== by 0x431299: runshfunc (exec.c:5040)
==9307== by 0x430E76: doshfunc (exec.c:4920)
==9307== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9307==
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9306-- Caught __NR_exit; running __libc_freeres()
==9306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9306-by-pythonnut-on-???
==9306== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9306-by-pythonnut-on-???
==9306== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9306-by-pythonnut-on-???
==9306==
==9306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9306== don't want to do, unless you know exactly what you're doing,
==9306== or are doing some strange experiment):
==9306== /usr/lib/valgrind/../../bin/vgdb --pid=9306 ...command...
==9306==
==9306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9306== /path/to/gdb ./zsh
==9306== and then give GDB the following command
==9306== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9306
==9306== --pid is optional if only one valgrind process is running
==9306==
--9306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9306==
==9306== HEAP SUMMARY:
==9306== in use at exit: 3,111,369 bytes in 68,846 blocks
==9306== total heap usage: 928,226 allocs, 859,380 frees, 65,544,182 bytes allocated
==9306==
==9306== Searching for pointers to 68,846 not-freed blocks
--9306-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9306-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9306-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9306-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9306-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9306-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9306-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9306-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9306-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9306-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9306-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9306-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9306-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9306-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9306-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9306-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9306-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9306-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9306-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9306-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9306-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9306-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9306-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9306-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9306-- Scanning root segment: 0x701a000..0x701afff (4096)
--9306-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9306-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9306-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9306-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9306-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9306-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9306-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9306-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9306-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9306== Checked 4,756,088 bytes
==9306==
==9306== LEAK SUMMARY:
==9306== definitely lost: 1,533 bytes in 8 blocks
==9306== indirectly lost: 6,756 bytes in 7 blocks
==9306== possibly lost: 0 bytes in 0 blocks
==9306== still reachable: 3,103,080 bytes in 68,831 blocks
==9306== suppressed: 0 bytes in 0 blocks
==9306== Rerun with --leak-check=full to see details of leaked memory
==9306==
==9306== Use --track-origins=yes to see where uninitialised values come from
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9306==
==9306== 1 errors in context 1 of 2:
==9306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9306== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9306== by 0x488CD0: stringsubst (subst.c:301)
==9306== by 0x48801B: prefork (subst.c:77)
==9306== by 0x42B318: execcmd (exec.c:2619)
==9306== by 0x428CA0: execpline2 (exec.c:1697)
==9306== by 0x427FD2: execpline (exec.c:1484)
==9306== by 0x427756: execlist (exec.c:1267)
==9306== by 0x42717C: execode (exec.c:1073)
==9306== by 0x431299: runshfunc (exec.c:5040)
==9306== by 0x430E76: doshfunc (exec.c:4920)
==9306== by 0x4302FB: execshfunc (exec.c:4557)
==9306== by 0x42D8C1: execcmd (exec.c:3373)
==9306==
==9306==
==9306== 2 errors in context 2 of 2:
==9306== Conditional jump or move depends on uninitialised value(s)
==9306== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9306== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9306== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9306== by 0x40EFC2: execbuiltin (builtin.c:450)
==9306== by 0x42D8E9: execcmd (exec.c:3378)
==9306== by 0x428CA0: execpline2 (exec.c:1697)
==9306== by 0x427FD2: execpline (exec.c:1484)
==9306== by 0x42779A: execlist (exec.c:1275)
==9306== by 0x42717C: execode (exec.c:1073)
==9306== by 0x431299: runshfunc (exec.c:5040)
==9306== by 0x430E76: doshfunc (exec.c:4920)
==9306== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9306==
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--9310-- Caught __NR_exit; running __libc_freeres()
==9310== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9310-by-pythonnut-on-???
==9310== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9310-by-pythonnut-on-???
==9310== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9310-by-pythonnut-on-???
==9310==
==9310== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9310== don't want to do, unless you know exactly what you're doing,
==9310== or are doing some strange experiment):
==9310== /usr/lib/valgrind/../../bin/vgdb --pid=9310 ...command...
==9310==
==9310== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9310== /path/to/gdb ./zsh
==9310== and then give GDB the following command
==9310== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9310
==9310== --pid is optional if only one valgrind process is running
==9310==
--9310-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9310==
==9310== HEAP SUMMARY:
==9310== in use at exit: 3,111,620 bytes in 68,851 blocks
==9310== total heap usage: 928,237 allocs, 859,386 frees, 65,549,290 bytes allocated
==9310==
==9310== Searching for pointers to 68,851 not-freed blocks
--9310-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9310-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9310-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9310-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9310-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9310-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9310-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9310-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9310-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9310-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9310-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9310-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9310-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9310-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9310-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9310-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9310-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9310-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9310-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9310-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9310-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9310-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9310-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9310-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9310-- Scanning root segment: 0x701a000..0x701afff (4096)
--9310-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9310-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9310-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9310-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9310-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9310-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9310-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9310-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9310-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9310== Checked 4,754,784 bytes
==9310==
==9310== LEAK SUMMARY:
==9310== definitely lost: 1,533 bytes in 8 blocks
==9310== indirectly lost: 6,756 bytes in 7 blocks
==9310== possibly lost: 0 bytes in 0 blocks
==9310== still reachable: 3,103,331 bytes in 68,836 blocks
==9310== suppressed: 0 bytes in 0 blocks
==9310== Rerun with --leak-check=full to see details of leaked memory
==9310==
==9310== Use --track-origins=yes to see where uninitialised values come from
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9310==
==9310== 1 errors in context 1 of 2:
==9310== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9310== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9310== by 0x488CD0: stringsubst (subst.c:301)
==9310== by 0x48801B: prefork (subst.c:77)
==9310== by 0x42B318: execcmd (exec.c:2619)
==9310== by 0x428CA0: execpline2 (exec.c:1697)
==9310== by 0x427FD2: execpline (exec.c:1484)
==9310== by 0x427756: execlist (exec.c:1267)
==9310== by 0x42717C: execode (exec.c:1073)
==9310== by 0x431299: runshfunc (exec.c:5040)
==9310== by 0x430E76: doshfunc (exec.c:4920)
==9310== by 0x4302FB: execshfunc (exec.c:4557)
==9310== by 0x42D8C1: execcmd (exec.c:3373)
==9310==
==9310==
==9310== 2 errors in context 2 of 2:
==9310== Conditional jump or move depends on uninitialised value(s)
==9310== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9310== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9310== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9310== by 0x40EFC2: execbuiltin (builtin.c:450)
==9310== by 0x42D8E9: execcmd (exec.c:3378)
==9310== by 0x428CA0: execpline2 (exec.c:1697)
==9310== by 0x427FD2: execpline (exec.c:1484)
==9310== by 0x42779A: execlist (exec.c:1275)
==9310== by 0x42717C: execode (exec.c:1073)
==9310== by 0x431299: runshfunc (exec.c:5040)
==9310== by 0x430E76: doshfunc (exec.c:4920)
==9310== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9310==
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF272C, len 4
--9314-- Caught __NR_exit; running __libc_freeres()
==9314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9314-by-pythonnut-on-???
==9314== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9314-by-pythonnut-on-???
==9314== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9314-by-pythonnut-on-???
==9314==
==9314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9314== don't want to do, unless you know exactly what you're doing,
==9314== or are doing some strange experiment):
==9314== /usr/lib/valgrind/../../bin/vgdb --pid=9314 ...command...
==9314==
==9314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9314== /path/to/gdb ./zsh
==9314== and then give GDB the following command
==9314== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9314
==9314== --pid is optional if only one valgrind process is running
==9314==
--9314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9314==
==9314== HEAP SUMMARY:
==9314== in use at exit: 3,111,727 bytes in 68,855 blocks
==9314== total heap usage: 928,245 allocs, 859,390 frees, 65,551,509 bytes allocated
==9314==
==9314== Searching for pointers to 68,855 not-freed blocks
--9314-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9314-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9314-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9314-- Scanning root segment: 0x4037000..0x403afff (16384)
--9314-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9314-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9314-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9314-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9314-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9314-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9314-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9314-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9314-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9314-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9314-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9314-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9314-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9314-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9314-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9314-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9314-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9314-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9314-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9314-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9314-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9314-- Scanning root segment: 0x701a000..0x701afff (4096)
--9314-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9314-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9314-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9314-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9314-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9314-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9314-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9314-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9314-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9314== Checked 4,771,536 bytes
==9314==
==9314== LEAK SUMMARY:
==9314== definitely lost: 1,533 bytes in 8 blocks
==9314== indirectly lost: 6,756 bytes in 7 blocks
==9314== possibly lost: 0 bytes in 0 blocks
==9314== still reachable: 3,103,438 bytes in 68,840 blocks
==9314== suppressed: 0 bytes in 0 blocks
==9314== Rerun with --leak-check=full to see details of leaked memory
==9314==
==9314== Use --track-origins=yes to see where uninitialised values come from
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9314==
==9314== 1 errors in context 1 of 2:
==9314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9314== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9314== by 0x488CD0: stringsubst (subst.c:301)
==9314== by 0x48801B: prefork (subst.c:77)
==9314== by 0x42B318: execcmd (exec.c:2619)
==9314== by 0x428CA0: execpline2 (exec.c:1697)
==9314== by 0x427FD2: execpline (exec.c:1484)
==9314== by 0x427756: execlist (exec.c:1267)
==9314== by 0x42717C: execode (exec.c:1073)
==9314== by 0x431299: runshfunc (exec.c:5040)
==9314== by 0x430E76: doshfunc (exec.c:4920)
==9314== by 0x4302FB: execshfunc (exec.c:4557)
==9314== by 0x42D8C1: execcmd (exec.c:3373)
==9314==
==9314==
==9314== 2 errors in context 2 of 2:
==9314== Conditional jump or move depends on uninitialised value(s)
==9314== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9314== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9314== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9314== by 0x40EFC2: execbuiltin (builtin.c:450)
==9314== by 0x42D8E9: execcmd (exec.c:3378)
==9314== by 0x428CA0: execpline2 (exec.c:1697)
==9314== by 0x427FD2: execpline (exec.c:1484)
==9314== by 0x42779A: execlist (exec.c:1275)
==9314== by 0x42717C: execode (exec.c:1073)
==9314== by 0x431299: runshfunc (exec.c:5040)
==9314== by 0x430E76: doshfunc (exec.c:4920)
==9314== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9314==
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
--9318-- Caught __NR_exit; running __libc_freeres()
==9318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9318-by-pythonnut-on-???
==9318== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9318-by-pythonnut-on-???
==9318== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9318-by-pythonnut-on-???
==9318==
==9318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9318== don't want to do, unless you know exactly what you're doing,
==9318== or are doing some strange experiment):
==9318== /usr/lib/valgrind/../../bin/vgdb --pid=9318 ...command...
==9318==
==9318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9318== /path/to/gdb ./zsh
==9318== and then give GDB the following command
==9318== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9318
==9318== --pid is optional if only one valgrind process is running
==9318==
--9318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9318==
==9318== HEAP SUMMARY:
==9318== in use at exit: 3,111,034 bytes in 68,840 blocks
==9318== total heap usage: 928,295 allocs, 859,455 frees, 65,558,062 bytes allocated
==9318==
==9318== Searching for pointers to 68,840 not-freed blocks
--9318-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9318-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9318-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9318-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9318-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9318-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9318-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9318-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9318-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9318-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9318-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9318-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9318-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9318-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9318-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9318-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9318-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9318-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9318-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9318-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9318-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9318-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9318-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9318-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9318-- Scanning root segment: 0x701a000..0x701afff (4096)
--9318-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9318-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9318-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9318-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9318-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9318-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9318-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9318-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9318-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9318== Checked 4,771,696 bytes
==9318==
==9318== LEAK SUMMARY:
==9318== definitely lost: 1,533 bytes in 8 blocks
==9318== indirectly lost: 6,756 bytes in 7 blocks
==9318== possibly lost: 0 bytes in 0 blocks
==9318== still reachable: 3,102,745 bytes in 68,825 blocks
==9318== suppressed: 0 bytes in 0 blocks
==9318== Rerun with --leak-check=full to see details of leaked memory
==9318==
==9318== Use --track-origins=yes to see where uninitialised values come from
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9318==
==9318== 1 errors in context 1 of 2:
==9318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9318== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9318== by 0x488CD0: stringsubst (subst.c:301)
==9318== by 0x48801B: prefork (subst.c:77)
==9318== by 0x42B318: execcmd (exec.c:2619)
==9318== by 0x428CA0: execpline2 (exec.c:1697)
==9318== by 0x427FD2: execpline (exec.c:1484)
==9318== by 0x427756: execlist (exec.c:1267)
==9318== by 0x42717C: execode (exec.c:1073)
==9318== by 0x431299: runshfunc (exec.c:5040)
==9318== by 0x430E76: doshfunc (exec.c:4920)
==9318== by 0x4302FB: execshfunc (exec.c:4557)
==9318== by 0x42D8C1: execcmd (exec.c:3373)
==9318==
==9318==
==9318== 2 errors in context 2 of 2:
==9318== Conditional jump or move depends on uninitialised value(s)
==9318== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9318== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9318== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9318== by 0x40EFC2: execbuiltin (builtin.c:450)
==9318== by 0x42D8E9: execcmd (exec.c:3378)
==9318== by 0x428CA0: execpline2 (exec.c:1697)
==9318== by 0x427FD2: execpline (exec.c:1484)
==9318== by 0x42779A: execlist (exec.c:1275)
==9318== by 0x42717C: execode (exec.c:1073)
==9318== by 0x431299: runshfunc (exec.c:5040)
==9318== by 0x430E76: doshfunc (exec.c:4920)
==9318== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9318==
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9319-by-pythonnut-on-???
==9319== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9319-by-pythonnut-on-???
==9319== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9319-by-pythonnut-on-???
==9319==
==9319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9319== don't want to do, unless you know exactly what you're doing,
==9319== or are doing some strange experiment):
==9319== /usr/lib/valgrind/../../bin/vgdb --pid=9319 ...command...
==9319==
==9319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9319== /path/to/gdb ./zsh
==9319== and then give GDB the following command
==9319== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9319
==9319== --pid is optional if only one valgrind process is running
==9319==
--9319-- Caught __NR_exit; running __libc_freeres()
--9319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9319==
==9319== HEAP SUMMARY:
==9319== in use at exit: 3,112,534 bytes in 68,891 blocks
==9319== total heap usage: 928,389 allocs, 859,498 frees, 65,566,232 bytes allocated
==9319==
==9319== Searching for pointers to 68,891 not-freed blocks
--9319-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9319-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9319-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9319-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9319-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9319-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9319-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9319-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9319-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9319-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9319-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9319-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9319-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9319-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9319-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9319-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9319-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9319-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9319-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9319-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9319-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9319-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9319-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9319-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9319-- Scanning root segment: 0x701a000..0x701afff (4096)
--9319-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9319-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9319-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9319-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9319-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9319-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9319-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9319-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9319-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9319== Checked 4,773,224 bytes
==9319==
==9319== LEAK SUMMARY:
==9319== definitely lost: 1,533 bytes in 8 blocks
==9319== indirectly lost: 6,756 bytes in 7 blocks
==9319== possibly lost: 0 bytes in 0 blocks
==9319== still reachable: 3,104,245 bytes in 68,876 blocks
==9319== suppressed: 0 bytes in 0 blocks
==9319== Rerun with --leak-check=full to see details of leaked memory
==9319==
==9319== Use --track-origins=yes to see where uninitialised values come from
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319==
==9319== 1 errors in context 1 of 2:
==9319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9319== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9319== by 0x488CD0: stringsubst (subst.c:301)
==9319== by 0x48801B: prefork (subst.c:77)
==9319== by 0x42B318: execcmd (exec.c:2619)
==9319== by 0x428CA0: execpline2 (exec.c:1697)
==9319== by 0x427FD2: execpline (exec.c:1484)
==9319== by 0x427756: execlist (exec.c:1267)
==9319== by 0x42717C: execode (exec.c:1073)
==9319== by 0x431299: runshfunc (exec.c:5040)
==9319== by 0x430E76: doshfunc (exec.c:4920)
==9319== by 0x4302FB: execshfunc (exec.c:4557)
==9319== by 0x42D8C1: execcmd (exec.c:3373)
==9319==
==9319==
==9319== 2 errors in context 2 of 2:
==9319== Conditional jump or move depends on uninitialised value(s)
==9319== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9319== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9319== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9319== by 0x40EFC2: execbuiltin (builtin.c:450)
==9319== by 0x42D8E9: execcmd (exec.c:3378)
==9319== by 0x428CA0: execpline2 (exec.c:1697)
==9319== by 0x427FD2: execpline (exec.c:1484)
==9319== by 0x42779A: execlist (exec.c:1275)
==9319== by 0x42717C: execode (exec.c:1073)
==9319== by 0x431299: runshfunc (exec.c:5040)
==9319== by 0x430E76: doshfunc (exec.c:4920)
==9319== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9319==
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9320-by-pythonnut-on-???
==9320== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9320-by-pythonnut-on-???
==9320== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9320-by-pythonnut-on-???
==9320==
==9320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9320== don't want to do, unless you know exactly what you're doing,
==9320== or are doing some strange experiment):
==9320== /usr/lib/valgrind/../../bin/vgdb --pid=9320 ...command...
==9320==
==9320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9320== /path/to/gdb ./zsh
==9320== and then give GDB the following command
==9320== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9320
==9320== --pid is optional if only one valgrind process is running
==9320==
==9321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9321-by-pythonnut-on-???
==9321== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9321-by-pythonnut-on-???
==9321== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9321-by-pythonnut-on-???
==9321==
==9321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9321== don't want to do, unless you know exactly what you're doing,
==9321== or are doing some strange experiment):
==9321== /usr/lib/valgrind/../../bin/vgdb --pid=9321 ...command...
==9321==
==9321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9321== /path/to/gdb ./zsh
==9321== and then give GDB the following command
==9321== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9321
==9321== --pid is optional if only one valgrind process is running
==9321==
==9322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9322-by-pythonnut-on-???
==9322== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9322-by-pythonnut-on-???
==9322== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9322-by-pythonnut-on-???
==9322==
==9322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9322== don't want to do, unless you know exactly what you're doing,
==9322== or are doing some strange experiment):
==9322== /usr/lib/valgrind/../../bin/vgdb --pid=9322 ...command...
==9322==
==9322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9322== /path/to/gdb ./zsh
==9322== and then give GDB the following command
==9322== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9322
==9322== --pid is optional if only one valgrind process is running
==9322==
client request: code 4d430005, addr 0xFFEFF0B2C, len 4
--9322-- Caught __NR_exit; running __libc_freeres()
--9322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9322==
==9322== HEAP SUMMARY:
==9322== in use at exit: 3,116,429 bytes in 68,958 blocks
==9322== total heap usage: 928,531 allocs, 859,573 frees, 65,597,317 bytes allocated
==9322==
==9322== Searching for pointers to 68,958 not-freed blocks
--9322-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9322-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9322-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9322-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9322-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9322-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9322-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9322-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9322-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9322-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9322-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9322-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9322-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9322-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9322-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9322-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9322-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9322-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9322-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9322-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9322-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9322-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9322-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9322-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9322-- Scanning root segment: 0x701a000..0x701afff (4096)
--9322-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9322-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9322-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9322-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9322-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9322-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9322-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9322-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9322-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9322== Checked 4,759,760 bytes
==9322==
==9322== LEAK SUMMARY:
==9322== definitely lost: 1,533 bytes in 8 blocks
==9322== indirectly lost: 6,756 bytes in 7 blocks
==9322== possibly lost: 0 bytes in 0 blocks
==9322== still reachable: 3,108,140 bytes in 68,943 blocks
==9322== suppressed: 0 bytes in 0 blocks
==9322== Rerun with --leak-check=full to see details of leaked memory
==9322==
==9322== Use --track-origins=yes to see where uninitialised values come from
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9322==
==9322== 1 errors in context 1 of 2:
==9322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9322== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9322== by 0x488CD0: stringsubst (subst.c:301)
==9322== by 0x48801B: prefork (subst.c:77)
==9322== by 0x42B318: execcmd (exec.c:2619)
==9322== by 0x428CA0: execpline2 (exec.c:1697)
==9322== by 0x427FD2: execpline (exec.c:1484)
==9322== by 0x427756: execlist (exec.c:1267)
==9322== by 0x42717C: execode (exec.c:1073)
==9322== by 0x431299: runshfunc (exec.c:5040)
==9322== by 0x430E76: doshfunc (exec.c:4920)
==9322== by 0x4302FB: execshfunc (exec.c:4557)
==9322== by 0x42D8C1: execcmd (exec.c:3373)
==9322==
==9322==
==9322== 2 errors in context 2 of 2:
==9322== Conditional jump or move depends on uninitialised value(s)
==9322== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9322== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9322== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9322== by 0x40EFC2: execbuiltin (builtin.c:450)
==9322== by 0x42D8E9: execcmd (exec.c:3378)
==9322== by 0x428CA0: execpline2 (exec.c:1697)
==9322== by 0x427FD2: execpline (exec.c:1484)
==9322== by 0x42779A: execlist (exec.c:1275)
==9322== by 0x42717C: execode (exec.c:1073)
==9322== by 0x431299: runshfunc (exec.c:5040)
==9322== by 0x430E76: doshfunc (exec.c:4920)
==9322== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9322==
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9325-- Caught __NR_exit; running __libc_freeres()
==9326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9326-by-pythonnut-on-???
==9326== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9326-by-pythonnut-on-???
==9326== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9326-by-pythonnut-on-???
==9326==
==9326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9326== don't want to do, unless you know exactly what you're doing,
==9326== or are doing some strange experiment):
==9326== /usr/lib/valgrind/../../bin/vgdb --pid=9326 ...command...
==9326==
==9326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9326== /path/to/gdb ./zsh
==9326== and then give GDB the following command
==9326== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9326
==9326== --pid is optional if only one valgrind process is running
==9326==
==9325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9325-by-pythonnut-on-???
==9325== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9325-by-pythonnut-on-???
==9325== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9325-by-pythonnut-on-???
==9325==
==9325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9325== don't want to do, unless you know exactly what you're doing,
==9325== or are doing some strange experiment):
==9325== /usr/lib/valgrind/../../bin/vgdb --pid=9325 ...command...
==9325==
==9325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9325== /path/to/gdb ./zsh
==9325== and then give GDB the following command
==9325== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9325
==9325== --pid is optional if only one valgrind process is running
==9325==
client request: code 4d430005, addr 0xFFEFF172C, len 4
--9325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9325==
==9325== HEAP SUMMARY:
==9325== in use at exit: 3,153,320 bytes in 68,966 blocks
==9325== total heap usage: 928,539 allocs, 859,573 frees, 65,637,264 bytes allocated
==9325==
==9325== Searching for pointers to 68,966 not-freed blocks
--9325-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9325-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9325-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9325-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9325-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9325-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9325-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9325-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9325-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9325-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9325-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9325-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9325-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9325-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9325-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9325-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9325-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9325-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9325-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9325-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9325-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9325-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9325-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9325-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9325-- Scanning root segment: 0x701a000..0x701afff (4096)
--9325-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9325-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9325-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9325-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9325-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9325-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9325-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9325-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9325-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9325== Checked 4,871,568 bytes
==9325==
==9325== LEAK SUMMARY:
==9325== definitely lost: 1,533 bytes in 8 blocks
==9325== indirectly lost: 6,756 bytes in 7 blocks
==9325== possibly lost: 0 bytes in 0 blocks
==9325== still reachable: 3,145,031 bytes in 68,951 blocks
==9325== suppressed: 0 bytes in 0 blocks
==9325== Rerun with --leak-check=full to see details of leaked memory
==9325==
==9325== Use --track-origins=yes to see where uninitialised values come from
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9325==
==9325== 1 errors in context 1 of 2:
==9325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9325== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9325== by 0x488CD0: stringsubst (subst.c:301)
==9325== by 0x48801B: prefork (subst.c:77)
==9325== by 0x42B318: execcmd (exec.c:2619)
==9325== by 0x428CA0: execpline2 (exec.c:1697)
==9325== by 0x427FD2: execpline (exec.c:1484)
==9325== by 0x427756: execlist (exec.c:1267)
==9325== by 0x42717C: execode (exec.c:1073)
==9325== by 0x431299: runshfunc (exec.c:5040)
==9325== by 0x430E76: doshfunc (exec.c:4920)
==9325== by 0x4302FB: execshfunc (exec.c:4557)
==9325== by 0x42D8C1: execcmd (exec.c:3373)
==9325==
==9325==
==9325== 2 errors in context 2 of 2:
==9325== Conditional jump or move depends on uninitialised value(s)
==9325== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9325== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9325== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9325== by 0x40EFC2: execbuiltin (builtin.c:450)
==9325== by 0x42D8E9: execcmd (exec.c:3378)
==9325== by 0x428CA0: execpline2 (exec.c:1697)
==9325== by 0x427FD2: execpline (exec.c:1484)
==9325== by 0x42779A: execlist (exec.c:1275)
==9325== by 0x42717C: execode (exec.c:1073)
==9325== by 0x431299: runshfunc (exec.c:5040)
==9325== by 0x430E76: doshfunc (exec.c:4920)
==9325== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9325==
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9324-by-pythonnut-on-???
==9324== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9324-by-pythonnut-on-???
==9324== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9324-by-pythonnut-on-???
==9324==
==9324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9324== don't want to do, unless you know exactly what you're doing,
==9324== or are doing some strange experiment):
==9324== /usr/lib/valgrind/../../bin/vgdb --pid=9324 ...command...
==9324==
==9324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9324== /path/to/gdb ./zsh
==9324== and then give GDB the following command
==9324== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9324
==9324== --pid is optional if only one valgrind process is running
==9324==
--9324-- Caught __NR_exit; running __libc_freeres()
--9324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9324==
==9324== HEAP SUMMARY:
==9324== in use at exit: 3,153,256 bytes in 68,963 blocks
==9324== total heap usage: 928,541 allocs, 859,578 frees, 65,637,808 bytes allocated
==9324==
==9324== Searching for pointers to 68,963 not-freed blocks
--9324-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9324-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9324-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9324-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9324-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9324-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9324-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9324-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9324-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9324-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9324-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9324-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9324-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9324-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9324-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9324-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9324-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9324-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9324-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9324-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9324-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9324-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9324-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9324-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9324-- Scanning root segment: 0x701a000..0x701afff (4096)
--9324-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9324-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9324-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9324-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9324-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9324-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9324-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9324-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9324-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9324== Checked 4,870,904 bytes
==9324==
==9324== LEAK SUMMARY:
==9324== definitely lost: 1,533 bytes in 8 blocks
==9324== indirectly lost: 6,756 bytes in 7 blocks
==9324== possibly lost: 0 bytes in 0 blocks
==9324== still reachable: 3,144,967 bytes in 68,948 blocks
==9324== suppressed: 0 bytes in 0 blocks
==9324== Rerun with --leak-check=full to see details of leaked memory
==9324==
==9324== Use --track-origins=yes to see where uninitialised values come from
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324==
==9324== 1 errors in context 1 of 2:
==9324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9324== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9324== by 0x488CD0: stringsubst (subst.c:301)
==9324== by 0x48801B: prefork (subst.c:77)
==9324== by 0x42B318: execcmd (exec.c:2619)
==9324== by 0x428CA0: execpline2 (exec.c:1697)
==9324== by 0x427FD2: execpline (exec.c:1484)
==9324== by 0x427756: execlist (exec.c:1267)
==9324== by 0x42717C: execode (exec.c:1073)
==9324== by 0x431299: runshfunc (exec.c:5040)
==9324== by 0x430E76: doshfunc (exec.c:4920)
==9324== by 0x4302FB: execshfunc (exec.c:4557)
==9324== by 0x42D8C1: execcmd (exec.c:3373)
==9324==
==9324==
==9324== 2 errors in context 2 of 2:
==9324== Conditional jump or move depends on uninitialised value(s)
==9324== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9324== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9324== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9324== by 0x40EFC2: execbuiltin (builtin.c:450)
==9324== by 0x42D8E9: execcmd (exec.c:3378)
==9324== by 0x428CA0: execpline2 (exec.c:1697)
==9324== by 0x427FD2: execpline (exec.c:1484)
==9324== by 0x42779A: execlist (exec.c:1275)
==9324== by 0x42717C: execode (exec.c:1073)
==9324== by 0x431299: runshfunc (exec.c:5040)
==9324== by 0x430E76: doshfunc (exec.c:4920)
==9324== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9324==
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9329-by-pythonnut-on-???
==9329== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9329-by-pythonnut-on-???
==9329== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9329-by-pythonnut-on-???
==9329==
==9329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9329== don't want to do, unless you know exactly what you're doing,
==9329== or are doing some strange experiment):
==9329== /usr/lib/valgrind/../../bin/vgdb --pid=9329 ...command...
==9329==
==9329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9329== /path/to/gdb ./zsh
==9329== and then give GDB the following command
==9329== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9329
==9329== --pid is optional if only one valgrind process is running
==9329==
==9330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9330-by-pythonnut-on-???
==9330== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9330-by-pythonnut-on-???
==9330== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9330-by-pythonnut-on-???
==9330==
==9330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9330== don't want to do, unless you know exactly what you're doing,
==9330== or are doing some strange experiment):
==9330== /usr/lib/valgrind/../../bin/vgdb --pid=9330 ...command...
==9330==
==9330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9330== /path/to/gdb ./zsh
==9330== and then give GDB the following command
==9330== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9330
==9330== --pid is optional if only one valgrind process is running
==9330==
--9330-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF172C, len 4
--9330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9330==
==9330== HEAP SUMMARY:
==9330== in use at exit: 3,189,966 bytes in 68,969 blocks
==9330== total heap usage: 928,548 allocs, 859,579 frees, 65,676,091 bytes allocated
==9330==
==9330== Searching for pointers to 68,969 not-freed blocks
--9330-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9330-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9330-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9330-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9330-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9330-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9330-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9330-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9330-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9330-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9330-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9330-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9330-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9330-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9330-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9330-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9330-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9330-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9330-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9330-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9330-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9330-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9330-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9330-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9330-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9330-- Scanning root segment: 0x701a000..0x701afff (4096)
--9330-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9330-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9330-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9330-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9330-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9330-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9330-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9330-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9330-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9330== Checked 4,945,088 bytes
==9330==
==9330== LEAK SUMMARY:
==9330== definitely lost: 1,533 bytes in 8 blocks
==9330== indirectly lost: 6,756 bytes in 7 blocks
==9330== possibly lost: 0 bytes in 0 blocks
==9330== still reachable: 3,181,677 bytes in 68,954 blocks
==9330== suppressed: 0 bytes in 0 blocks
==9330== Rerun with --leak-check=full to see details of leaked memory
==9330==
==9330== Use --track-origins=yes to see where uninitialised values come from
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9330==
==9330== 1 errors in context 1 of 2:
==9330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9330== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9330== by 0x488CD0: stringsubst (subst.c:301)
==9330== by 0x48801B: prefork (subst.c:77)
==9330== by 0x42B318: execcmd (exec.c:2619)
==9330== by 0x428CA0: execpline2 (exec.c:1697)
==9330== by 0x427FD2: execpline (exec.c:1484)
==9330== by 0x427756: execlist (exec.c:1267)
==9330== by 0x42717C: execode (exec.c:1073)
==9330== by 0x431299: runshfunc (exec.c:5040)
==9330== by 0x430E76: doshfunc (exec.c:4920)
==9330== by 0x4302FB: execshfunc (exec.c:4557)
==9330== by 0x42D8C1: execcmd (exec.c:3373)
==9330==
==9330==
==9330== 2 errors in context 2 of 2:
==9330== Conditional jump or move depends on uninitialised value(s)
==9330== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9330== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9330== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9330== by 0x40EFC2: execbuiltin (builtin.c:450)
==9330== by 0x42D8E9: execcmd (exec.c:3378)
==9330== by 0x428CA0: execpline2 (exec.c:1697)
==9330== by 0x427FD2: execpline (exec.c:1484)
==9330== by 0x42779A: execlist (exec.c:1275)
==9330== by 0x42717C: execode (exec.c:1073)
==9330== by 0x431299: runshfunc (exec.c:5040)
==9330== by 0x430E76: doshfunc (exec.c:4920)
==9330== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9330==
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9329-- Caught __NR_exit; running __libc_freeres()
--9329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9329==
==9329== HEAP SUMMARY:
==9329== in use at exit: 3,153,326 bytes in 68,966 blocks
==9329== total heap usage: 928,551 allocs, 859,585 frees, 65,676,667 bytes allocated
==9329==
==9329== Searching for pointers to 68,966 not-freed blocks
--9329-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9329-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9329-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9329-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9329-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9329-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9329-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9329-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9329-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9329-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9329-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9329-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9329-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9329-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9329-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9329-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9329-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9329-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9329-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9329-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9329-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9329-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9329-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9329-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9329-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9329-- Scanning root segment: 0x701a000..0x701afff (4096)
--9329-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9329-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9329-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9329-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9329-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9329-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9329-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9329-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9329-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9329== Checked 4,907,832 bytes
==9329==
==9329== LEAK SUMMARY:
==9329== definitely lost: 1,533 bytes in 8 blocks
==9329== indirectly lost: 6,756 bytes in 7 blocks
==9329== possibly lost: 0 bytes in 0 blocks
==9329== still reachable: 3,145,037 bytes in 68,951 blocks
==9329== suppressed: 0 bytes in 0 blocks
==9329== Rerun with --leak-check=full to see details of leaked memory
==9329==
==9329== Use --track-origins=yes to see where uninitialised values come from
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329==
==9329== 1 errors in context 1 of 2:
==9329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9329== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9329== by 0x488CD0: stringsubst (subst.c:301)
==9329== by 0x48801B: prefork (subst.c:77)
==9329== by 0x42B318: execcmd (exec.c:2619)
==9329== by 0x428CA0: execpline2 (exec.c:1697)
==9329== by 0x427FD2: execpline (exec.c:1484)
==9329== by 0x427756: execlist (exec.c:1267)
==9329== by 0x42717C: execode (exec.c:1073)
==9329== by 0x431299: runshfunc (exec.c:5040)
==9329== by 0x430E76: doshfunc (exec.c:4920)
==9329== by 0x4302FB: execshfunc (exec.c:4557)
==9329== by 0x42D8C1: execcmd (exec.c:3373)
==9329==
==9329==
==9329== 2 errors in context 2 of 2:
==9329== Conditional jump or move depends on uninitialised value(s)
==9329== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9329== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9329== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9329== by 0x40EFC2: execbuiltin (builtin.c:450)
==9329== by 0x42D8E9: execcmd (exec.c:3378)
==9329== by 0x428CA0: execpline2 (exec.c:1697)
==9329== by 0x427FD2: execpline (exec.c:1484)
==9329== by 0x42779A: execlist (exec.c:1275)
==9329== by 0x42717C: execode (exec.c:1073)
==9329== by 0x431299: runshfunc (exec.c:5040)
==9329== by 0x430E76: doshfunc (exec.c:4920)
==9329== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9329==
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9333-by-pythonnut-on-???
==9333== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9333-by-pythonnut-on-???
==9333== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9333-by-pythonnut-on-???
==9333==
==9333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9333== don't want to do, unless you know exactly what you're doing,
==9333== or are doing some strange experiment):
==9333== /usr/lib/valgrind/../../bin/vgdb --pid=9333 ...command...
==9333==
==9333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9333== /path/to/gdb ./zsh
==9333== and then give GDB the following command
==9333== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9333
==9333== --pid is optional if only one valgrind process is running
==9333==
--9333-- Caught __NR_exit; running __libc_freeres()
==9332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9332-by-pythonnut-on-???
==9332== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9332-by-pythonnut-on-???
==9332== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9332-by-pythonnut-on-???
==9332==
==9332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9332== don't want to do, unless you know exactly what you're doing,
==9332== or are doing some strange experiment):
==9332== /usr/lib/valgrind/../../bin/vgdb --pid=9332 ...command...
==9332==
==9332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9332== /path/to/gdb ./zsh
==9332== and then give GDB the following command
==9332== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9332
==9332== --pid is optional if only one valgrind process is running
==9332==
--9333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9333==
==9333== HEAP SUMMARY:
==9333== in use at exit: 3,154,011 bytes in 68,972 blocks
==9333== total heap usage: 928,560 allocs, 859,588 frees, 65,644,112 bytes allocated
==9333==
==9333== Searching for pointers to 68,972 not-freed blocks
--9333-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9333-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9333-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9333-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9333-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9333-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9333-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9333-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9333-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9333-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9333-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9333-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9333-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9333-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9333-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9333-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9333-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9333-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9333-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9333-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9333-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9333-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9333-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9333-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9333-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9333-- Scanning root segment: 0x701a000..0x701afff (4096)
--9333-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9333-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9333-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9333-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9333-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9333-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9333-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9333-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9333-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9333== Checked 4,888,384 bytes
==9333==
==9333== LEAK SUMMARY:
==9333== definitely lost: 1,533 bytes in 8 blocks
==9333== indirectly lost: 6,756 bytes in 7 blocks
==9333== possibly lost: 0 bytes in 0 blocks
==9333== still reachable: 3,145,722 bytes in 68,957 blocks
==9333== suppressed: 0 bytes in 0 blocks
==9333== Rerun with --leak-check=full to see details of leaked memory
==9333==
==9333== Use --track-origins=yes to see where uninitialised values come from
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333==
==9333== 1 errors in context 1 of 2:
==9333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9333== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9333== by 0x488CD0: stringsubst (subst.c:301)
==9333== by 0x48801B: prefork (subst.c:77)
==9333== by 0x42B318: execcmd (exec.c:2619)
==9333== by 0x428CA0: execpline2 (exec.c:1697)
==9333== by 0x427FD2: execpline (exec.c:1484)
==9333== by 0x427756: execlist (exec.c:1267)
==9333== by 0x42717C: execode (exec.c:1073)
==9333== by 0x431299: runshfunc (exec.c:5040)
==9333== by 0x430E76: doshfunc (exec.c:4920)
==9333== by 0x4302FB: execshfunc (exec.c:4557)
==9333== by 0x42D8C1: execcmd (exec.c:3373)
==9333==
==9333==
==9333== 2 errors in context 2 of 2:
==9333== Conditional jump or move depends on uninitialised value(s)
==9333== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9333== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9333== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9333== by 0x40EFC2: execbuiltin (builtin.c:450)
==9333== by 0x42D8E9: execcmd (exec.c:3378)
==9333== by 0x428CA0: execpline2 (exec.c:1697)
==9333== by 0x427FD2: execpline (exec.c:1484)
==9333== by 0x42779A: execlist (exec.c:1275)
==9333== by 0x42717C: execode (exec.c:1073)
==9333== by 0x431299: runshfunc (exec.c:5040)
==9333== by 0x430E76: doshfunc (exec.c:4920)
==9333== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9333==
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9332-- Caught __NR_exit; running __libc_freeres()
--9332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9332==
==9332== HEAP SUMMARY:
==9332== in use at exit: 3,153,904 bytes in 68,972 blocks
==9332== total heap usage: 928,597 allocs, 859,625 frees, 65,653,653 bytes allocated
==9332==
==9332== Searching for pointers to 68,972 not-freed blocks
--9332-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9332-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9332-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9332-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9332-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9332-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9332-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9332-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9332-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9332-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9332-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9332-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9332-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9332-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9332-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9332-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9332-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9332-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9332-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9332-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9332-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9332-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9332-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9332-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9332-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9332-- Scanning root segment: 0x701a000..0x701afff (4096)
--9332-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9332-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9332-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9332-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9332-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9332-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9332-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9332-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9332-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9332== Checked 4,887,696 bytes
==9332==
==9332== LEAK SUMMARY:
==9332== definitely lost: 1,533 bytes in 8 blocks
==9332== indirectly lost: 6,756 bytes in 7 blocks
==9332== possibly lost: 0 bytes in 0 blocks
==9332== still reachable: 3,145,615 bytes in 68,957 blocks
==9332== suppressed: 0 bytes in 0 blocks
==9332== Rerun with --leak-check=full to see details of leaked memory
==9332==
==9332== Use --track-origins=yes to see where uninitialised values come from
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9332==
==9332== 1 errors in context 1 of 2:
==9332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9332== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9332== by 0x488CD0: stringsubst (subst.c:301)
==9332== by 0x48801B: prefork (subst.c:77)
==9332== by 0x42B318: execcmd (exec.c:2619)
==9332== by 0x428CA0: execpline2 (exec.c:1697)
==9332== by 0x427FD2: execpline (exec.c:1484)
==9332== by 0x427756: execlist (exec.c:1267)
==9332== by 0x42717C: execode (exec.c:1073)
==9332== by 0x431299: runshfunc (exec.c:5040)
==9332== by 0x430E76: doshfunc (exec.c:4920)
==9332== by 0x4302FB: execshfunc (exec.c:4557)
==9332== by 0x42D8C1: execcmd (exec.c:3373)
==9332==
==9332==
==9332== 2 errors in context 2 of 2:
==9332== Conditional jump or move depends on uninitialised value(s)
==9332== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9332== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9332== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9332== by 0x40EFC2: execbuiltin (builtin.c:450)
==9332== by 0x42D8E9: execcmd (exec.c:3378)
==9332== by 0x428CA0: execpline2 (exec.c:1697)
==9332== by 0x427FD2: execpline (exec.c:1484)
==9332== by 0x42779A: execlist (exec.c:1275)
==9332== by 0x42717C: execode (exec.c:1073)
==9332== by 0x431299: runshfunc (exec.c:5040)
==9332== by 0x430E76: doshfunc (exec.c:4920)
==9332== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9332==
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9334-by-pythonnut-on-???
==9334== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9334-by-pythonnut-on-???
==9334== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9334-by-pythonnut-on-???
==9334==
==9334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9334== don't want to do, unless you know exactly what you're doing,
==9334== or are doing some strange experiment):
==9334== /usr/lib/valgrind/../../bin/vgdb --pid=9334 ...command...
==9334==
==9334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9334== /path/to/gdb ./zsh
==9334== and then give GDB the following command
==9334== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9334
==9334== --pid is optional if only one valgrind process is running
==9334==
--9334-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF1DAC, len 4
--9334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9335-- Caught __NR_exit; running __libc_freeres()
==9334==
==9334== HEAP SUMMARY:
==9334== in use at exit: 3,117,696 bytes in 68,972 blocks
==9334== total heap usage: 928,569 allocs, 859,597 frees, 65,648,328 bytes allocated
==9334==
==9335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9335-by-pythonnut-on-???
==9335== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9335-by-pythonnut-on-???
==9335== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9335-by-pythonnut-on-???
==9335==
==9335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9335== don't want to do, unless you know exactly what you're doing,
==9335== or are doing some strange experiment):
==9335== /usr/lib/valgrind/../../bin/vgdb --pid=9335 ...command...
==9335==
==9335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9335== /path/to/gdb ./zsh
==9335== and then give GDB the following command
==9335== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9335
==9335== --pid is optional if only one valgrind process is running
==9335==
--9335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9335==
==9334== Searching for pointers to 68,972 not-freed blocks
--9334-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9334-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9334-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9334-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9334-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9334-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9334-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9334-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9334-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9334-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9334-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9334-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9334-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9334-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9334-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9334-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9334-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9334-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9334-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9334-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9334-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9334-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9334-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9335== HEAP SUMMARY:
==9335== in use at exit: 3,117,440 bytes in 68,972 blocks
==9335== total heap usage: 928,575 allocs, 859,603 frees, 65,650,448 bytes allocated
==9335==
--9334-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9334-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9334-- Scanning root segment: 0x701a000..0x701afff (4096)
--9334-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9334-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9334-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9334-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9334-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9334-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9334-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9334-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9334-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9335== Searching for pointers to 68,972 not-freed blocks
--9335-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9335-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9335-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9335-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9335-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9335-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9335-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9335-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9335-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9335-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9335-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9335-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9335-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9335-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9335-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9335-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9335-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9335-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9335-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9335-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9335-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9335-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9335-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9335-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9335-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9335-- Scanning root segment: 0x701a000..0x701afff (4096)
--9335-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9335-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9335-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9335-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9335-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9335-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9335-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9335-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9335-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9334== Checked 4,851,056 bytes
==9334==
==9334== LEAK SUMMARY:
==9334== definitely lost: 1,533 bytes in 8 blocks
==9334== indirectly lost: 6,756 bytes in 7 blocks
==9334== possibly lost: 0 bytes in 0 blocks
==9334== still reachable: 3,109,407 bytes in 68,957 blocks
==9334== suppressed: 0 bytes in 0 blocks
==9334== Rerun with --leak-check=full to see details of leaked memory
==9334==
==9334== Use --track-origins=yes to see where uninitialised values come from
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334==
==9334== 1 errors in context 1 of 2:
==9334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9334== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9334== by 0x488CD0: stringsubst (subst.c:301)
==9334== by 0x48801B: prefork (subst.c:77)
==9334== by 0x42B318: execcmd (exec.c:2619)
==9334== by 0x428CA0: execpline2 (exec.c:1697)
==9334== by 0x427FD2: execpline (exec.c:1484)
==9334== by 0x427756: execlist (exec.c:1267)
==9334== by 0x42717C: execode (exec.c:1073)
==9334== by 0x431299: runshfunc (exec.c:5040)
==9334== by 0x430E76: doshfunc (exec.c:4920)
==9334== by 0x4302FB: execshfunc (exec.c:4557)
==9334== by 0x42D8C1: execcmd (exec.c:3373)
==9334==
==9334==
==9334== 2 errors in context 2 of 2:
==9334== Conditional jump or move depends on uninitialised value(s)
==9334== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9334== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9334== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9334== by 0x40EFC2: execbuiltin (builtin.c:450)
==9334== by 0x42D8E9: execcmd (exec.c:3378)
==9334== by 0x428CA0: execpline2 (exec.c:1697)
==9334== by 0x427FD2: execpline (exec.c:1484)
==9334== by 0x42779A: execlist (exec.c:1275)
==9334== by 0x42717C: execode (exec.c:1073)
==9334== by 0x431299: runshfunc (exec.c:5040)
==9334== by 0x430E76: doshfunc (exec.c:4920)
==9334== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9334==
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335== Checked 4,850,904 bytes
==9335==
==9335== LEAK SUMMARY:
==9335== definitely lost: 1,557 bytes in 9 blocks
==9335== indirectly lost: 6,796 bytes in 9 blocks
==9335== possibly lost: 0 bytes in 0 blocks
==9335== still reachable: 3,109,087 bytes in 68,954 blocks
==9335== suppressed: 0 bytes in 0 blocks
==9335== Rerun with --leak-check=full to see details of leaked memory
==9335==
==9335== Use --track-origins=yes to see where uninitialised values come from
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335==
==9335== 1 errors in context 1 of 2:
==9335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9335== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9335== by 0x488CD0: stringsubst (subst.c:301)
==9335== by 0x48801B: prefork (subst.c:77)
==9335== by 0x42B318: execcmd (exec.c:2619)
==9335== by 0x428CA0: execpline2 (exec.c:1697)
==9335== by 0x427FD2: execpline (exec.c:1484)
==9335== by 0x427756: execlist (exec.c:1267)
==9335== by 0x42717C: execode (exec.c:1073)
==9335== by 0x431299: runshfunc (exec.c:5040)
==9335== by 0x430E76: doshfunc (exec.c:4920)
==9335== by 0x4302FB: execshfunc (exec.c:4557)
==9335== by 0x42D8C1: execcmd (exec.c:3373)
==9335==
==9335==
==9335== 2 errors in context 2 of 2:
==9335== Conditional jump or move depends on uninitialised value(s)
==9335== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9335== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9335== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9335== by 0x40EFC2: execbuiltin (builtin.c:450)
==9335== by 0x42D8E9: execcmd (exec.c:3378)
==9335== by 0x428CA0: execpline2 (exec.c:1697)
==9335== by 0x427FD2: execpline (exec.c:1484)
==9335== by 0x42779A: execlist (exec.c:1275)
==9335== by 0x42717C: execode (exec.c:1073)
==9335== by 0x431299: runshfunc (exec.c:5040)
==9335== by 0x430E76: doshfunc (exec.c:4920)
==9335== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9335==
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9339-by-pythonnut-on-???
==9339== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9339-by-pythonnut-on-???
==9339== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9339-by-pythonnut-on-???
==9339==
==9339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9339== don't want to do, unless you know exactly what you're doing,
==9339== or are doing some strange experiment):
==9339== /usr/lib/valgrind/../../bin/vgdb --pid=9339 ...command...
==9339==
==9339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9339== /path/to/gdb ./zsh
==9339== and then give GDB the following command
==9339== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9339
==9339== --pid is optional if only one valgrind process is running
==9339==
client request: code 4d430005, addr 0xFFEFF272C, len 4
--9321-- Caught __NR_exit; running __libc_freeres()
--9321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9321==
==9321== HEAP SUMMARY:
==9321== in use at exit: 3,116,022 bytes in 68,949 blocks
==9321== total heap usage: 928,576 allocs, 859,627 frees, 65,651,016 bytes allocated
==9321==
==9321== Searching for pointers to 68,949 not-freed blocks
--9321-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9321-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9321-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9321-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9321-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9321-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9321-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9321-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9321-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9321-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9321-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9321-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9321-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9321-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9321-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9321-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9321-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9321-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9321-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9321-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9321-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9321-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9321-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9321-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9321-- Scanning root segment: 0x701a000..0x701afff (4096)
--9321-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9321-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9321-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9321-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9321-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9321-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9321-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9321-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9321-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9321== Checked 4,757,304 bytes
==9321==
==9321== LEAK SUMMARY:
==9321== definitely lost: 1,533 bytes in 8 blocks
==9321== indirectly lost: 6,756 bytes in 7 blocks
==9321== possibly lost: 0 bytes in 0 blocks
==9321== still reachable: 3,107,733 bytes in 68,934 blocks
==9321== suppressed: 0 bytes in 0 blocks
==9321== Rerun with --leak-check=full to see details of leaked memory
==9321==
==9321== Use --track-origins=yes to see where uninitialised values come from
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9321==
==9321== 1 errors in context 1 of 2:
==9321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9321== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9321== by 0x488CD0: stringsubst (subst.c:301)
==9321== by 0x48801B: prefork (subst.c:77)
==9321== by 0x42B318: execcmd (exec.c:2619)
==9321== by 0x428CA0: execpline2 (exec.c:1697)
==9321== by 0x427FD2: execpline (exec.c:1484)
==9321== by 0x427756: execlist (exec.c:1267)
==9321== by 0x42717C: execode (exec.c:1073)
==9321== by 0x431299: runshfunc (exec.c:5040)
==9321== by 0x430E76: doshfunc (exec.c:4920)
==9321== by 0x4302FB: execshfunc (exec.c:4557)
==9321== by 0x42D8C1: execcmd (exec.c:3373)
==9321==
==9321==
==9321== 2 errors in context 2 of 2:
==9321== Conditional jump or move depends on uninitialised value(s)
==9321== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9321== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9321== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9321== by 0x40EFC2: execbuiltin (builtin.c:450)
==9321== by 0x42D8E9: execcmd (exec.c:3378)
==9321== by 0x428CA0: execpline2 (exec.c:1697)
==9321== by 0x427FD2: execpline (exec.c:1484)
==9321== by 0x42779A: execlist (exec.c:1275)
==9321== by 0x42717C: execode (exec.c:1073)
==9321== by 0x431299: runshfunc (exec.c:5040)
==9321== by 0x430E76: doshfunc (exec.c:4920)
==9321== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9321==
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9341-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF305C, len 4
==9341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9341-by-pythonnut-on-???
==9341== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9341-by-pythonnut-on-???
==9341== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9341-by-pythonnut-on-???
==9341==
==9341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9341== don't want to do, unless you know exactly what you're doing,
==9341== or are doing some strange experiment):
==9341== /usr/lib/valgrind/../../bin/vgdb --pid=9341 ...command...
==9341==
==9341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9341== /path/to/gdb ./zsh
==9341== and then give GDB the following command
==9341== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9341
==9341== --pid is optional if only one valgrind process is running
==9341==
client request: code 4d430005, addr 0xFFEFF2FBC, len 4
--9341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9341==
==9341== HEAP SUMMARY:
==9341== in use at exit: 3,116,350 bytes in 68,950 blocks
==9341== total heap usage: 928,521 allocs, 859,571 frees, 65,600,302 bytes allocated
==9341==
==9341== Searching for pointers to 68,950 not-freed blocks
--9341-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9341-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9341-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9341-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9341-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9341-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9341-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9341-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9341-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9341-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9341-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9341-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9341-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9341-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9341-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9341-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9341-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9341-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9341-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9341-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9341-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9341-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9341-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9341-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9341-- Scanning root segment: 0x701a000..0x701afff (4096)
--9341-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9341-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9341-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9341-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9341-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9341-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9341-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9341-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9341-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9341== Checked 4,758,840 bytes
==9341==
==9341== LEAK SUMMARY:
==9341== definitely lost: 1,533 bytes in 8 blocks
==9341== indirectly lost: 6,756 bytes in 7 blocks
==9341== possibly lost: 0 bytes in 0 blocks
==9341== still reachable: 3,108,061 bytes in 68,935 blocks
==9341== suppressed: 0 bytes in 0 blocks
==9341== Rerun with --leak-check=full to see details of leaked memory
==9341==
==9341== Use --track-origins=yes to see where uninitialised values come from
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9341==
==9341== 1 errors in context 1 of 2:
==9341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9341== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9341== by 0x488CD0: stringsubst (subst.c:301)
==9341== by 0x48801B: prefork (subst.c:77)
==9341== by 0x42B318: execcmd (exec.c:2619)
==9341== by 0x428CA0: execpline2 (exec.c:1697)
==9341== by 0x427FD2: execpline (exec.c:1484)
==9341== by 0x427756: execlist (exec.c:1267)
==9341== by 0x42717C: execode (exec.c:1073)
==9341== by 0x431299: runshfunc (exec.c:5040)
==9341== by 0x430E76: doshfunc (exec.c:4920)
==9341== by 0x4302FB: execshfunc (exec.c:4557)
==9341== by 0x42D8C1: execcmd (exec.c:3373)
==9341==
==9341==
==9341== 2 errors in context 2 of 2:
==9341== Conditional jump or move depends on uninitialised value(s)
==9341== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9341== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9341== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9341== by 0x40EFC2: execbuiltin (builtin.c:450)
==9341== by 0x42D8E9: execcmd (exec.c:3378)
==9341== by 0x428CA0: execpline2 (exec.c:1697)
==9341== by 0x427FD2: execpline (exec.c:1484)
==9341== by 0x42779A: execlist (exec.c:1275)
==9341== by 0x42717C: execode (exec.c:1073)
==9341== by 0x431299: runshfunc (exec.c:5040)
==9341== by 0x430E76: doshfunc (exec.c:4920)
==9341== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9341==
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9340-- Caught __NR_exit; running __libc_freeres()
==9340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9340-by-pythonnut-on-???
==9340== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9340-by-pythonnut-on-???
==9340== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9340-by-pythonnut-on-???
==9340==
==9340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9340== don't want to do, unless you know exactly what you're doing,
==9340== or are doing some strange experiment):
==9340== /usr/lib/valgrind/../../bin/vgdb --pid=9340 ...command...
==9340==
==9340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9340== /path/to/gdb ./zsh
==9340== and then give GDB the following command
==9340== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9340
==9340== --pid is optional if only one valgrind process is running
==9340==
--9340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9340==
==9340== HEAP SUMMARY:
==9340== in use at exit: 3,116,062 bytes in 68,947 blocks
==9340== total heap usage: 928,527 allocs, 859,580 frees, 65,601,190 bytes allocated
==9340==
==9340== Searching for pointers to 68,947 not-freed blocks
--9340-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9340-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9340-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9340-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9340-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9340-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9340-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9340-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9340-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9340-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9340-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9340-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9340-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9340-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9340-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9340-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9340-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9340-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9340-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9340-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9340-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9340-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9340-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9340-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9340-- Scanning root segment: 0x701a000..0x701afff (4096)
--9340-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9340-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9340-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9340-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9340-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9340-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9340-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9340-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9340-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9340== Checked 4,757,920 bytes
==9340==
==9340== LEAK SUMMARY:
==9340== definitely lost: 1,533 bytes in 8 blocks
==9340== indirectly lost: 6,756 bytes in 7 blocks
==9340== possibly lost: 0 bytes in 0 blocks
==9340== still reachable: 3,107,773 bytes in 68,932 blocks
==9340== suppressed: 0 bytes in 0 blocks
==9340== Rerun with --leak-check=full to see details of leaked memory
==9340==
==9340== Use --track-origins=yes to see where uninitialised values come from
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9340==
==9340== 1 errors in context 1 of 2:
==9340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9340== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9340== by 0x488CD0: stringsubst (subst.c:301)
==9340== by 0x48801B: prefork (subst.c:77)
==9340== by 0x42B318: execcmd (exec.c:2619)
==9340== by 0x428CA0: execpline2 (exec.c:1697)
==9340== by 0x427FD2: execpline (exec.c:1484)
==9340== by 0x427756: execlist (exec.c:1267)
==9340== by 0x42717C: execode (exec.c:1073)
==9340== by 0x431299: runshfunc (exec.c:5040)
==9340== by 0x430E76: doshfunc (exec.c:4920)
==9340== by 0x4302FB: execshfunc (exec.c:4557)
==9340== by 0x42D8C1: execcmd (exec.c:3373)
==9340==
==9340==
==9340== 2 errors in context 2 of 2:
==9340== Conditional jump or move depends on uninitialised value(s)
==9340== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9340== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9340== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9340== by 0x40EFC2: execbuiltin (builtin.c:450)
==9340== by 0x42D8E9: execcmd (exec.c:3378)
==9340== by 0x428CA0: execpline2 (exec.c:1697)
==9340== by 0x427FD2: execpline (exec.c:1484)
==9340== by 0x42779A: execlist (exec.c:1275)
==9340== by 0x42717C: execode (exec.c:1073)
==9340== by 0x431299: runshfunc (exec.c:5040)
==9340== by 0x430E76: doshfunc (exec.c:4920)
==9340== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9340==
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9345-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF1BFC, len 4
==9345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9345-by-pythonnut-on-???
==9345== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9345-by-pythonnut-on-???
==9345== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9345-by-pythonnut-on-???
==9345==
==9345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9345== don't want to do, unless you know exactly what you're doing,
==9345== or are doing some strange experiment):
==9345== /usr/lib/valgrind/../../bin/vgdb --pid=9345 ...command...
==9345==
==9345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9345== /path/to/gdb ./zsh
==9345== and then give GDB the following command
==9345== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9345
==9345== --pid is optional if only one valgrind process is running
==9345==
client request: code 4d430005, addr 0xFFEFF1B5C, len 4
--9345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9345==
==9345== HEAP SUMMARY:
==9345== in use at exit: 3,116,272 bytes in 68,952 blocks
==9345== total heap usage: 928,554 allocs, 859,602 frees, 65,613,491 bytes allocated
==9345==
==9345== Searching for pointers to 68,952 not-freed blocks
--9345-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9345-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9345-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9345-- Scanning root segment: 0x4037000..0x403afff (16384)
--9345-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9345-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9345-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9345-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9345-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9345-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9345-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9345-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9345-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9345-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9345-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9345-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9345-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9345-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9345-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9345-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9345-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9345-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9345-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9345-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9345-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9345-- Scanning root segment: 0x701a000..0x701afff (4096)
--9345-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9345-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9345-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9345-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9345-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9345-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9345-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9345-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9345-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9345== Checked 4,776,448 bytes
==9345==
==9345== LEAK SUMMARY:
==9345== definitely lost: 1,533 bytes in 8 blocks
==9345== indirectly lost: 6,756 bytes in 7 blocks
==9345== possibly lost: 0 bytes in 0 blocks
==9345== still reachable: 3,107,983 bytes in 68,937 blocks
==9345== suppressed: 0 bytes in 0 blocks
==9345== Rerun with --leak-check=full to see details of leaked memory
==9345==
==9345== Use --track-origins=yes to see where uninitialised values come from
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9345==
==9345== 1 errors in context 1 of 2:
==9345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9345== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9345== by 0x488CD0: stringsubst (subst.c:301)
==9345== by 0x48801B: prefork (subst.c:77)
==9345== by 0x42B318: execcmd (exec.c:2619)
==9345== by 0x428CA0: execpline2 (exec.c:1697)
==9345== by 0x427FD2: execpline (exec.c:1484)
==9345== by 0x427756: execlist (exec.c:1267)
==9345== by 0x42717C: execode (exec.c:1073)
==9345== by 0x431299: runshfunc (exec.c:5040)
==9345== by 0x430E76: doshfunc (exec.c:4920)
==9345== by 0x4302FB: execshfunc (exec.c:4557)
==9345== by 0x42D8C1: execcmd (exec.c:3373)
==9345==
==9345==
==9345== 2 errors in context 2 of 2:
==9345== Conditional jump or move depends on uninitialised value(s)
==9345== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9345== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9345== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9345== by 0x40EFC2: execbuiltin (builtin.c:450)
==9345== by 0x42D8E9: execcmd (exec.c:3378)
==9345== by 0x428CA0: execpline2 (exec.c:1697)
==9345== by 0x427FD2: execpline (exec.c:1484)
==9345== by 0x42779A: execlist (exec.c:1275)
==9345== by 0x42717C: execode (exec.c:1073)
==9345== by 0x431299: runshfunc (exec.c:5040)
==9345== by 0x430E76: doshfunc (exec.c:4920)
==9345== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9345==
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9344-- Caught __NR_exit; running __libc_freeres()
==9344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9344-by-pythonnut-on-???
==9344== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9344-by-pythonnut-on-???
==9344== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9344-by-pythonnut-on-???
==9344==
==9344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9344== don't want to do, unless you know exactly what you're doing,
==9344== or are doing some strange experiment):
==9344== /usr/lib/valgrind/../../bin/vgdb --pid=9344 ...command...
==9344==
==9344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9344== /path/to/gdb ./zsh
==9344== and then give GDB the following command
==9344== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9344
==9344== --pid is optional if only one valgrind process is running
==9344==
--9344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9344==
==9344== HEAP SUMMARY:
==9344== in use at exit: 3,116,309 bytes in 68,953 blocks
==9344== total heap usage: 928,550 allocs, 859,597 frees, 65,609,907 bytes allocated
==9344==
==9344== Searching for pointers to 68,953 not-freed blocks
--9344-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9344-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9344-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9344-- Scanning root segment: 0x4037000..0x403afff (16384)
--9344-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9344-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9344-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9344-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9344-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9344-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9344-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9344-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9344-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9344-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9344-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9344-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9344-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9344-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9344-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9344-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9344-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9344-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9344-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9344-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9344-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9344-- Scanning root segment: 0x701a000..0x701afff (4096)
--9344-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9344-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9344-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9344-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9344-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9344-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9344-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9344-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9344-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9344== Checked 4,776,152 bytes
==9344==
==9344== LEAK SUMMARY:
==9344== definitely lost: 1,533 bytes in 8 blocks
==9344== indirectly lost: 6,756 bytes in 7 blocks
==9344== possibly lost: 0 bytes in 0 blocks
==9344== still reachable: 3,108,020 bytes in 68,938 blocks
==9344== suppressed: 0 bytes in 0 blocks
==9344== Rerun with --leak-check=full to see details of leaked memory
==9344==
==9344== Use --track-origins=yes to see where uninitialised values come from
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9344==
==9344== 1 errors in context 1 of 2:
==9344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9344== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9344== by 0x488CD0: stringsubst (subst.c:301)
==9344== by 0x48801B: prefork (subst.c:77)
==9344== by 0x42B318: execcmd (exec.c:2619)
==9344== by 0x428CA0: execpline2 (exec.c:1697)
==9344== by 0x427FD2: execpline (exec.c:1484)
==9344== by 0x427756: execlist (exec.c:1267)
==9344== by 0x42717C: execode (exec.c:1073)
==9344== by 0x431299: runshfunc (exec.c:5040)
==9344== by 0x430E76: doshfunc (exec.c:4920)
==9344== by 0x4302FB: execshfunc (exec.c:4557)
==9344== by 0x42D8C1: execcmd (exec.c:3373)
==9344==
==9344==
==9344== 2 errors in context 2 of 2:
==9344== Conditional jump or move depends on uninitialised value(s)
==9344== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9344== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9344== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9344== by 0x40EFC2: execbuiltin (builtin.c:450)
==9344== by 0x42D8E9: execcmd (exec.c:3378)
==9344== by 0x428CA0: execpline2 (exec.c:1697)
==9344== by 0x427FD2: execpline (exec.c:1484)
==9344== by 0x42779A: execlist (exec.c:1275)
==9344== by 0x42717C: execode (exec.c:1073)
==9344== by 0x431299: runshfunc (exec.c:5040)
==9344== by 0x430E76: doshfunc (exec.c:4920)
==9344== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9344==
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF214C, len 4
--9348-- Caught __NR_exit; running __libc_freeres()
==9348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9348-by-pythonnut-on-???
==9348== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9348-by-pythonnut-on-???
==9348== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9348-by-pythonnut-on-???
==9348==
==9348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9348== don't want to do, unless you know exactly what you're doing,
==9348== or are doing some strange experiment):
==9348== /usr/lib/valgrind/../../bin/vgdb --pid=9348 ...command...
==9348==
==9348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9348== /path/to/gdb ./zsh
==9348== and then give GDB the following command
==9348== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9348
==9348== --pid is optional if only one valgrind process is running
==9348==
--9348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9348==
==9348== HEAP SUMMARY:
==9348== in use at exit: 3,116,653 bytes in 68,958 blocks
==9348== total heap usage: 928,562 allocs, 859,604 frees, 65,615,233 bytes allocated
==9348==
==9348== Searching for pointers to 68,958 not-freed blocks
--9348-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9348-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9348-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9348-- Scanning root segment: 0x4037000..0x403afff (16384)
--9348-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9348-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9348-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9348-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9348-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9348-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9348-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9348-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9348-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9348-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9348-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9348-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9348-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9348-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9348-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9348-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9348-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9348-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9348-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9348-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9348-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9348-- Scanning root segment: 0x701a000..0x701afff (4096)
--9348-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9348-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9348-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9348-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9348-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9348-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9348-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9348-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9348-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9348== Checked 4,776,216 bytes
==9348==
==9348== LEAK SUMMARY:
==9348== definitely lost: 1,533 bytes in 8 blocks
==9348== indirectly lost: 6,756 bytes in 7 blocks
==9348== possibly lost: 0 bytes in 0 blocks
==9348== still reachable: 3,108,364 bytes in 68,943 blocks
==9348== suppressed: 0 bytes in 0 blocks
==9348== Rerun with --leak-check=full to see details of leaked memory
==9348==
==9348== Use --track-origins=yes to see where uninitialised values come from
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9348==
==9348== 1 errors in context 1 of 2:
==9348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9348== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9348== by 0x488CD0: stringsubst (subst.c:301)
==9348== by 0x48801B: prefork (subst.c:77)
==9348== by 0x42B318: execcmd (exec.c:2619)
==9348== by 0x428CA0: execpline2 (exec.c:1697)
==9348== by 0x427FD2: execpline (exec.c:1484)
==9348== by 0x427756: execlist (exec.c:1267)
==9348== by 0x42717C: execode (exec.c:1073)
==9348== by 0x431299: runshfunc (exec.c:5040)
==9348== by 0x430E76: doshfunc (exec.c:4920)
==9348== by 0x4302FB: execshfunc (exec.c:4557)
==9348== by 0x42D8C1: execcmd (exec.c:3373)
==9348==
==9348==
==9348== 2 errors in context 2 of 2:
==9348== Conditional jump or move depends on uninitialised value(s)
==9348== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9348== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9348== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9348== by 0x40EFC2: execbuiltin (builtin.c:450)
==9348== by 0x42D8E9: execcmd (exec.c:3378)
==9348== by 0x428CA0: execpline2 (exec.c:1697)
==9348== by 0x427FD2: execpline (exec.c:1484)
==9348== by 0x42779A: execlist (exec.c:1275)
==9348== by 0x42717C: execode (exec.c:1073)
==9348== by 0x431299: runshfunc (exec.c:5040)
==9348== by 0x430E76: doshfunc (exec.c:4920)
==9348== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9348==
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF1C9C, len 4
--9352-- Caught __NR_exit; running __libc_freeres()
==9352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9352-by-pythonnut-on-???
==9352== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9352-by-pythonnut-on-???
==9352== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9352-by-pythonnut-on-???
==9352==
==9352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9352== don't want to do, unless you know exactly what you're doing,
==9352== or are doing some strange experiment):
==9352== /usr/lib/valgrind/../../bin/vgdb --pid=9352 ...command...
==9352==
==9352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9352== /path/to/gdb ./zsh
==9352== and then give GDB the following command
==9352== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9352
==9352== --pid is optional if only one valgrind process is running
==9352==
--9352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9352==
==9352== HEAP SUMMARY:
==9352== in use at exit: 3,116,682 bytes in 68,959 blocks
==9352== total heap usage: 928,567 allocs, 859,608 frees, 65,617,374 bytes allocated
==9352==
==9352== Searching for pointers to 68,959 not-freed blocks
--9352-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9352-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9352-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9352-- Scanning root segment: 0x4037000..0x403afff (16384)
--9352-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9352-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9352-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9352-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9352-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9352-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9352-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9352-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9352-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9352-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9352-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9352-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9352-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9352-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9352-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9352-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9352-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9352-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9352-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9352-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9352-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9352-- Scanning root segment: 0x701a000..0x701afff (4096)
--9352-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9352-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9352-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9352-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9352-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9352-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9352-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9352-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9352-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9352== Checked 4,776,512 bytes
==9352==
==9352== LEAK SUMMARY:
==9352== definitely lost: 1,533 bytes in 8 blocks
==9352== indirectly lost: 6,756 bytes in 7 blocks
==9352== possibly lost: 0 bytes in 0 blocks
==9352== still reachable: 3,108,393 bytes in 68,944 blocks
==9352== suppressed: 0 bytes in 0 blocks
==9352== Rerun with --leak-check=full to see details of leaked memory
==9352==
==9352== Use --track-origins=yes to see where uninitialised values come from
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9352==
==9352== 1 errors in context 1 of 2:
==9352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9352== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9352== by 0x488CD0: stringsubst (subst.c:301)
==9352== by 0x48801B: prefork (subst.c:77)
==9352== by 0x42B318: execcmd (exec.c:2619)
==9352== by 0x428CA0: execpline2 (exec.c:1697)
==9352== by 0x427FD2: execpline (exec.c:1484)
==9352== by 0x427756: execlist (exec.c:1267)
==9352== by 0x42717C: execode (exec.c:1073)
==9352== by 0x431299: runshfunc (exec.c:5040)
==9352== by 0x430E76: doshfunc (exec.c:4920)
==9352== by 0x4302FB: execshfunc (exec.c:4557)
==9352== by 0x42D8C1: execcmd (exec.c:3373)
==9352==
==9352==
==9352== 2 errors in context 2 of 2:
==9352== Conditional jump or move depends on uninitialised value(s)
==9352== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9352== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9352== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9352== by 0x40EFC2: execbuiltin (builtin.c:450)
==9352== by 0x42D8E9: execcmd (exec.c:3378)
==9352== by 0x428CA0: execpline2 (exec.c:1697)
==9352== by 0x427FD2: execpline (exec.c:1484)
==9352== by 0x42779A: execlist (exec.c:1275)
==9352== by 0x42717C: execode (exec.c:1073)
==9352== by 0x431299: runshfunc (exec.c:5040)
==9352== by 0x430E76: doshfunc (exec.c:4920)
==9352== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9352==
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF261C, len 4
client request: code 4d430005, addr 0xFFEFF1F9C, len 4
--9320-- Caught __NR_exit; running __libc_freeres()
--9320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9320==
==9320== HEAP SUMMARY:
==9320== in use at exit: 3,114,682 bytes in 68,911 blocks
==9320== total heap usage: 928,576 allocs, 859,665 frees, 65,621,314 bytes allocated
==9320==
==9320== Searching for pointers to 68,911 not-freed blocks
--9320-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9320-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9320-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9320-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9320-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9320-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9320-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9320-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9320-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9320-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9320-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9320-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9320-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9320-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9320-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9320-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9320-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9320-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9320-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9320-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9320-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9320-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9320-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9320-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9320-- Scanning root segment: 0x701a000..0x701afff (4096)
--9320-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9320-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9320-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9320-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9320-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9320-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9320-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9320-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9320-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9320== Checked 4,754,216 bytes
==9320==
==9320== LEAK SUMMARY:
==9320== definitely lost: 1,533 bytes in 8 blocks
==9320== indirectly lost: 6,756 bytes in 7 blocks
==9320== possibly lost: 0 bytes in 0 blocks
==9320== still reachable: 3,106,393 bytes in 68,896 blocks
==9320== suppressed: 0 bytes in 0 blocks
==9320== Rerun with --leak-check=full to see details of leaked memory
==9320==
==9320== Use --track-origins=yes to see where uninitialised values come from
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320==
==9320== 1 errors in context 1 of 2:
==9320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9320== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9320== by 0x488CD0: stringsubst (subst.c:301)
==9320== by 0x48801B: prefork (subst.c:77)
==9320== by 0x42B318: execcmd (exec.c:2619)
==9320== by 0x428CA0: execpline2 (exec.c:1697)
==9320== by 0x427FD2: execpline (exec.c:1484)
==9320== by 0x427756: execlist (exec.c:1267)
==9320== by 0x42717C: execode (exec.c:1073)
==9320== by 0x431299: runshfunc (exec.c:5040)
==9320== by 0x430E76: doshfunc (exec.c:4920)
==9320== by 0x4302FB: execshfunc (exec.c:4557)
==9320== by 0x42D8C1: execcmd (exec.c:3373)
==9320==
==9320==
==9320== 2 errors in context 2 of 2:
==9320== Conditional jump or move depends on uninitialised value(s)
==9320== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9320== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9320== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9320== by 0x40EFC2: execbuiltin (builtin.c:450)
==9320== by 0x42D8E9: execcmd (exec.c:3378)
==9320== by 0x428CA0: execpline2 (exec.c:1697)
==9320== by 0x427FD2: execpline (exec.c:1484)
==9320== by 0x42779A: execlist (exec.c:1275)
==9320== by 0x42717C: execode (exec.c:1073)
==9320== by 0x431299: runshfunc (exec.c:5040)
==9320== by 0x430E76: doshfunc (exec.c:4920)
==9320== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9320==
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9356-by-pythonnut-on-???
==9356== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9356-by-pythonnut-on-???
==9356== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9356-by-pythonnut-on-???
==9356==
==9356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9356== don't want to do, unless you know exactly what you're doing,
==9356== or are doing some strange experiment):
==9356== /usr/lib/valgrind/../../bin/vgdb --pid=9356 ...command...
==9356==
==9356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9356== /path/to/gdb ./zsh
==9356== and then give GDB the following command
==9356== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9356
==9356== --pid is optional if only one valgrind process is running
==9356==
==9357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9357-by-pythonnut-on-???
==9357== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9357-by-pythonnut-on-???
==9357== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9357-by-pythonnut-on-???
==9357==
==9357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9357== don't want to do, unless you know exactly what you're doing,
==9357== or are doing some strange experiment):
==9357== /usr/lib/valgrind/../../bin/vgdb --pid=9357 ...command...
==9357==
==9357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9357== /path/to/gdb ./zsh
==9357== and then give GDB the following command
==9357== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9357
==9357== --pid is optional if only one valgrind process is running
==9357==
client request: code 4d430005, addr 0xFFEFF07BC, len 4
==9358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9358-by-pythonnut-on-???
==9358== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9358-by-pythonnut-on-???
==9358== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9358-by-pythonnut-on-???
==9358==
==9358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9358== don't want to do, unless you know exactly what you're doing,
==9358== or are doing some strange experiment):
==9358== /usr/lib/valgrind/../../bin/vgdb --pid=9358 ...command...
==9358==
==9358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9358== /path/to/gdb ./zsh
==9358== and then give GDB the following command
==9358== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9358
==9358== --pid is optional if only one valgrind process is running
==9358==
--9358-- Caught __NR_exit; running __libc_freeres()
--9358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9358==
==9358== HEAP SUMMARY:
==9358== in use at exit: 3,116,493 bytes in 68,958 blocks
==9358== total heap usage: 928,535 allocs, 859,577 frees, 65,599,493 bytes allocated
==9358==
==9358== Searching for pointers to 68,958 not-freed blocks
--9358-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9358-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9358-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9358-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9358-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9358-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9358-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9358-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9358-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9358-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9358-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9358-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9358-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9358-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9358-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9358-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9358-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9358-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9358-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9358-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9358-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9358-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9358-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9358-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9358-- Scanning root segment: 0x701a000..0x701afff (4096)
--9358-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9358-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9358-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9358-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9358-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9358-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9358-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9358-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9358-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9358== Checked 4,760,024 bytes
==9358==
==9358== LEAK SUMMARY:
==9358== definitely lost: 1,533 bytes in 8 blocks
==9358== indirectly lost: 6,756 bytes in 7 blocks
==9358== possibly lost: 0 bytes in 0 blocks
==9358== still reachable: 3,108,204 bytes in 68,943 blocks
==9358== suppressed: 0 bytes in 0 blocks
==9358== Rerun with --leak-check=full to see details of leaked memory
==9358==
==9358== Use --track-origins=yes to see where uninitialised values come from
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9358==
==9358== 1 errors in context 1 of 2:
==9358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9358== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9358== by 0x488CD0: stringsubst (subst.c:301)
==9358== by 0x48801B: prefork (subst.c:77)
==9358== by 0x42B318: execcmd (exec.c:2619)
==9358== by 0x428CA0: execpline2 (exec.c:1697)
==9358== by 0x427FD2: execpline (exec.c:1484)
==9358== by 0x427756: execlist (exec.c:1267)
==9358== by 0x42717C: execode (exec.c:1073)
==9358== by 0x431299: runshfunc (exec.c:5040)
==9358== by 0x430E76: doshfunc (exec.c:4920)
==9358== by 0x4302FB: execshfunc (exec.c:4557)
==9358== by 0x42D8C1: execcmd (exec.c:3373)
==9358==
==9358==
==9358== 2 errors in context 2 of 2:
==9358== Conditional jump or move depends on uninitialised value(s)
==9358== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9358== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9358== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9358== by 0x40EFC2: execbuiltin (builtin.c:450)
==9358== by 0x42D8E9: execcmd (exec.c:3378)
==9358== by 0x428CA0: execpline2 (exec.c:1697)
==9358== by 0x427FD2: execpline (exec.c:1484)
==9358== by 0x42779A: execlist (exec.c:1275)
==9358== by 0x42717C: execode (exec.c:1073)
==9358== by 0x431299: runshfunc (exec.c:5040)
==9358== by 0x430E76: doshfunc (exec.c:4920)
==9358== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9358==
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9361-- Caught __NR_exit; running __libc_freeres()
==9361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9361-by-pythonnut-on-???
==9361== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9361-by-pythonnut-on-???
==9361== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9361-by-pythonnut-on-???
==9361==
==9361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9361== don't want to do, unless you know exactly what you're doing,
==9361== or are doing some strange experiment):
==9361== /usr/lib/valgrind/../../bin/vgdb --pid=9361 ...command...
==9361==
==9361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9361== /path/to/gdb ./zsh
==9361== and then give GDB the following command
==9361== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9361
==9361== --pid is optional if only one valgrind process is running
==9361==
==9362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9362-by-pythonnut-on-???
==9362== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9362-by-pythonnut-on-???
==9362== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9362-by-pythonnut-on-???
==9362==
==9362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9362== don't want to do, unless you know exactly what you're doing,
==9362== or are doing some strange experiment):
==9362== /usr/lib/valgrind/../../bin/vgdb --pid=9362 ...command...
==9362==
==9362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9362== /path/to/gdb ./zsh
==9362== and then give GDB the following command
==9362== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9362
==9362== --pid is optional if only one valgrind process is running
==9362==
client request: code 4d430005, addr 0xFFEFF13BC, len 4
--9361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9361==
==9361== HEAP SUMMARY:
==9361== in use at exit: 3,153,384 bytes in 68,966 blocks
==9361== total heap usage: 928,543 allocs, 859,577 frees, 65,639,440 bytes allocated
==9361==
==9361== Searching for pointers to 68,966 not-freed blocks
--9361-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9361-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9361-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9361-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9361-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9361-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9361-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9361-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9361-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9361-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9361-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9361-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9361-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9361-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9361-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9361-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9361-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9361-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9361-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9361-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9361-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9361-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9361-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9361-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9361-- Scanning root segment: 0x701a000..0x701afff (4096)
--9361-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9361-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9361-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9361-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9361-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9361-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9361-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9361-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9361-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9361== Checked 4,871,832 bytes
==9361==
==9361== LEAK SUMMARY:
==9361== definitely lost: 1,533 bytes in 8 blocks
==9361== indirectly lost: 6,756 bytes in 7 blocks
==9361== possibly lost: 0 bytes in 0 blocks
==9361== still reachable: 3,145,095 bytes in 68,951 blocks
==9361== suppressed: 0 bytes in 0 blocks
==9361== Rerun with --leak-check=full to see details of leaked memory
==9361==
==9361== Use --track-origins=yes to see where uninitialised values come from
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9361==
==9361== 1 errors in context 1 of 2:
==9361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9361== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9361== by 0x488CD0: stringsubst (subst.c:301)
==9361== by 0x48801B: prefork (subst.c:77)
==9361== by 0x42B318: execcmd (exec.c:2619)
==9361== by 0x428CA0: execpline2 (exec.c:1697)
==9361== by 0x427FD2: execpline (exec.c:1484)
==9361== by 0x427756: execlist (exec.c:1267)
==9361== by 0x42717C: execode (exec.c:1073)
==9361== by 0x431299: runshfunc (exec.c:5040)
==9361== by 0x430E76: doshfunc (exec.c:4920)
==9361== by 0x4302FB: execshfunc (exec.c:4557)
==9361== by 0x42D8C1: execcmd (exec.c:3373)
==9361==
==9361==
==9361== 2 errors in context 2 of 2:
==9361== Conditional jump or move depends on uninitialised value(s)
==9361== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9361== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9361== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9361== by 0x40EFC2: execbuiltin (builtin.c:450)
==9361== by 0x42D8E9: execcmd (exec.c:3378)
==9361== by 0x428CA0: execpline2 (exec.c:1697)
==9361== by 0x427FD2: execpline (exec.c:1484)
==9361== by 0x42779A: execlist (exec.c:1275)
==9361== by 0x42717C: execode (exec.c:1073)
==9361== by 0x431299: runshfunc (exec.c:5040)
==9361== by 0x430E76: doshfunc (exec.c:4920)
==9361== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9361==
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9360-by-pythonnut-on-???
==9360== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9360-by-pythonnut-on-???
==9360== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9360-by-pythonnut-on-???
==9360==
==9360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9360== don't want to do, unless you know exactly what you're doing,
==9360== or are doing some strange experiment):
==9360== /usr/lib/valgrind/../../bin/vgdb --pid=9360 ...command...
==9360==
==9360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9360== /path/to/gdb ./zsh
==9360== and then give GDB the following command
==9360== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9360
==9360== --pid is optional if only one valgrind process is running
==9360==
--9360-- Caught __NR_exit; running __libc_freeres()
--9360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9360==
==9360== HEAP SUMMARY:
==9360== in use at exit: 3,153,320 bytes in 68,963 blocks
==9360== total heap usage: 928,545 allocs, 859,582 frees, 65,639,984 bytes allocated
==9360==
==9360== Searching for pointers to 68,963 not-freed blocks
--9360-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9360-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9360-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9360-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9360-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9360-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9360-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9360-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9360-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9360-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9360-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9360-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9360-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9360-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9360-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9360-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9360-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9360-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9360-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9360-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9360-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9360-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9360-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9360-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9360-- Scanning root segment: 0x701a000..0x701afff (4096)
--9360-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9360-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9360-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9360-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9360-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9360-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9360-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9360-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9360-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9360== Checked 4,871,168 bytes
==9360==
==9360== LEAK SUMMARY:
==9360== definitely lost: 1,533 bytes in 8 blocks
==9360== indirectly lost: 6,756 bytes in 7 blocks
==9360== possibly lost: 0 bytes in 0 blocks
==9360== still reachable: 3,145,031 bytes in 68,948 blocks
==9360== suppressed: 0 bytes in 0 blocks
==9360== Rerun with --leak-check=full to see details of leaked memory
==9360==
==9360== Use --track-origins=yes to see where uninitialised values come from
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360==
==9360== 1 errors in context 1 of 2:
==9360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9360== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9360== by 0x488CD0: stringsubst (subst.c:301)
==9360== by 0x48801B: prefork (subst.c:77)
==9360== by 0x42B318: execcmd (exec.c:2619)
==9360== by 0x428CA0: execpline2 (exec.c:1697)
==9360== by 0x427FD2: execpline (exec.c:1484)
==9360== by 0x427756: execlist (exec.c:1267)
==9360== by 0x42717C: execode (exec.c:1073)
==9360== by 0x431299: runshfunc (exec.c:5040)
==9360== by 0x430E76: doshfunc (exec.c:4920)
==9360== by 0x4302FB: execshfunc (exec.c:4557)
==9360== by 0x42D8C1: execcmd (exec.c:3373)
==9360==
==9360==
==9360== 2 errors in context 2 of 2:
==9360== Conditional jump or move depends on uninitialised value(s)
==9360== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9360== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9360== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9360== by 0x40EFC2: execbuiltin (builtin.c:450)
==9360== by 0x42D8E9: execcmd (exec.c:3378)
==9360== by 0x428CA0: execpline2 (exec.c:1697)
==9360== by 0x427FD2: execpline (exec.c:1484)
==9360== by 0x42779A: execlist (exec.c:1275)
==9360== by 0x42717C: execode (exec.c:1073)
==9360== by 0x431299: runshfunc (exec.c:5040)
==9360== by 0x430E76: doshfunc (exec.c:4920)
==9360== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9360==
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9365-by-pythonnut-on-???
==9365== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9365-by-pythonnut-on-???
==9365== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9365-by-pythonnut-on-???
==9365==
==9365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9365== don't want to do, unless you know exactly what you're doing,
==9365== or are doing some strange experiment):
==9365== /usr/lib/valgrind/../../bin/vgdb --pid=9365 ...command...
==9365==
==9365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9365== /path/to/gdb ./zsh
==9365== and then give GDB the following command
==9365== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9365
==9365== --pid is optional if only one valgrind process is running
==9365==
==9366== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9366-by-pythonnut-on-???
==9366== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9366-by-pythonnut-on-???
==9366== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9366-by-pythonnut-on-???
==9366==
==9366== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9366== don't want to do, unless you know exactly what you're doing,
==9366== or are doing some strange experiment):
==9366== /usr/lib/valgrind/../../bin/vgdb --pid=9366 ...command...
==9366==
==9366== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9366== /path/to/gdb ./zsh
==9366== and then give GDB the following command
==9366== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9366
==9366== --pid is optional if only one valgrind process is running
==9366==
--9366-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF13BC, len 4
--9366-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9366==
==9366== HEAP SUMMARY:
==9366== in use at exit: 3,190,030 bytes in 68,969 blocks
==9366== total heap usage: 928,552 allocs, 859,583 frees, 65,678,267 bytes allocated
==9366==
==9366== Searching for pointers to 68,969 not-freed blocks
--9366-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9366-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9366-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9366-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9366-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9366-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9366-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9366-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9366-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9366-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9366-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9366-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9366-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9366-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9366-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9366-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9366-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9366-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9366-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9366-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9366-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9366-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9366-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9366-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9366-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9366-- Scanning root segment: 0x701a000..0x701afff (4096)
--9366-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9366-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9366-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9366-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9366-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9366-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9366-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9366-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9366-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9366== Checked 4,945,352 bytes
==9366==
==9366== LEAK SUMMARY:
==9366== definitely lost: 1,533 bytes in 8 blocks
==9366== indirectly lost: 6,756 bytes in 7 blocks
==9366== possibly lost: 0 bytes in 0 blocks
==9366== still reachable: 3,181,741 bytes in 68,954 blocks
==9366== suppressed: 0 bytes in 0 blocks
==9366== Rerun with --leak-check=full to see details of leaked memory
==9366==
==9366== Use --track-origins=yes to see where uninitialised values come from
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9366==
==9366== 1 errors in context 1 of 2:
==9366== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9366== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9366== by 0x488CD0: stringsubst (subst.c:301)
==9366== by 0x48801B: prefork (subst.c:77)
==9366== by 0x42B318: execcmd (exec.c:2619)
==9366== by 0x428CA0: execpline2 (exec.c:1697)
==9366== by 0x427FD2: execpline (exec.c:1484)
==9366== by 0x427756: execlist (exec.c:1267)
==9366== by 0x42717C: execode (exec.c:1073)
==9366== by 0x431299: runshfunc (exec.c:5040)
==9366== by 0x430E76: doshfunc (exec.c:4920)
==9366== by 0x4302FB: execshfunc (exec.c:4557)
==9366== by 0x42D8C1: execcmd (exec.c:3373)
==9366==
==9366==
==9366== 2 errors in context 2 of 2:
==9366== Conditional jump or move depends on uninitialised value(s)
==9366== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9366== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9366== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9366== by 0x40EFC2: execbuiltin (builtin.c:450)
==9366== by 0x42D8E9: execcmd (exec.c:3378)
==9366== by 0x428CA0: execpline2 (exec.c:1697)
==9366== by 0x427FD2: execpline (exec.c:1484)
==9366== by 0x42779A: execlist (exec.c:1275)
==9366== by 0x42717C: execode (exec.c:1073)
==9366== by 0x431299: runshfunc (exec.c:5040)
==9366== by 0x430E76: doshfunc (exec.c:4920)
==9366== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9366==
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9365-- Caught __NR_exit; running __libc_freeres()
--9365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9365==
==9365== HEAP SUMMARY:
==9365== in use at exit: 3,153,390 bytes in 68,966 blocks
==9365== total heap usage: 928,555 allocs, 859,589 frees, 65,678,843 bytes allocated
==9365==
==9365== Searching for pointers to 68,966 not-freed blocks
--9365-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9365-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9365-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9365-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9365-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9365-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9365-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9365-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9365-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9365-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9365-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9365-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9365-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9365-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9365-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9365-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9365-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9365-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9365-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9365-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9365-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9365-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9365-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9365-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9365-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9365-- Scanning root segment: 0x701a000..0x701afff (4096)
--9365-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9365-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9365-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9365-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9365-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9365-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9365-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9365-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9365-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9365== Checked 4,908,096 bytes
==9365==
==9365== LEAK SUMMARY:
==9365== definitely lost: 1,533 bytes in 8 blocks
==9365== indirectly lost: 6,756 bytes in 7 blocks
==9365== possibly lost: 0 bytes in 0 blocks
==9365== still reachable: 3,145,101 bytes in 68,951 blocks
==9365== suppressed: 0 bytes in 0 blocks
==9365== Rerun with --leak-check=full to see details of leaked memory
==9365==
==9365== Use --track-origins=yes to see where uninitialised values come from
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365==
==9365== 1 errors in context 1 of 2:
==9365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9365== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9365== by 0x488CD0: stringsubst (subst.c:301)
==9365== by 0x48801B: prefork (subst.c:77)
==9365== by 0x42B318: execcmd (exec.c:2619)
==9365== by 0x428CA0: execpline2 (exec.c:1697)
==9365== by 0x427FD2: execpline (exec.c:1484)
==9365== by 0x427756: execlist (exec.c:1267)
==9365== by 0x42717C: execode (exec.c:1073)
==9365== by 0x431299: runshfunc (exec.c:5040)
==9365== by 0x430E76: doshfunc (exec.c:4920)
==9365== by 0x4302FB: execshfunc (exec.c:4557)
==9365== by 0x42D8C1: execcmd (exec.c:3373)
==9365==
==9365==
==9365== 2 errors in context 2 of 2:
==9365== Conditional jump or move depends on uninitialised value(s)
==9365== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9365== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9365== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9365== by 0x40EFC2: execbuiltin (builtin.c:450)
==9365== by 0x42D8E9: execcmd (exec.c:3378)
==9365== by 0x428CA0: execpline2 (exec.c:1697)
==9365== by 0x427FD2: execpline (exec.c:1484)
==9365== by 0x42779A: execlist (exec.c:1275)
==9365== by 0x42717C: execode (exec.c:1073)
==9365== by 0x431299: runshfunc (exec.c:5040)
==9365== by 0x430E76: doshfunc (exec.c:4920)
==9365== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9365==
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9369-by-pythonnut-on-???
==9369== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9369-by-pythonnut-on-???
==9369== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9369-by-pythonnut-on-???
==9369==
==9369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9369== don't want to do, unless you know exactly what you're doing,
==9369== or are doing some strange experiment):
==9369== /usr/lib/valgrind/../../bin/vgdb --pid=9369 ...command...
==9369==
==9369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9369== /path/to/gdb ./zsh
==9369== and then give GDB the following command
==9369== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9369
==9369== --pid is optional if only one valgrind process is running
==9369==
--9369-- Caught __NR_exit; running __libc_freeres()
==9368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9368-by-pythonnut-on-???
==9368== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9368-by-pythonnut-on-???
==9368== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9368-by-pythonnut-on-???
==9368==
==9368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9368== don't want to do, unless you know exactly what you're doing,
==9368== or are doing some strange experiment):
==9368== /usr/lib/valgrind/../../bin/vgdb --pid=9368 ...command...
==9368==
==9368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9368== /path/to/gdb ./zsh
==9368== and then give GDB the following command
==9368== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9368
==9368== --pid is optional if only one valgrind process is running
==9368==
--9369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9369==
==9369== HEAP SUMMARY:
==9369== in use at exit: 3,154,075 bytes in 68,972 blocks
==9369== total heap usage: 928,564 allocs, 859,592 frees, 65,646,288 bytes allocated
==9369==
==9369== Searching for pointers to 68,972 not-freed blocks
--9369-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9369-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9369-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9369-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9369-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9369-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9369-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9369-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9369-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9369-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9369-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9369-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9369-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9369-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9369-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9369-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9369-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9369-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9369-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9369-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9369-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9369-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9369-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9369-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9369-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9369-- Scanning root segment: 0x701a000..0x701afff (4096)
--9369-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9369-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9369-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9369-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9369-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9369-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9369-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9369-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9369-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9369== Checked 4,888,648 bytes
==9369==
==9369== LEAK SUMMARY:
==9369== definitely lost: 1,533 bytes in 8 blocks
==9369== indirectly lost: 6,756 bytes in 7 blocks
==9369== possibly lost: 0 bytes in 0 blocks
==9369== still reachable: 3,145,786 bytes in 68,957 blocks
==9369== suppressed: 0 bytes in 0 blocks
==9369== Rerun with --leak-check=full to see details of leaked memory
==9369==
==9369== Use --track-origins=yes to see where uninitialised values come from
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369==
==9369== 1 errors in context 1 of 2:
==9369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9369== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9369== by 0x488CD0: stringsubst (subst.c:301)
==9369== by 0x48801B: prefork (subst.c:77)
==9369== by 0x42B318: execcmd (exec.c:2619)
==9369== by 0x428CA0: execpline2 (exec.c:1697)
==9369== by 0x427FD2: execpline (exec.c:1484)
==9369== by 0x427756: execlist (exec.c:1267)
==9369== by 0x42717C: execode (exec.c:1073)
==9369== by 0x431299: runshfunc (exec.c:5040)
==9369== by 0x430E76: doshfunc (exec.c:4920)
==9369== by 0x4302FB: execshfunc (exec.c:4557)
==9369== by 0x42D8C1: execcmd (exec.c:3373)
==9369==
==9369==
==9369== 2 errors in context 2 of 2:
==9369== Conditional jump or move depends on uninitialised value(s)
==9369== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9369== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9369== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9369== by 0x40EFC2: execbuiltin (builtin.c:450)
==9369== by 0x42D8E9: execcmd (exec.c:3378)
==9369== by 0x428CA0: execpline2 (exec.c:1697)
==9369== by 0x427FD2: execpline (exec.c:1484)
==9369== by 0x42779A: execlist (exec.c:1275)
==9369== by 0x42717C: execode (exec.c:1073)
==9369== by 0x431299: runshfunc (exec.c:5040)
==9369== by 0x430E76: doshfunc (exec.c:4920)
==9369== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9369==
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9368-- Caught __NR_exit; running __libc_freeres()
--9368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9368==
==9368== HEAP SUMMARY:
==9368== in use at exit: 3,153,968 bytes in 68,972 blocks
==9368== total heap usage: 928,601 allocs, 859,629 frees, 65,655,829 bytes allocated
==9368==
==9368== Searching for pointers to 68,972 not-freed blocks
--9368-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9368-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9368-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9368-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9368-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9368-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9368-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9368-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9368-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9368-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9368-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9368-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9368-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9368-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9368-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9368-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9368-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9368-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9368-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9368-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9368-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9368-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9368-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9368-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9368-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9368-- Scanning root segment: 0x701a000..0x701afff (4096)
--9368-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9368-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9368-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9368-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9368-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9368-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9368-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9368-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9368-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9368== Checked 4,887,960 bytes
==9368==
==9368== LEAK SUMMARY:
==9368== definitely lost: 1,533 bytes in 8 blocks
==9368== indirectly lost: 6,756 bytes in 7 blocks
==9368== possibly lost: 0 bytes in 0 blocks
==9368== still reachable: 3,145,679 bytes in 68,957 blocks
==9368== suppressed: 0 bytes in 0 blocks
==9368== Rerun with --leak-check=full to see details of leaked memory
==9368==
==9368== Use --track-origins=yes to see where uninitialised values come from
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9368==
==9368== 1 errors in context 1 of 2:
==9368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9368== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9368== by 0x488CD0: stringsubst (subst.c:301)
==9368== by 0x48801B: prefork (subst.c:77)
==9368== by 0x42B318: execcmd (exec.c:2619)
==9368== by 0x428CA0: execpline2 (exec.c:1697)
==9368== by 0x427FD2: execpline (exec.c:1484)
==9368== by 0x427756: execlist (exec.c:1267)
==9368== by 0x42717C: execode (exec.c:1073)
==9368== by 0x431299: runshfunc (exec.c:5040)
==9368== by 0x430E76: doshfunc (exec.c:4920)
==9368== by 0x4302FB: execshfunc (exec.c:4557)
==9368== by 0x42D8C1: execcmd (exec.c:3373)
==9368==
==9368==
==9368== 2 errors in context 2 of 2:
==9368== Conditional jump or move depends on uninitialised value(s)
==9368== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9368== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9368== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9368== by 0x40EFC2: execbuiltin (builtin.c:450)
==9368== by 0x42D8E9: execcmd (exec.c:3378)
==9368== by 0x428CA0: execpline2 (exec.c:1697)
==9368== by 0x427FD2: execpline (exec.c:1484)
==9368== by 0x42779A: execlist (exec.c:1275)
==9368== by 0x42717C: execode (exec.c:1073)
==9368== by 0x431299: runshfunc (exec.c:5040)
==9368== by 0x430E76: doshfunc (exec.c:4920)
==9368== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9368==
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9370-by-pythonnut-on-???
==9370== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9370-by-pythonnut-on-???
==9370== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9370-by-pythonnut-on-???
==9370==
==9370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9370== don't want to do, unless you know exactly what you're doing,
==9370== or are doing some strange experiment):
==9370== /usr/lib/valgrind/../../bin/vgdb --pid=9370 ...command...
==9370==
==9370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9370== /path/to/gdb ./zsh
==9370== and then give GDB the following command
==9370== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9370
==9370== --pid is optional if only one valgrind process is running
==9370==
--9370-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF1A3C, len 4
--9370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9371-- Caught __NR_exit; running __libc_freeres()
==9370==
==9370== HEAP SUMMARY:
==9370== in use at exit: 3,117,760 bytes in 68,972 blocks
==9370== total heap usage: 928,573 allocs, 859,601 frees, 65,650,504 bytes allocated
==9370==
==9371== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9371-by-pythonnut-on-???
==9371== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9371-by-pythonnut-on-???
==9371== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9371-by-pythonnut-on-???
==9371==
==9371== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9371== don't want to do, unless you know exactly what you're doing,
==9371== or are doing some strange experiment):
==9371== /usr/lib/valgrind/../../bin/vgdb --pid=9371 ...command...
==9371==
==9371== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9371== /path/to/gdb ./zsh
==9371== and then give GDB the following command
==9371== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9371
==9371== --pid is optional if only one valgrind process is running
==9371==
--9371-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9370== Searching for pointers to 68,972 not-freed blocks
--9370-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9370-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9370-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9370-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9370-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9370-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9370-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9370-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9370-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9370-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9370-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9370-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9370-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9370-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9370-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9370-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9370-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9370-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9370-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9370-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9370-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9370-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9370-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9370-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9370-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9370-- Scanning root segment: 0x701a000..0x701afff (4096)
--9370-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9370-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9370-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9370-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9370-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9370-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9370-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9370-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9370-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9371==
==9371== HEAP SUMMARY:
==9371== in use at exit: 3,117,504 bytes in 68,972 blocks
==9371== total heap usage: 928,579 allocs, 859,607 frees, 65,652,624 bytes allocated
==9371==
==9371== Searching for pointers to 68,972 not-freed blocks
--9371-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9371-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9371-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9371-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9371-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9371-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9371-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9371-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9371-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9371-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9371-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9371-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9371-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9371-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9371-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9371-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9371-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9371-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9371-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9371-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9371-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9371-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9371-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9371-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9371-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9371-- Scanning root segment: 0x701a000..0x701afff (4096)
--9371-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9371-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9371-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9371-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9371-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9371-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9371-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9371-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9371-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9370== Checked 4,851,320 bytes
==9370==
==9370== LEAK SUMMARY:
==9370== definitely lost: 1,533 bytes in 8 blocks
==9370== indirectly lost: 6,756 bytes in 7 blocks
==9370== possibly lost: 0 bytes in 0 blocks
==9370== still reachable: 3,109,471 bytes in 68,957 blocks
==9370== suppressed: 0 bytes in 0 blocks
==9370== Rerun with --leak-check=full to see details of leaked memory
==9370==
==9370== Use --track-origins=yes to see where uninitialised values come from
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370==
==9370== 1 errors in context 1 of 2:
==9370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9370== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9370== by 0x488CD0: stringsubst (subst.c:301)
==9370== by 0x48801B: prefork (subst.c:77)
==9370== by 0x42B318: execcmd (exec.c:2619)
==9370== by 0x428CA0: execpline2 (exec.c:1697)
==9370== by 0x427FD2: execpline (exec.c:1484)
==9370== by 0x427756: execlist (exec.c:1267)
==9370== by 0x42717C: execode (exec.c:1073)
==9370== by 0x431299: runshfunc (exec.c:5040)
==9370== by 0x430E76: doshfunc (exec.c:4920)
==9370== by 0x4302FB: execshfunc (exec.c:4557)
==9370== by 0x42D8C1: execcmd (exec.c:3373)
==9370==
==9370==
==9370== 2 errors in context 2 of 2:
==9370== Conditional jump or move depends on uninitialised value(s)
==9370== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9370== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9370== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9370== by 0x40EFC2: execbuiltin (builtin.c:450)
==9370== by 0x42D8E9: execcmd (exec.c:3378)
==9370== by 0x428CA0: execpline2 (exec.c:1697)
==9370== by 0x427FD2: execpline (exec.c:1484)
==9370== by 0x42779A: execlist (exec.c:1275)
==9370== by 0x42717C: execode (exec.c:1073)
==9370== by 0x431299: runshfunc (exec.c:5040)
==9370== by 0x430E76: doshfunc (exec.c:4920)
==9370== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9370==
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371== Checked 4,851,168 bytes
==9371==
==9371== LEAK SUMMARY:
==9371== definitely lost: 1,557 bytes in 9 blocks
==9371== indirectly lost: 6,796 bytes in 9 blocks
==9371== possibly lost: 0 bytes in 0 blocks
==9371== still reachable: 3,109,151 bytes in 68,954 blocks
==9371== suppressed: 0 bytes in 0 blocks
==9371== Rerun with --leak-check=full to see details of leaked memory
==9371==
==9371== Use --track-origins=yes to see where uninitialised values come from
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371==
==9371== 1 errors in context 1 of 2:
==9371== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9371== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9371== by 0x488CD0: stringsubst (subst.c:301)
==9371== by 0x48801B: prefork (subst.c:77)
==9371== by 0x42B318: execcmd (exec.c:2619)
==9371== by 0x428CA0: execpline2 (exec.c:1697)
==9371== by 0x427FD2: execpline (exec.c:1484)
==9371== by 0x427756: execlist (exec.c:1267)
==9371== by 0x42717C: execode (exec.c:1073)
==9371== by 0x431299: runshfunc (exec.c:5040)
==9371== by 0x430E76: doshfunc (exec.c:4920)
==9371== by 0x4302FB: execshfunc (exec.c:4557)
==9371== by 0x42D8C1: execcmd (exec.c:3373)
==9371==
==9371==
==9371== 2 errors in context 2 of 2:
==9371== Conditional jump or move depends on uninitialised value(s)
==9371== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9371== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9371== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9371== by 0x40EFC2: execbuiltin (builtin.c:450)
==9371== by 0x42D8E9: execcmd (exec.c:3378)
==9371== by 0x428CA0: execpline2 (exec.c:1697)
==9371== by 0x427FD2: execpline (exec.c:1484)
==9371== by 0x42779A: execlist (exec.c:1275)
==9371== by 0x42717C: execode (exec.c:1073)
==9371== by 0x431299: runshfunc (exec.c:5040)
==9371== by 0x430E76: doshfunc (exec.c:4920)
==9371== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9371==
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9373-by-pythonnut-on-???
==9373== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9373-by-pythonnut-on-???
==9373== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9373-by-pythonnut-on-???
==9373==
==9373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9373== don't want to do, unless you know exactly what you're doing,
==9373== or are doing some strange experiment):
==9373== /usr/lib/valgrind/../../bin/vgdb --pid=9373 ...command...
==9373==
==9373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9373== /path/to/gdb ./zsh
==9373== and then give GDB the following command
==9373== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9373
==9373== --pid is optional if only one valgrind process is running
==9373==
client request: code 4d430005, addr 0xFFEFF23BC, len 4
--9357-- Caught __NR_exit; running __libc_freeres()
--9357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9357==
==9357== HEAP SUMMARY:
==9357== in use at exit: 3,116,086 bytes in 68,949 blocks
==9357== total heap usage: 928,580 allocs, 859,631 frees, 65,653,192 bytes allocated
==9357==
==9357== Searching for pointers to 68,949 not-freed blocks
--9357-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9357-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9357-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9357-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9357-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9357-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9357-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9357-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9357-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9357-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9357-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9357-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9357-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9357-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9357-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9357-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9357-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9357-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9357-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9357-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9357-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9357-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9357-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9357-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9357-- Scanning root segment: 0x701a000..0x701afff (4096)
--9357-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9357-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9357-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9357-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9357-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9357-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9357-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9357-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9357-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9357== Checked 4,757,568 bytes
==9357==
==9357== LEAK SUMMARY:
==9357== definitely lost: 1,533 bytes in 8 blocks
==9357== indirectly lost: 6,756 bytes in 7 blocks
==9357== possibly lost: 0 bytes in 0 blocks
==9357== still reachable: 3,107,797 bytes in 68,934 blocks
==9357== suppressed: 0 bytes in 0 blocks
==9357== Rerun with --leak-check=full to see details of leaked memory
==9357==
==9357== Use --track-origins=yes to see where uninitialised values come from
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9357==
==9357== 1 errors in context 1 of 2:
==9357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9357== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9357== by 0x488CD0: stringsubst (subst.c:301)
==9357== by 0x48801B: prefork (subst.c:77)
==9357== by 0x42B318: execcmd (exec.c:2619)
==9357== by 0x428CA0: execpline2 (exec.c:1697)
==9357== by 0x427FD2: execpline (exec.c:1484)
==9357== by 0x427756: execlist (exec.c:1267)
==9357== by 0x42717C: execode (exec.c:1073)
==9357== by 0x431299: runshfunc (exec.c:5040)
==9357== by 0x430E76: doshfunc (exec.c:4920)
==9357== by 0x4302FB: execshfunc (exec.c:4557)
==9357== by 0x42D8C1: execcmd (exec.c:3373)
==9357==
==9357==
==9357== 2 errors in context 2 of 2:
==9357== Conditional jump or move depends on uninitialised value(s)
==9357== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9357== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9357== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9357== by 0x40EFC2: execbuiltin (builtin.c:450)
==9357== by 0x42D8E9: execcmd (exec.c:3378)
==9357== by 0x428CA0: execpline2 (exec.c:1697)
==9357== by 0x427FD2: execpline (exec.c:1484)
==9357== by 0x42779A: execlist (exec.c:1275)
==9357== by 0x42717C: execode (exec.c:1073)
==9357== by 0x431299: runshfunc (exec.c:5040)
==9357== by 0x430E76: doshfunc (exec.c:4920)
==9357== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9357==
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9377-by-pythonnut-on-???
==9377== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9377-by-pythonnut-on-???
==9377== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9377-by-pythonnut-on-???
==9377==
==9377== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9377== don't want to do, unless you know exactly what you're doing,
==9377== or are doing some strange experiment):
==9377== /usr/lib/valgrind/../../bin/vgdb --pid=9377 ...command...
==9377==
==9377== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9377== /path/to/gdb ./zsh
==9377== and then give GDB the following command
==9377== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9377
==9377== --pid is optional if only one valgrind process is running
==9377==
--9377-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF2CEC, len 4
==9379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9379-by-pythonnut-on-???
==9379== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9379-by-pythonnut-on-???
==9379== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9379-by-pythonnut-on-???
==9379==
==9379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9379== don't want to do, unless you know exactly what you're doing,
==9379== or are doing some strange experiment):
==9379== /usr/lib/valgrind/../../bin/vgdb --pid=9379 ...command...
==9379==
==9379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9379== /path/to/gdb ./zsh
==9379== and then give GDB the following command
==9379== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9379
==9379== --pid is optional if only one valgrind process is running
==9379==
client request: code 4d430005, addr 0xFFEFF2C4C, len 4
--9377-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9377==
==9377== HEAP SUMMARY:
==9377== in use at exit: 3,116,414 bytes in 68,950 blocks
==9377== total heap usage: 928,525 allocs, 859,575 frees, 65,602,478 bytes allocated
==9377==
==9377== Searching for pointers to 68,950 not-freed blocks
--9377-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9377-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9377-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9377-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9377-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9377-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9377-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9377-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9377-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9377-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9377-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9377-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9377-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9377-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9377-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9377-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9377-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9377-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9377-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9377-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9377-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9377-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9377-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9377-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9377-- Scanning root segment: 0x701a000..0x701afff (4096)
--9377-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9377-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9377-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9377-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9377-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9377-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9377-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9377-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9377-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9377== Checked 4,759,104 bytes
==9377==
==9377== LEAK SUMMARY:
==9377== definitely lost: 1,533 bytes in 8 blocks
==9377== indirectly lost: 6,756 bytes in 7 blocks
==9377== possibly lost: 0 bytes in 0 blocks
==9377== still reachable: 3,108,125 bytes in 68,935 blocks
==9377== suppressed: 0 bytes in 0 blocks
==9377== Rerun with --leak-check=full to see details of leaked memory
==9377==
==9377== Use --track-origins=yes to see where uninitialised values come from
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377==
==9377== 1 errors in context 1 of 2:
==9377== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9377== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9377== by 0x488CD0: stringsubst (subst.c:301)
==9377== by 0x48801B: prefork (subst.c:77)
==9377== by 0x42B318: execcmd (exec.c:2619)
==9377== by 0x428CA0: execpline2 (exec.c:1697)
==9377== by 0x427FD2: execpline (exec.c:1484)
==9377== by 0x427756: execlist (exec.c:1267)
==9377== by 0x42717C: execode (exec.c:1073)
==9377== by 0x431299: runshfunc (exec.c:5040)
==9377== by 0x430E76: doshfunc (exec.c:4920)
==9377== by 0x4302FB: execshfunc (exec.c:4557)
==9377== by 0x42D8C1: execcmd (exec.c:3373)
==9377==
==9377==
==9377== 2 errors in context 2 of 2:
==9377== Conditional jump or move depends on uninitialised value(s)
==9377== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9377== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9377== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9377== by 0x40EFC2: execbuiltin (builtin.c:450)
==9377== by 0x42D8E9: execcmd (exec.c:3378)
==9377== by 0x428CA0: execpline2 (exec.c:1697)
==9377== by 0x427FD2: execpline (exec.c:1484)
==9377== by 0x42779A: execlist (exec.c:1275)
==9377== by 0x42717C: execode (exec.c:1073)
==9377== by 0x431299: runshfunc (exec.c:5040)
==9377== by 0x430E76: doshfunc (exec.c:4920)
==9377== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9377==
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9376-- Caught __NR_exit; running __libc_freeres()
==9376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9376-by-pythonnut-on-???
==9376== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9376-by-pythonnut-on-???
==9376== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9376-by-pythonnut-on-???
==9376==
==9376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9376== don't want to do, unless you know exactly what you're doing,
==9376== or are doing some strange experiment):
==9376== /usr/lib/valgrind/../../bin/vgdb --pid=9376 ...command...
==9376==
==9376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9376== /path/to/gdb ./zsh
==9376== and then give GDB the following command
==9376== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9376
==9376== --pid is optional if only one valgrind process is running
==9376==
--9376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9376==
==9376== HEAP SUMMARY:
==9376== in use at exit: 3,116,126 bytes in 68,947 blocks
==9376== total heap usage: 928,531 allocs, 859,584 frees, 65,603,366 bytes allocated
==9376==
==9376== Searching for pointers to 68,947 not-freed blocks
--9376-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9376-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9376-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9376-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9376-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9376-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9376-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9376-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9376-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9376-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9376-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9376-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9376-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9376-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9376-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9376-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9376-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9376-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9376-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9376-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9376-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9376-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9376-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9376-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9376-- Scanning root segment: 0x701a000..0x701afff (4096)
--9376-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9376-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9376-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9376-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9376-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9376-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9376-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9376-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9376-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9376== Checked 4,758,184 bytes
==9376==
==9376== LEAK SUMMARY:
==9376== definitely lost: 1,533 bytes in 8 blocks
==9376== indirectly lost: 6,756 bytes in 7 blocks
==9376== possibly lost: 0 bytes in 0 blocks
==9376== still reachable: 3,107,837 bytes in 68,932 blocks
==9376== suppressed: 0 bytes in 0 blocks
==9376== Rerun with --leak-check=full to see details of leaked memory
==9376==
==9376== Use --track-origins=yes to see where uninitialised values come from
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9376==
==9376== 1 errors in context 1 of 2:
==9376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9376== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9376== by 0x488CD0: stringsubst (subst.c:301)
==9376== by 0x48801B: prefork (subst.c:77)
==9376== by 0x42B318: execcmd (exec.c:2619)
==9376== by 0x428CA0: execpline2 (exec.c:1697)
==9376== by 0x427FD2: execpline (exec.c:1484)
==9376== by 0x427756: execlist (exec.c:1267)
==9376== by 0x42717C: execode (exec.c:1073)
==9376== by 0x431299: runshfunc (exec.c:5040)
==9376== by 0x430E76: doshfunc (exec.c:4920)
==9376== by 0x4302FB: execshfunc (exec.c:4557)
==9376== by 0x42D8C1: execcmd (exec.c:3373)
==9376==
==9376==
==9376== 2 errors in context 2 of 2:
==9376== Conditional jump or move depends on uninitialised value(s)
==9376== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9376== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9376== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9376== by 0x40EFC2: execbuiltin (builtin.c:450)
==9376== by 0x42D8E9: execcmd (exec.c:3378)
==9376== by 0x428CA0: execpline2 (exec.c:1697)
==9376== by 0x427FD2: execpline (exec.c:1484)
==9376== by 0x42779A: execlist (exec.c:1275)
==9376== by 0x42717C: execode (exec.c:1073)
==9376== by 0x431299: runshfunc (exec.c:5040)
==9376== by 0x430E76: doshfunc (exec.c:4920)
==9376== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9376==
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9380-by-pythonnut-on-???
==9380== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9380-by-pythonnut-on-???
==9380== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9380-by-pythonnut-on-???
==9380==
==9380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9380== don't want to do, unless you know exactly what you're doing,
==9380== or are doing some strange experiment):
==9380== /usr/lib/valgrind/../../bin/vgdb --pid=9380 ...command...
==9380==
==9380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9380== /path/to/gdb ./zsh
==9380== and then give GDB the following command
==9380== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9380
==9380== --pid is optional if only one valgrind process is running
==9380==
==9381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9381-by-pythonnut-on-???
==9381== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9381-by-pythonnut-on-???
==9381== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9381-by-pythonnut-on-???
==9381==
==9381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9381== don't want to do, unless you know exactly what you're doing,
==9381== or are doing some strange experiment):
==9381== /usr/lib/valgrind/../../bin/vgdb --pid=9381 ...command...
==9381==
==9381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9381== /path/to/gdb ./zsh
==9381== and then give GDB the following command
==9381== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9381
==9381== --pid is optional if only one valgrind process is running
==9381==
--9381-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF188C, len 4
client request: code 4d430005, addr 0xFFEFF17EC, len 4
--9381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9381==
==9381== HEAP SUMMARY:
==9381== in use at exit: 3,116,336 bytes in 68,952 blocks
==9381== total heap usage: 928,558 allocs, 859,606 frees, 65,615,667 bytes allocated
==9381==
==9381== Searching for pointers to 68,952 not-freed blocks
--9381-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9381-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9381-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9381-- Scanning root segment: 0x4037000..0x403afff (16384)
--9381-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9381-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9381-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9381-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9381-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9381-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9381-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9381-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9381-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9381-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9381-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9381-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9381-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9381-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9381-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9381-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9381-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9381-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9381-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9381-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9381-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9381-- Scanning root segment: 0x701a000..0x701afff (4096)
--9381-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9381-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9381-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9381-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9381-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9381-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9381-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9381-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9381-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9381== Checked 4,776,712 bytes
==9381==
==9381== LEAK SUMMARY:
==9381== definitely lost: 1,533 bytes in 8 blocks
==9381== indirectly lost: 6,756 bytes in 7 blocks
==9381== possibly lost: 0 bytes in 0 blocks
==9381== still reachable: 3,108,047 bytes in 68,937 blocks
==9381== suppressed: 0 bytes in 0 blocks
==9381== Rerun with --leak-check=full to see details of leaked memory
==9381==
==9381== Use --track-origins=yes to see where uninitialised values come from
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9381==
==9381== 1 errors in context 1 of 2:
==9381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9381== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9381== by 0x488CD0: stringsubst (subst.c:301)
==9381== by 0x48801B: prefork (subst.c:77)
==9381== by 0x42B318: execcmd (exec.c:2619)
==9381== by 0x428CA0: execpline2 (exec.c:1697)
==9381== by 0x427FD2: execpline (exec.c:1484)
==9381== by 0x427756: execlist (exec.c:1267)
==9381== by 0x42717C: execode (exec.c:1073)
==9381== by 0x431299: runshfunc (exec.c:5040)
==9381== by 0x430E76: doshfunc (exec.c:4920)
==9381== by 0x4302FB: execshfunc (exec.c:4557)
==9381== by 0x42D8C1: execcmd (exec.c:3373)
==9381==
==9381==
==9381== 2 errors in context 2 of 2:
==9381== Conditional jump or move depends on uninitialised value(s)
==9381== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9381== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9381== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9381== by 0x40EFC2: execbuiltin (builtin.c:450)
==9381== by 0x42D8E9: execcmd (exec.c:3378)
==9381== by 0x428CA0: execpline2 (exec.c:1697)
==9381== by 0x427FD2: execpline (exec.c:1484)
==9381== by 0x42779A: execlist (exec.c:1275)
==9381== by 0x42717C: execode (exec.c:1073)
==9381== by 0x431299: runshfunc (exec.c:5040)
==9381== by 0x430E76: doshfunc (exec.c:4920)
==9381== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9381==
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9380-- Caught __NR_exit; running __libc_freeres()
--9380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9380==
==9380== HEAP SUMMARY:
==9380== in use at exit: 3,116,373 bytes in 68,953 blocks
==9380== total heap usage: 928,554 allocs, 859,601 frees, 65,612,083 bytes allocated
==9380==
==9380== Searching for pointers to 68,953 not-freed blocks
--9380-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9380-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9380-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9380-- Scanning root segment: 0x4037000..0x403afff (16384)
--9380-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9380-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9380-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9380-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9380-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9380-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9380-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9380-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9380-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9380-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9380-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9380-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9380-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9380-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9380-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9380-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9380-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9380-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9380-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9380-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9380-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9380-- Scanning root segment: 0x701a000..0x701afff (4096)
--9380-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9380-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9380-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9380-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9380-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9380-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9380-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9380-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9380-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9380== Checked 4,776,416 bytes
==9380==
==9380== LEAK SUMMARY:
==9380== definitely lost: 1,533 bytes in 8 blocks
==9380== indirectly lost: 6,756 bytes in 7 blocks
==9380== possibly lost: 0 bytes in 0 blocks
==9380== still reachable: 3,108,084 bytes in 68,938 blocks
==9380== suppressed: 0 bytes in 0 blocks
==9380== Rerun with --leak-check=full to see details of leaked memory
==9380==
==9380== Use --track-origins=yes to see where uninitialised values come from
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380==
==9380== 1 errors in context 1 of 2:
==9380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9380== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9380== by 0x488CD0: stringsubst (subst.c:301)
==9380== by 0x48801B: prefork (subst.c:77)
==9380== by 0x42B318: execcmd (exec.c:2619)
==9380== by 0x428CA0: execpline2 (exec.c:1697)
==9380== by 0x427FD2: execpline (exec.c:1484)
==9380== by 0x427756: execlist (exec.c:1267)
==9380== by 0x42717C: execode (exec.c:1073)
==9380== by 0x431299: runshfunc (exec.c:5040)
==9380== by 0x430E76: doshfunc (exec.c:4920)
==9380== by 0x4302FB: execshfunc (exec.c:4557)
==9380== by 0x42D8C1: execcmd (exec.c:3373)
==9380==
==9380==
==9380== 2 errors in context 2 of 2:
==9380== Conditional jump or move depends on uninitialised value(s)
==9380== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9380== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9380== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9380== by 0x40EFC2: execbuiltin (builtin.c:450)
==9380== by 0x42D8E9: execcmd (exec.c:3378)
==9380== by 0x428CA0: execpline2 (exec.c:1697)
==9380== by 0x427FD2: execpline (exec.c:1484)
==9380== by 0x42779A: execlist (exec.c:1275)
==9380== by 0x42717C: execode (exec.c:1073)
==9380== by 0x431299: runshfunc (exec.c:5040)
==9380== by 0x430E76: doshfunc (exec.c:4920)
==9380== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9380==
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF1DDC, len 4
--9384-- Caught __NR_exit; running __libc_freeres()
==9384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9384-by-pythonnut-on-???
==9384== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9384-by-pythonnut-on-???
==9384== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9384-by-pythonnut-on-???
==9384==
==9384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9384== don't want to do, unless you know exactly what you're doing,
==9384== or are doing some strange experiment):
==9384== /usr/lib/valgrind/../../bin/vgdb --pid=9384 ...command...
==9384==
==9384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9384== /path/to/gdb ./zsh
==9384== and then give GDB the following command
==9384== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9384
==9384== --pid is optional if only one valgrind process is running
==9384==
--9384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9384==
==9384== HEAP SUMMARY:
==9384== in use at exit: 3,116,717 bytes in 68,958 blocks
==9384== total heap usage: 928,566 allocs, 859,608 frees, 65,617,409 bytes allocated
==9384==
==9384== Searching for pointers to 68,958 not-freed blocks
--9384-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9384-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9384-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9384-- Scanning root segment: 0x4037000..0x403afff (16384)
--9384-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9384-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9384-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9384-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9384-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9384-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9384-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9384-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9384-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9384-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9384-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9384-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9384-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9384-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9384-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9384-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9384-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9384-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9384-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9384-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9384-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9384-- Scanning root segment: 0x701a000..0x701afff (4096)
--9384-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9384-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9384-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9384-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9384-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9384-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9384-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9384-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9384-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9384== Checked 4,776,480 bytes
==9384==
==9384== LEAK SUMMARY:
==9384== definitely lost: 1,533 bytes in 8 blocks
==9384== indirectly lost: 6,756 bytes in 7 blocks
==9384== possibly lost: 0 bytes in 0 blocks
==9384== still reachable: 3,108,428 bytes in 68,943 blocks
==9384== suppressed: 0 bytes in 0 blocks
==9384== Rerun with --leak-check=full to see details of leaked memory
==9384==
==9384== Use --track-origins=yes to see where uninitialised values come from
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9384==
==9384== 1 errors in context 1 of 2:
==9384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9384== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9384== by 0x488CD0: stringsubst (subst.c:301)
==9384== by 0x48801B: prefork (subst.c:77)
==9384== by 0x42B318: execcmd (exec.c:2619)
==9384== by 0x428CA0: execpline2 (exec.c:1697)
==9384== by 0x427FD2: execpline (exec.c:1484)
==9384== by 0x427756: execlist (exec.c:1267)
==9384== by 0x42717C: execode (exec.c:1073)
==9384== by 0x431299: runshfunc (exec.c:5040)
==9384== by 0x430E76: doshfunc (exec.c:4920)
==9384== by 0x4302FB: execshfunc (exec.c:4557)
==9384== by 0x42D8C1: execcmd (exec.c:3373)
==9384==
==9384==
==9384== 2 errors in context 2 of 2:
==9384== Conditional jump or move depends on uninitialised value(s)
==9384== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9384== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9384== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9384== by 0x40EFC2: execbuiltin (builtin.c:450)
==9384== by 0x42D8E9: execcmd (exec.c:3378)
==9384== by 0x428CA0: execpline2 (exec.c:1697)
==9384== by 0x427FD2: execpline (exec.c:1484)
==9384== by 0x42779A: execlist (exec.c:1275)
==9384== by 0x42717C: execode (exec.c:1073)
==9384== by 0x431299: runshfunc (exec.c:5040)
==9384== by 0x430E76: doshfunc (exec.c:4920)
==9384== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9384==
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF192C, len 4
--9388-- Caught __NR_exit; running __libc_freeres()
==9388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9388-by-pythonnut-on-???
==9388== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9388-by-pythonnut-on-???
==9388== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9388-by-pythonnut-on-???
==9388==
==9388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9388== don't want to do, unless you know exactly what you're doing,
==9388== or are doing some strange experiment):
==9388== /usr/lib/valgrind/../../bin/vgdb --pid=9388 ...command...
==9388==
==9388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9388== /path/to/gdb ./zsh
==9388== and then give GDB the following command
==9388== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9388
==9388== --pid is optional if only one valgrind process is running
==9388==
--9388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9388==
==9388== HEAP SUMMARY:
==9388== in use at exit: 3,116,746 bytes in 68,959 blocks
==9388== total heap usage: 928,571 allocs, 859,612 frees, 65,619,550 bytes allocated
==9388==
==9388== Searching for pointers to 68,959 not-freed blocks
--9388-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9388-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9388-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9388-- Scanning root segment: 0x4037000..0x403afff (16384)
--9388-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9388-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9388-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9388-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9388-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9388-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9388-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9388-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9388-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9388-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9388-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9388-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9388-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9388-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9388-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9388-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9388-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9388-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9388-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9388-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9388-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9388-- Scanning root segment: 0x701a000..0x701afff (4096)
--9388-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9388-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9388-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9388-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9388-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9388-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9388-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9388-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9388-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9388== Checked 4,776,776 bytes
==9388==
==9388== LEAK SUMMARY:
==9388== definitely lost: 1,533 bytes in 8 blocks
==9388== indirectly lost: 6,756 bytes in 7 blocks
==9388== possibly lost: 0 bytes in 0 blocks
==9388== still reachable: 3,108,457 bytes in 68,944 blocks
==9388== suppressed: 0 bytes in 0 blocks
==9388== Rerun with --leak-check=full to see details of leaked memory
==9388==
==9388== Use --track-origins=yes to see where uninitialised values come from
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9388==
==9388== 1 errors in context 1 of 2:
==9388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9388== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9388== by 0x488CD0: stringsubst (subst.c:301)
==9388== by 0x48801B: prefork (subst.c:77)
==9388== by 0x42B318: execcmd (exec.c:2619)
==9388== by 0x428CA0: execpline2 (exec.c:1697)
==9388== by 0x427FD2: execpline (exec.c:1484)
==9388== by 0x427756: execlist (exec.c:1267)
==9388== by 0x42717C: execode (exec.c:1073)
==9388== by 0x431299: runshfunc (exec.c:5040)
==9388== by 0x430E76: doshfunc (exec.c:4920)
==9388== by 0x4302FB: execshfunc (exec.c:4557)
==9388== by 0x42D8C1: execcmd (exec.c:3373)
==9388==
==9388==
==9388== 2 errors in context 2 of 2:
==9388== Conditional jump or move depends on uninitialised value(s)
==9388== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9388== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9388== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9388== by 0x40EFC2: execbuiltin (builtin.c:450)
==9388== by 0x42D8E9: execcmd (exec.c:3378)
==9388== by 0x428CA0: execpline2 (exec.c:1697)
==9388== by 0x427FD2: execpline (exec.c:1484)
==9388== by 0x42779A: execlist (exec.c:1275)
==9388== by 0x42717C: execode (exec.c:1073)
==9388== by 0x431299: runshfunc (exec.c:5040)
==9388== by 0x430E76: doshfunc (exec.c:4920)
==9388== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9388==
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9390== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9390-by-pythonnut-on-???
==9390== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9390-by-pythonnut-on-???
==9390== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9390-by-pythonnut-on-???
==9390==
==9390== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9390== don't want to do, unless you know exactly what you're doing,
==9390== or are doing some strange experiment):
==9390== /usr/lib/valgrind/../../bin/vgdb --pid=9390 ...command...
==9390==
==9390== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9390== /path/to/gdb ./zsh
==9390== and then give GDB the following command
==9390== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9390
==9390== --pid is optional if only one valgrind process is running
==9390==
client request: code 4d430005, addr 0xFFEFF22AC, len 4
client request: code 4d430005, addr 0xFFEFF1C2C, len 4
--9356-- Caught __NR_exit; running __libc_freeres()
--9356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9356==
==9356== HEAP SUMMARY:
==9356== in use at exit: 3,114,746 bytes in 68,911 blocks
==9356== total heap usage: 928,580 allocs, 859,669 frees, 65,623,490 bytes allocated
==9356==
==9356== Searching for pointers to 68,911 not-freed blocks
--9356-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9356-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9356-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9356-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9356-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9356-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9356-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9356-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9356-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9356-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9356-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9356-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9356-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9356-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9356-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9356-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9356-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9356-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9356-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9356-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9356-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9356-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9356-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9356-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9356-- Scanning root segment: 0x701a000..0x701afff (4096)
--9356-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9356-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9356-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9356-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9356-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9356-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9356-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9356-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9356-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9356== Checked 4,754,480 bytes
==9356==
==9356== LEAK SUMMARY:
==9356== definitely lost: 1,533 bytes in 8 blocks
==9356== indirectly lost: 6,756 bytes in 7 blocks
==9356== possibly lost: 0 bytes in 0 blocks
==9356== still reachable: 3,106,457 bytes in 68,896 blocks
==9356== suppressed: 0 bytes in 0 blocks
==9356== Rerun with --leak-check=full to see details of leaked memory
==9356==
==9356== Use --track-origins=yes to see where uninitialised values come from
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356==
==9356== 1 errors in context 1 of 2:
==9356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9356== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9356== by 0x488CD0: stringsubst (subst.c:301)
==9356== by 0x48801B: prefork (subst.c:77)
==9356== by 0x42B318: execcmd (exec.c:2619)
==9356== by 0x428CA0: execpline2 (exec.c:1697)
==9356== by 0x427FD2: execpline (exec.c:1484)
==9356== by 0x427756: execlist (exec.c:1267)
==9356== by 0x42717C: execode (exec.c:1073)
==9356== by 0x431299: runshfunc (exec.c:5040)
==9356== by 0x430E76: doshfunc (exec.c:4920)
==9356== by 0x4302FB: execshfunc (exec.c:4557)
==9356== by 0x42D8C1: execcmd (exec.c:3373)
==9356==
==9356==
==9356== 2 errors in context 2 of 2:
==9356== Conditional jump or move depends on uninitialised value(s)
==9356== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9356== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9356== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9356== by 0x40EFC2: execbuiltin (builtin.c:450)
==9356== by 0x42D8E9: execcmd (exec.c:3378)
==9356== by 0x428CA0: execpline2 (exec.c:1697)
==9356== by 0x427FD2: execpline (exec.c:1484)
==9356== by 0x42779A: execlist (exec.c:1275)
==9356== by 0x42717C: execode (exec.c:1073)
==9356== by 0x431299: runshfunc (exec.c:5040)
==9356== by 0x430E76: doshfunc (exec.c:4920)
==9356== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9356==
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFFD9EC, len 4
client request: code 4d430005, addr 0xFFEFFD9EC, len 4
==9392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9392-by-pythonnut-on-???
==9392== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9392-by-pythonnut-on-???
==9392== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9392-by-pythonnut-on-???
==9392==
==9392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9392== don't want to do, unless you know exactly what you're doing,
==9392== or are doing some strange experiment):
==9392== /usr/lib/valgrind/../../bin/vgdb --pid=9392 ...command...
==9392==
==9392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9392== /path/to/gdb ./zsh
==9392== and then give GDB the following command
==9392== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9392
==9392== --pid is optional if only one valgrind process is running
==9392==
--9392-- Caught __NR_exit; running __libc_freeres()
--9392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9392==
==9392== HEAP SUMMARY:
==9392== in use at exit: 3,116,928 bytes in 68,923 blocks
==9392== total heap usage: 936,381 allocs, 867,458 frees, 66,946,264 bytes allocated
==9392==
==9392== Searching for pointers to 68,923 not-freed blocks
--9392-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9392-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9392-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9392-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9392-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9392-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9392-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9392-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9392-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9392-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9392-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9392-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9392-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9392-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9392-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9392-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9392-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9392-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9392-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9392-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9392-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9392-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9392-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9392-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9392-- Scanning root segment: 0x701a000..0x701afff (4096)
--9392-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9392-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9392-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9392-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9392-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9392-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9392-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9392-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9392-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9392== Checked 4,779,960 bytes
==9392==
==9392== LEAK SUMMARY:
==9392== definitely lost: 1,533 bytes in 8 blocks
==9392== indirectly lost: 6,756 bytes in 7 blocks
==9392== possibly lost: 0 bytes in 0 blocks
==9392== still reachable: 3,108,639 bytes in 68,908 blocks
==9392== suppressed: 0 bytes in 0 blocks
==9392== Rerun with --leak-check=full to see details of leaked memory
==9392==
==9392== Use --track-origins=yes to see where uninitialised values come from
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9392==
==9392== 1 errors in context 1 of 2:
==9392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9392== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9392== by 0x488CD0: stringsubst (subst.c:301)
==9392== by 0x48801B: prefork (subst.c:77)
==9392== by 0x42B318: execcmd (exec.c:2619)
==9392== by 0x428CA0: execpline2 (exec.c:1697)
==9392== by 0x427FD2: execpline (exec.c:1484)
==9392== by 0x427756: execlist (exec.c:1267)
==9392== by 0x42717C: execode (exec.c:1073)
==9392== by 0x431299: runshfunc (exec.c:5040)
==9392== by 0x430E76: doshfunc (exec.c:4920)
==9392== by 0x4302FB: execshfunc (exec.c:4557)
==9392== by 0x42D8C1: execcmd (exec.c:3373)
==9392==
==9392==
==9392== 2 errors in context 2 of 2:
==9392== Conditional jump or move depends on uninitialised value(s)
==9392== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9392== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9392== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9392== by 0x40EFC2: execbuiltin (builtin.c:450)
==9392== by 0x42D8E9: execcmd (exec.c:3378)
==9392== by 0x428CA0: execpline2 (exec.c:1697)
==9392== by 0x427FD2: execpline (exec.c:1484)
==9392== by 0x42779A: execlist (exec.c:1275)
==9392== by 0x42717C: execode (exec.c:1073)
==9392== by 0x431299: runshfunc (exec.c:5040)
==9392== by 0x430E76: doshfunc (exec.c:4920)
==9392== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9392==
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9393-by-pythonnut-on-???
==9393== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9393-by-pythonnut-on-???
==9393== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9393-by-pythonnut-on-???
==9393==
==9393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9393== don't want to do, unless you know exactly what you're doing,
==9393== or are doing some strange experiment):
==9393== /usr/lib/valgrind/../../bin/vgdb --pid=9393 ...command...
==9393==
==9393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9393== /path/to/gdb ./zsh
==9393== and then give GDB the following command
==9393== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9393
==9393== --pid is optional if only one valgrind process is running
==9393==
==9396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9396-by-pythonnut-on-???
==9396== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9396-by-pythonnut-on-???
==9396== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9396-by-pythonnut-on-???
==9396==
==9396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9396== don't want to do, unless you know exactly what you're doing,
==9396== or are doing some strange experiment):
==9396== /usr/lib/valgrind/../../bin/vgdb --pid=9396 ...command...
==9396==
==9396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9396== /path/to/gdb ./zsh
==9396== and then give GDB the following command
==9396== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9396
==9396== --pid is optional if only one valgrind process is running
==9396==
==9397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9397-by-pythonnut-on-???
==9397== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9397-by-pythonnut-on-???
==9397== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9397-by-pythonnut-on-???
==9397==
==9397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9397== don't want to do, unless you know exactly what you're doing,
==9397== or are doing some strange experiment):
==9397== /usr/lib/valgrind/../../bin/vgdb --pid=9397 ...command...
==9397==
==9397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9397== /path/to/gdb ./zsh
==9397== and then give GDB the following command
==9397== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9397
==9397== --pid is optional if only one valgrind process is running
==9397==
==9395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9395-by-pythonnut-on-???
==9395== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9395-by-pythonnut-on-???
==9395== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9395-by-pythonnut-on-???
==9395==
==9395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9395== don't want to do, unless you know exactly what you're doing,
==9395== or are doing some strange experiment):
==9395== /usr/lib/valgrind/../../bin/vgdb --pid=9395 ...command...
==9395==
==9395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9395== /path/to/gdb ./zsh
==9395== and then give GDB the following command
==9395== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9395
==9395== --pid is optional if only one valgrind process is running
==9395==
==9399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9399-by-pythonnut-on-???
==9399== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9399-by-pythonnut-on-???
==9399== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9399-by-pythonnut-on-???
==9399==
==9399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9399== don't want to do, unless you know exactly what you're doing,
==9399== or are doing some strange experiment):
==9399== /usr/lib/valgrind/../../bin/vgdb --pid=9399 ...command...
==9399==
==9399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9399== /path/to/gdb ./zsh
==9399== and then give GDB the following command
==9399== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9399
==9399== --pid is optional if only one valgrind process is running
==9399==
==9400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9400-by-pythonnut-on-???
==9400== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9400-by-pythonnut-on-???
==9400== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9400-by-pythonnut-on-???
==9400==
==9400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9400== don't want to do, unless you know exactly what you're doing,
==9400== or are doing some strange experiment):
==9400== /usr/lib/valgrind/../../bin/vgdb --pid=9400 ...command...
==9400==
==9400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9400== /path/to/gdb ./zsh
==9400== and then give GDB the following command
==9400== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9400
==9400== --pid is optional if only one valgrind process is running
==9400==
==9401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9401-by-pythonnut-on-???
==9401== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9401-by-pythonnut-on-???
==9401== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9401-by-pythonnut-on-???
==9401==
==9401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9401== don't want to do, unless you know exactly what you're doing,
==9401== or are doing some strange experiment):
==9401== /usr/lib/valgrind/../../bin/vgdb --pid=9401 ...command...
==9401==
==9401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9401== /path/to/gdb ./zsh
==9401== and then give GDB the following command
==9401== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9401
==9401== --pid is optional if only one valgrind process is running
==9401==
--9401-- Caught __NR_exit; running __libc_freeres()
==9404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9404-by-pythonnut-on-???
==9404== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9404-by-pythonnut-on-???
==9404== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9404-by-pythonnut-on-???
==9404==
==9404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9404== don't want to do, unless you know exactly what you're doing,
==9404== or are doing some strange experiment):
==9404== /usr/lib/valgrind/../../bin/vgdb --pid=9404 ...command...
==9404==
==9404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9404== /path/to/gdb ./zsh
==9404== and then give GDB the following command
==9404== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9404
==9404== --pid is optional if only one valgrind process is running
==9404==
client request: code 4d430005, addr 0xFFEFF028C, len 4
client request: code 4d430005, addr 0xFFEFF493C, len 4
==9402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9402-by-pythonnut-on-???
==9402== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9402-by-pythonnut-on-???
==9402== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9402-by-pythonnut-on-???
==9402==
==9402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9402== don't want to do, unless you know exactly what you're doing,
==9402== or are doing some strange experiment):
==9402== /usr/lib/valgrind/../../bin/vgdb --pid=9402 ...command...
==9402==
==9402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9402== /path/to/gdb ./zsh
==9402== and then give GDB the following command
==9402== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9402
==9402== --pid is optional if only one valgrind process is running
==9402==
--9402-- Caught __NR_exit; running __libc_freeres()
--9401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9401==
==9401== HEAP SUMMARY:
==9401== in use at exit: 3,115,859 bytes in 68,911 blocks
==9401== total heap usage: 935,498 allocs, 866,587 frees, 66,334,915 bytes allocated
==9401==
--9402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9402==
==9402== HEAP SUMMARY:
==9402== in use at exit: 3,117,104 bytes in 68,900 blocks
==9402== total heap usage: 935,488 allocs, 866,588 frees, 66,577,191 bytes allocated
==9402==
==9401== Searching for pointers to 68,911 not-freed blocks
--9401-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9401-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9401-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9401-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9401-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9401-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9401-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9401-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9401-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9401-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9401-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9401-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9401-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9401-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9401-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9401-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9401-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9401-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9401-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9401-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9401-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9401-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9401-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9401-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9401-- Scanning root segment: 0x701a000..0x701afff (4096)
--9401-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9401-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9401-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9401-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9401-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9401-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9401-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9401-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9401-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Caught __NR_exit; running __libc_freeres()
==9402== Searching for pointers to 68,900 not-freed blocks
--9402-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9402-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9402-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9402-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9402-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9402-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9402-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9402-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9402-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9402-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9402-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9402-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9402-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9402-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9402-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9402-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9402-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9402-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9402-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9402-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9402-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9402-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9402-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9402-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9402-- Scanning root segment: 0x701a000..0x701afff (4096)
--9402-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9402-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9402-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9402-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9402-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9402-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9402-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9402-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9402-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9397==
==9397== HEAP SUMMARY:
==9397== in use at exit: 3,122,699 bytes in 69,131 blocks
==9397== total heap usage: 936,603 allocs, 867,472 frees, 66,957,364 bytes allocated
==9397==
==9397== Searching for pointers to 69,131 not-freed blocks
--9397-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9397-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9397-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9397-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9397-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9397-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9397-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9397-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9397-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9397-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9397-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9397-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9397-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9397-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9397-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9397-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9397-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9397-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9397-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9397-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9397-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9397-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9397-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9397-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9397-- Scanning root segment: 0x701a000..0x701afff (4096)
--9397-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9397-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9397-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9397-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9397-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9397-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9397-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9397-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9397-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9401== Checked 4,778,472 bytes
==9401==
==9401== LEAK SUMMARY:
==9401== definitely lost: 1,533 bytes in 8 blocks
==9401== indirectly lost: 6,756 bytes in 7 blocks
==9401== possibly lost: 0 bytes in 0 blocks
==9401== still reachable: 3,107,570 bytes in 68,896 blocks
==9401== suppressed: 0 bytes in 0 blocks
==9401== Rerun with --leak-check=full to see details of leaked memory
==9401==
==9401== Use --track-origins=yes to see where uninitialised values come from
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9401==
==9401== 1 errors in context 1 of 2:
==9401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9401== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9401== by 0x488CD0: stringsubst (subst.c:301)
==9401== by 0x48801B: prefork (subst.c:77)
==9401== by 0x42B318: execcmd (exec.c:2619)
==9401== by 0x428CA0: execpline2 (exec.c:1697)
==9401== by 0x427FD2: execpline (exec.c:1484)
==9401== by 0x427756: execlist (exec.c:1267)
==9401== by 0x42717C: execode (exec.c:1073)
==9401== by 0x431299: runshfunc (exec.c:5040)
==9401== by 0x430E76: doshfunc (exec.c:4920)
==9401== by 0x4302FB: execshfunc (exec.c:4557)
==9401== by 0x42D8C1: execcmd (exec.c:3373)
==9401==
==9401==
==9401== 2 errors in context 2 of 2:
==9401== Conditional jump or move depends on uninitialised value(s)
==9401== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9401== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9401== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9401== by 0x40EFC2: execbuiltin (builtin.c:450)
==9401== by 0x42D8E9: execcmd (exec.c:3378)
==9401== by 0x428CA0: execpline2 (exec.c:1697)
==9401== by 0x427FD2: execpline (exec.c:1484)
==9401== by 0x42779A: execlist (exec.c:1275)
==9401== by 0x42717C: execode (exec.c:1073)
==9401== by 0x431299: runshfunc (exec.c:5040)
==9401== by 0x430E76: doshfunc (exec.c:4920)
==9401== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9401==
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Caught __NR_exit; running __libc_freeres()
==9402== Checked 4,764,384 bytes
==9402==
==9398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9398-by-pythonnut-on-???
==9398== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9398-by-pythonnut-on-???
==9398== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9398-by-pythonnut-on-???
==9398==
==9398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9398== don't want to do, unless you know exactly what you're doing,
==9398== or are doing some strange experiment):
==9398== /usr/lib/valgrind/../../bin/vgdb --pid=9398 ...command...
==9398==
==9398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9398== /path/to/gdb ./zsh
==9398== and then give GDB the following command
==9398== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9398
==9398== --pid is optional if only one valgrind process is running
==9398==
==9402== LEAK SUMMARY:
==9402== definitely lost: 1,533 bytes in 8 blocks
==9402== indirectly lost: 6,756 bytes in 7 blocks
==9402== possibly lost: 0 bytes in 0 blocks
==9402== still reachable: 3,108,815 bytes in 68,885 blocks
==9402== suppressed: 0 bytes in 0 blocks
==9402== Rerun with --leak-check=full to see details of leaked memory
==9402==
==9402== Use --track-origins=yes to see where uninitialised values come from
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9402==
==9402== 1 errors in context 1 of 2:
==9402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9402== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9402== by 0x488CD0: stringsubst (subst.c:301)
==9402== by 0x48801B: prefork (subst.c:77)
==9402== by 0x42B318: execcmd (exec.c:2619)
==9402== by 0x428CA0: execpline2 (exec.c:1697)
==9402== by 0x427FD2: execpline (exec.c:1484)
==9402== by 0x427756: execlist (exec.c:1267)
==9402== by 0x42717C: execode (exec.c:1073)
==9402== by 0x431299: runshfunc (exec.c:5040)
==9402== by 0x430E76: doshfunc (exec.c:4920)
==9402== by 0x4302FB: execshfunc (exec.c:4557)
==9402== by 0x42D8C1: execcmd (exec.c:3373)
==9402==
==9402==
==9402== 2 errors in context 2 of 2:
==9402== Conditional jump or move depends on uninitialised value(s)
==9402== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9402== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9402== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9402== by 0x40EFC2: execbuiltin (builtin.c:450)
==9402== by 0x42D8E9: execcmd (exec.c:3378)
==9402== by 0x428CA0: execpline2 (exec.c:1697)
==9402== by 0x427FD2: execpline (exec.c:1484)
==9402== by 0x42779A: execlist (exec.c:1275)
==9402== by 0x42717C: execode (exec.c:1073)
==9402== by 0x431299: runshfunc (exec.c:5040)
==9402== by 0x430E76: doshfunc (exec.c:4920)
==9402== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9402==
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9398==
--9407-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9398== HEAP SUMMARY:
==9398== in use at exit: 3,115,795 bytes in 68,908 blocks
==9398== total heap usage: 935,496 allocs, 866,588 frees, 66,334,674 bytes allocated
==9398==
==9407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9407-by-pythonnut-on-???
==9407== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9407-by-pythonnut-on-???
==9407== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9407-by-pythonnut-on-???
==9407==
==9407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9407== don't want to do, unless you know exactly what you're doing,
==9407== or are doing some strange experiment):
==9407== /usr/lib/valgrind/../../bin/vgdb --pid=9407 ...command...
==9407==
==9407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9407== /path/to/gdb ./zsh
==9407== and then give GDB the following command
==9407== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9407
==9407== --pid is optional if only one valgrind process is running
==9407==
client request: code 4d430005, addr 0xFFEFF8FCC, len 4
==9397== Checked 4,789,208 bytes
==9397==
==9398== Searching for pointers to 68,908 not-freed blocks
--9398-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9398-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9398-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9398-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9398-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9398-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9398-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9398-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9398-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9398-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9398-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9398-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9398-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9398-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9398-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9398-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9398-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9398-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9398-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9398-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9398-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9398-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9398-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9398-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9398-- Scanning root segment: 0x701a000..0x701afff (4096)
--9398-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9398-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9398-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9398-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9398-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9398-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9398-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9398-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9398-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9397== LEAK SUMMARY:
==9397== definitely lost: 1,533 bytes in 8 blocks
==9397== indirectly lost: 6,756 bytes in 7 blocks
==9397== possibly lost: 0 bytes in 0 blocks
==9397== still reachable: 3,114,410 bytes in 69,116 blocks
==9397== suppressed: 0 bytes in 0 blocks
==9397== Rerun with --leak-check=full to see details of leaked memory
==9397==
==9397== Use --track-origins=yes to see where uninitialised values come from
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9397==
==9397== 1 errors in context 1 of 2:
==9397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9397== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9397== by 0x488CD0: stringsubst (subst.c:301)
==9397== by 0x48801B: prefork (subst.c:77)
==9397== by 0x42B318: execcmd (exec.c:2619)
==9397== by 0x428CA0: execpline2 (exec.c:1697)
==9397== by 0x427FD2: execpline (exec.c:1484)
==9397== by 0x427756: execlist (exec.c:1267)
==9397== by 0x42717C: execode (exec.c:1073)
==9397== by 0x431299: runshfunc (exec.c:5040)
==9397== by 0x430E76: doshfunc (exec.c:4920)
==9397== by 0x4302FB: execshfunc (exec.c:4557)
==9397== by 0x42D8C1: execcmd (exec.c:3373)
==9397==
==9397==
==9397== 2 errors in context 2 of 2:
==9397== Conditional jump or move depends on uninitialised value(s)
==9397== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9397== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9397== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9397== by 0x40EFC2: execbuiltin (builtin.c:450)
==9397== by 0x42D8E9: execcmd (exec.c:3378)
==9397== by 0x428CA0: execpline2 (exec.c:1697)
==9397== by 0x427FD2: execpline (exec.c:1484)
==9397== by 0x42779A: execlist (exec.c:1275)
==9397== by 0x42717C: execode (exec.c:1073)
==9397== by 0x431299: runshfunc (exec.c:5040)
==9397== by 0x430E76: doshfunc (exec.c:4920)
==9397== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9397==
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF5FBC, len 4
==9408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9408-by-pythonnut-on-???
==9408== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9408-by-pythonnut-on-???
==9408== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9408-by-pythonnut-on-???
==9408==
==9408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9408== don't want to do, unless you know exactly what you're doing,
==9408== or are doing some strange experiment):
==9408== /usr/lib/valgrind/../../bin/vgdb --pid=9408 ...command...
==9408==
==9408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9408== /path/to/gdb ./zsh
==9408== and then give GDB the following command
==9408== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9408
==9408== --pid is optional if only one valgrind process is running
==9408==
--9408-- Caught __NR_exit; running __libc_freeres()
--9408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9408==
==9408== HEAP SUMMARY:
==9408== in use at exit: 3,122,769 bytes in 69,141 blocks
==9408== total heap usage: 935,602 allocs, 866,461 frees, 66,702,156 bytes allocated
==9408==
==9408== Searching for pointers to 69,141 not-freed blocks
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
--9408-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9408-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9408-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9408-- Scanning root segment: 0x4037000..0x403afff (16384)
--9408-- Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
--9408-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9408-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9408-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9408-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9408-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9408-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9408-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9408-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9408-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9408-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9408-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9408-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9408-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9408-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9408-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9408-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9408-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9408-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9408-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9408-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9408-- Scanning root segment: 0x701a000..0x701afff (4096)
--9408-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9408-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9408-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9408-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9408-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9408-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9408-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9408-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9408-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9398== Checked 4,777,784 bytes
==9398==
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF65AC, len 4
client request: code 4d430005, addr 0xFFEFF773C, len 4
==9398== LEAK SUMMARY:
==9398== definitely lost: 1,533 bytes in 8 blocks
==9398== indirectly lost: 6,756 bytes in 7 blocks
==9398== possibly lost: 0 bytes in 0 blocks
==9398== still reachable: 3,107,506 bytes in 68,893 blocks
==9398== suppressed: 0 bytes in 0 blocks
==9398== Rerun with --leak-check=full to see details of leaked memory
==9398==
==9398== Use --track-origins=yes to see where uninitialised values come from
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9398==
==9398== 1 errors in context 1 of 2:
==9398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9398== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9398== by 0x488CD0: stringsubst (subst.c:301)
==9398== by 0x48801B: prefork (subst.c:77)
==9398== by 0x42B318: execcmd (exec.c:2619)
==9398== by 0x428CA0: execpline2 (exec.c:1697)
==9398== by 0x427FD2: execpline (exec.c:1484)
==9398== by 0x427756: execlist (exec.c:1267)
==9398== by 0x42717C: execode (exec.c:1073)
==9398== by 0x431299: runshfunc (exec.c:5040)
==9398== by 0x430E76: doshfunc (exec.c:4920)
==9398== by 0x4302FB: execshfunc (exec.c:4557)
==9398== by 0x42D8C1: execcmd (exec.c:3373)
==9398==
==9398==
==9398== 2 errors in context 2 of 2:
==9398== Conditional jump or move depends on uninitialised value(s)
==9398== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9398== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9398== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9398== by 0x40EFC2: execbuiltin (builtin.c:450)
==9398== by 0x42D8E9: execcmd (exec.c:3378)
==9398== by 0x428CA0: execpline2 (exec.c:1697)
==9398== by 0x427FD2: execpline (exec.c:1484)
==9398== by 0x42779A: execlist (exec.c:1275)
==9398== by 0x42717C: execode (exec.c:1073)
==9398== by 0x431299: runshfunc (exec.c:5040)
==9398== by 0x430E76: doshfunc (exec.c:4920)
==9398== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9398==
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEC84C, len 4
client request: code 4d430005, addr 0xFFEFF773C, len 4
==9411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9411-by-pythonnut-on-???
==9411== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9411-by-pythonnut-on-???
==9411== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9411-by-pythonnut-on-???
==9411==
==9411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9411== don't want to do, unless you know exactly what you're doing,
==9411== or are doing some strange experiment):
==9411== /usr/lib/valgrind/../../bin/vgdb --pid=9411 ...command...
==9411==
==9411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9411== /path/to/gdb ./zsh
==9411== and then give GDB the following command
==9411== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9411
==9411== --pid is optional if only one valgrind process is running
==9411==
--9410-- Caught __NR_exit; running __libc_freeres()
==9410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9410-by-pythonnut-on-???
==9410== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9410-by-pythonnut-on-???
==9410== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9410-by-pythonnut-on-???
==9410==
==9410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9410== don't want to do, unless you know exactly what you're doing,
==9410== or are doing some strange experiment):
==9410== /usr/lib/valgrind/../../bin/vgdb --pid=9410 ...command...
==9410==
==9410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9410== /path/to/gdb ./zsh
==9410== and then give GDB the following command
==9410== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9410
==9410== --pid is optional if only one valgrind process is running
==9410==
client request: code 4d430005, addr 0xFFEFF327C, len 4
client request: code 4d430005, addr 0xFFEFF327C, len 4
==9412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9412-by-pythonnut-on-???
==9412== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9412-by-pythonnut-on-???
==9412== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9412-by-pythonnut-on-???
==9412==
==9412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9412== don't want to do, unless you know exactly what you're doing,
==9412== or are doing some strange experiment):
==9412== /usr/lib/valgrind/../../bin/vgdb --pid=9412 ...command...
==9412==
==9412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9412== /path/to/gdb ./zsh
==9412== and then give GDB the following command
==9412== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9412
==9412== --pid is optional if only one valgrind process is running
==9412==
==9408== Checked 4,806,376 bytes
==9408==
--9410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412-- Caught __NR_exit; running __libc_freeres()
==9410==
==9410== HEAP SUMMARY:
==9410== in use at exit: 3,115,802 bytes in 68,908 blocks
==9410== total heap usage: 935,511 allocs, 866,603 frees, 66,339,672 bytes allocated
==9410==
==9408== LEAK SUMMARY:
==9408== definitely lost: 1,533 bytes in 8 blocks
==9408== indirectly lost: 6,756 bytes in 7 blocks
==9408== possibly lost: 0 bytes in 0 blocks
==9408== still reachable: 3,114,480 bytes in 69,126 blocks
==9408== suppressed: 0 bytes in 0 blocks
==9408== Rerun with --leak-check=full to see details of leaked memory
==9408==
==9408== Use --track-origins=yes to see where uninitialised values come from
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9408==
==9408== 1 errors in context 1 of 2:
==9408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9408== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9408== by 0x488CD0: stringsubst (subst.c:301)
==9408== by 0x48801B: prefork (subst.c:77)
==9408== by 0x42B318: execcmd (exec.c:2619)
==9408== by 0x428CA0: execpline2 (exec.c:1697)
==9408== by 0x427FD2: execpline (exec.c:1484)
==9408== by 0x427756: execlist (exec.c:1267)
==9408== by 0x42717C: execode (exec.c:1073)
==9408== by 0x431299: runshfunc (exec.c:5040)
==9408== by 0x430E76: doshfunc (exec.c:4920)
==9408== by 0x4302FB: execshfunc (exec.c:4557)
==9408== by 0x42D8C1: execcmd (exec.c:3373)
==9408==
==9408==
==9408== 2 errors in context 2 of 2:
==9408== Conditional jump or move depends on uninitialised value(s)
==9408== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9408== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9408== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9408== by 0x40EFC2: execbuiltin (builtin.c:450)
==9408== by 0x42D8E9: execcmd (exec.c:3378)
==9408== by 0x428CA0: execpline2 (exec.c:1697)
==9408== by 0x427FD2: execpline (exec.c:1484)
==9408== by 0x42779A: execlist (exec.c:1275)
==9408== by 0x42717C: execode (exec.c:1073)
==9408== by 0x431299: runshfunc (exec.c:5040)
==9408== by 0x430E76: doshfunc (exec.c:4920)
==9408== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9408==
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9413-by-pythonnut-on-???
==9413== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9413-by-pythonnut-on-???
==9413== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9413-by-pythonnut-on-???
==9413==
==9413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9413== don't want to do, unless you know exactly what you're doing,
==9413== or are doing some strange experiment):
==9413== /usr/lib/valgrind/../../bin/vgdb --pid=9413 ...command...
==9413==
==9413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9413== /path/to/gdb ./zsh
==9413== and then give GDB the following command
==9413== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9413
==9413== --pid is optional if only one valgrind process is running
==9413==
==9412==
==9410== Searching for pointers to 68,908 not-freed blocks
==9412== HEAP SUMMARY:
==9412== in use at exit: 3,148,814 bytes in 69,398 blocks
==9412== total heap usage: 939,263 allocs, 869,865 frees, 68,347,262 bytes allocated
==9412==
--9410-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9410-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9410-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9410-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9410-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9410-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9410-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9410-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9410-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9410-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9410-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9410-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9410-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9410-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9410-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9410-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9410-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9410-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9410-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9410-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9410-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9410-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9410-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9410-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9410-- Scanning root segment: 0x701a000..0x701afff (4096)
--9410-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9410-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9410-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9410-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9410-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9410-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9410-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9410-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9410-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9413-- Caught __NR_exit; running __libc_freeres()
==9412== Searching for pointers to 69,398 not-freed blocks
--9412-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9412-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9412-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9412-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9412-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9412-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9412-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9412-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9412-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9412-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9412-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9412-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9412-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9412-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9412-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9412-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9412-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9412-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9412-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9412-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9412-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9412-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9412-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9412-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9412-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9412-- Scanning root segment: 0x701a000..0x701afff (4096)
--9412-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9412-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9412-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9412-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9412-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9412-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9412-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9412-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9413==
==9413== HEAP SUMMARY:
==9413== in use at exit: 3,122,842 bytes in 69,142 blocks
==9413== total heap usage: 935,632 allocs, 866,490 frees, 66,708,096 bytes allocated
==9413==
==9413== Searching for pointers to 69,142 not-freed blocks
--9413-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9413-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9413-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9413-- Scanning root segment: 0x4037000..0x403afff (16384)
--9413-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9413-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9413-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9413-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9413-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9413-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9413-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9413-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9413-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9413-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9413-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9413-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9413-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9413-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9413-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9413-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9413-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9413-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9413-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9413-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9413-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9413-- Scanning root segment: 0x701a000..0x701afff (4096)
--9413-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9413-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9413-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9413-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9413-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9413-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9413-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9413-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9410== Checked 4,777,920 bytes
==9410==
==9410== LEAK SUMMARY:
==9410== definitely lost: 1,533 bytes in 8 blocks
==9410== indirectly lost: 6,756 bytes in 7 blocks
==9410== possibly lost: 0 bytes in 0 blocks
==9410== still reachable: 3,107,513 bytes in 68,893 blocks
==9410== suppressed: 0 bytes in 0 blocks
==9410== Rerun with --leak-check=full to see details of leaked memory
==9410==
==9410== Use --track-origins=yes to see where uninitialised values come from
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9410==
==9410== 1 errors in context 1 of 2:
==9410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9410== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9410== by 0x488CD0: stringsubst (subst.c:301)
==9410== by 0x48801B: prefork (subst.c:77)
==9410== by 0x42B318: execcmd (exec.c:2619)
==9410== by 0x428CA0: execpline2 (exec.c:1697)
==9410== by 0x427FD2: execpline (exec.c:1484)
==9410== by 0x427756: execlist (exec.c:1267)
==9410== by 0x42717C: execode (exec.c:1073)
==9410== by 0x431299: runshfunc (exec.c:5040)
==9410== by 0x430E76: doshfunc (exec.c:4920)
==9410== by 0x4302FB: execshfunc (exec.c:4557)
==9410== by 0x42D8C1: execcmd (exec.c:3373)
==9410==
==9410==
==9410== 2 errors in context 2 of 2:
==9410== Conditional jump or move depends on uninitialised value(s)
==9410== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9410== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9410== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9410== by 0x40EFC2: execbuiltin (builtin.c:450)
==9410== by 0x42D8E9: execcmd (exec.c:3378)
==9410== by 0x428CA0: execpline2 (exec.c:1697)
==9410== by 0x427FD2: execpline (exec.c:1484)
==9410== by 0x42779A: execlist (exec.c:1275)
==9410== by 0x42717C: execode (exec.c:1073)
==9410== by 0x431299: runshfunc (exec.c:5040)
==9410== by 0x430E76: doshfunc (exec.c:4920)
==9410== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9410==
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412== Checked 4,852,480 bytes
==9412==
--9414-- Caught __NR_exit; running __libc_freeres()
==9412== LEAK SUMMARY:
==9412== definitely lost: 1,533 bytes in 8 blocks
==9412== indirectly lost: 6,756 bytes in 7 blocks
==9412== possibly lost: 0 bytes in 0 blocks
==9412== still reachable: 3,140,525 bytes in 69,383 blocks
==9412== suppressed: 0 bytes in 0 blocks
==9412== Rerun with --leak-check=full to see details of leaked memory
==9412==
==9412== Use --track-origins=yes to see where uninitialised values come from
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412==
==9412== 1 errors in context 1 of 2:
==9412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9412== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9412== by 0x488CD0: stringsubst (subst.c:301)
==9412== by 0x48801B: prefork (subst.c:77)
==9412== by 0x42B318: execcmd (exec.c:2619)
==9412== by 0x428CA0: execpline2 (exec.c:1697)
==9412== by 0x427FD2: execpline (exec.c:1484)
==9412== by 0x427756: execlist (exec.c:1267)
==9412== by 0x42717C: execode (exec.c:1073)
==9412== by 0x431299: runshfunc (exec.c:5040)
==9412== by 0x430E76: doshfunc (exec.c:4920)
==9412== by 0x4302FB: execshfunc (exec.c:4557)
==9412== by 0x42D8C1: execcmd (exec.c:3373)
==9412==
==9412==
==9412== 2 errors in context 2 of 2:
==9412== Conditional jump or move depends on uninitialised value(s)
==9412== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9412== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9412== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9412== by 0x40EFC2: execbuiltin (builtin.c:450)
==9412== by 0x42D8E9: execcmd (exec.c:3378)
==9412== by 0x428CA0: execpline2 (exec.c:1697)
==9412== by 0x427FD2: execpline (exec.c:1484)
==9412== by 0x42779A: execlist (exec.c:1275)
==9412== by 0x42717C: execode (exec.c:1073)
==9412== by 0x431299: runshfunc (exec.c:5040)
==9412== by 0x430E76: doshfunc (exec.c:4920)
==9412== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9412==
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9414-by-pythonnut-on-???
==9414== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9414-by-pythonnut-on-???
==9414== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9414-by-pythonnut-on-???
==9414==
==9414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9414== don't want to do, unless you know exactly what you're doing,
==9414== or are doing some strange experiment):
==9414== /usr/lib/valgrind/../../bin/vgdb --pid=9414 ...command...
==9414==
==9414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9414== /path/to/gdb ./zsh
==9414== and then give GDB the following command
==9414== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9414
==9414== --pid is optional if only one valgrind process is running
==9414==
--9411-- Caught __NR_exit; running __libc_freeres()
==9413== Checked 4,806,440 bytes
==9413==
--9414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9414==
==9414== HEAP SUMMARY:
==9414== in use at exit: 3,115,962 bytes in 68,909 blocks
==9414== total heap usage: 935,528 allocs, 866,619 frees, 66,344,523 bytes allocated
==9414==
--9411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== LEAK SUMMARY:
==9413== definitely lost: 1,533 bytes in 8 blocks
==9413== indirectly lost: 6,756 bytes in 7 blocks
==9413== possibly lost: 0 bytes in 0 blocks
==9413== still reachable: 3,114,553 bytes in 69,127 blocks
==9413== suppressed: 0 bytes in 0 blocks
==9413== Rerun with --leak-check=full to see details of leaked memory
==9413==
==9413== Use --track-origins=yes to see where uninitialised values come from
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9413==
==9413== 1 errors in context 1 of 2:
==9413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9413== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9413== by 0x488CD0: stringsubst (subst.c:301)
==9413== by 0x48801B: prefork (subst.c:77)
==9413== by 0x42B318: execcmd (exec.c:2619)
==9413== by 0x428CA0: execpline2 (exec.c:1697)
==9413== by 0x427FD2: execpline (exec.c:1484)
==9413== by 0x427756: execlist (exec.c:1267)
==9413== by 0x42717C: execode (exec.c:1073)
==9413== by 0x431299: runshfunc (exec.c:5040)
==9413== by 0x430E76: doshfunc (exec.c:4920)
==9413== by 0x4302FB: execshfunc (exec.c:4557)
==9413== by 0x42D8C1: execcmd (exec.c:3373)
==9413==
==9413==
==9413== 2 errors in context 2 of 2:
==9413== Conditional jump or move depends on uninitialised value(s)
==9413== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9413== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9413== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9413== by 0x40EFC2: execbuiltin (builtin.c:450)
==9413== by 0x42D8E9: execcmd (exec.c:3378)
==9413== by 0x428CA0: execpline2 (exec.c:1697)
==9413== by 0x427FD2: execpline (exec.c:1484)
==9413== by 0x42779A: execlist (exec.c:1275)
==9413== by 0x42717C: execode (exec.c:1073)
==9413== by 0x431299: runshfunc (exec.c:5040)
==9413== by 0x430E76: doshfunc (exec.c:4920)
==9413== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9413==
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411==
==9411== HEAP SUMMARY:
==9411== in use at exit: 3,146,532 bytes in 69,318 blocks
==9411== total heap usage: 939,168 allocs, 869,850 frees, 68,115,323 bytes allocated
==9411==
==9415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9415-by-pythonnut-on-???
==9415== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9415-by-pythonnut-on-???
==9415== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9415-by-pythonnut-on-???
==9415==
==9415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9415== don't want to do, unless you know exactly what you're doing,
==9415== or are doing some strange experiment):
==9415== /usr/lib/valgrind/../../bin/vgdb --pid=9415 ...command...
==9415==
==9415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9415== /path/to/gdb ./zsh
==9415== and then give GDB the following command
==9415== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9415
==9415== --pid is optional if only one valgrind process is running
==9415==
==9414== Searching for pointers to 68,909 not-freed blocks
--9414-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9414-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9414-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9414-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9414-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9414-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9414-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9414-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9414-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9414-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9414-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9414-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9414-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9414-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9414-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9414-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9414-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9414-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9414-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9414-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9414-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9414-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9414-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9414-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9414-- Scanning root segment: 0x701a000..0x701afff (4096)
--9414-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9414-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9414-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9414-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9414-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9414-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9414-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9414-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9414-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Caught __NR_exit; running __libc_freeres()
==9411== Searching for pointers to 69,318 not-freed blocks
--9411-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9411-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9411-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9411-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9411-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9411-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9411-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9411-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9411-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9411-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9411-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9411-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9411-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9411-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9411-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9411-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9411-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9411-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9411-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9411-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9411-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9411-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9411-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9411-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9411-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9411-- Scanning root segment: 0x701a000..0x701afff (4096)
--9411-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9411-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9411-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9411-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9411-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9411-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9411-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9411-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9411-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9415==
==9415== HEAP SUMMARY:
==9415== in use at exit: 3,122,841 bytes in 69,142 blocks
==9415== total heap usage: 935,661 allocs, 866,519 frees, 66,713,972 bytes allocated
==9415==
==9415== Searching for pointers to 69,142 not-freed blocks
--9415-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9415-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9415-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9415-- Scanning root segment: 0x4037000..0x403afff (16384)
--9415-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9415-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9415-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9415-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9415-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9415-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9415-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9415-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9415-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9415-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9415-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9415-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9415-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9415-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9415-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9415-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9415-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9415-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9415-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9415-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9415-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9415-- Scanning root segment: 0x701a000..0x701afff (4096)
--9415-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9415-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9415-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9415-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9415-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9415-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9415-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9415-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9415-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9414== Checked 4,777,264 bytes
==9414==
==9411== Checked 4,848,504 bytes
==9411==
==9414== LEAK SUMMARY:
==9414== definitely lost: 1,533 bytes in 8 blocks
==9414== indirectly lost: 6,756 bytes in 7 blocks
==9414== possibly lost: 0 bytes in 0 blocks
==9414== still reachable: 3,107,673 bytes in 68,894 blocks
==9414== suppressed: 0 bytes in 0 blocks
==9414== Rerun with --leak-check=full to see details of leaked memory
==9414==
==9414== Use --track-origins=yes to see where uninitialised values come from
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414==
==9414== 1 errors in context 1 of 2:
==9414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9414== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9414== by 0x488CD0: stringsubst (subst.c:301)
==9414== by 0x48801B: prefork (subst.c:77)
==9414== by 0x42B318: execcmd (exec.c:2619)
==9414== by 0x428CA0: execpline2 (exec.c:1697)
==9414== by 0x427FD2: execpline (exec.c:1484)
==9414== by 0x427756: execlist (exec.c:1267)
==9414== by 0x42717C: execode (exec.c:1073)
==9414== by 0x431299: runshfunc (exec.c:5040)
==9414== by 0x430E76: doshfunc (exec.c:4920)
==9414== by 0x4302FB: execshfunc (exec.c:4557)
==9414== by 0x42D8C1: execcmd (exec.c:3373)
==9414==
==9414==
==9414== 2 errors in context 2 of 2:
==9414== Conditional jump or move depends on uninitialised value(s)
==9414== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9414== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9414== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9414== by 0x40EFC2: execbuiltin (builtin.c:450)
==9414== by 0x42D8E9: execcmd (exec.c:3378)
==9414== by 0x428CA0: execpline2 (exec.c:1697)
==9414== by 0x427FD2: execpline (exec.c:1484)
==9414== by 0x42779A: execlist (exec.c:1275)
==9414== by 0x42717C: execode (exec.c:1073)
==9414== by 0x431299: runshfunc (exec.c:5040)
==9414== by 0x430E76: doshfunc (exec.c:4920)
==9414== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9414==
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== LEAK SUMMARY:
==9411== definitely lost: 1,533 bytes in 8 blocks
==9411== indirectly lost: 6,756 bytes in 7 blocks
==9411== possibly lost: 0 bytes in 0 blocks
==9411== still reachable: 3,138,243 bytes in 69,303 blocks
==9411== suppressed: 0 bytes in 0 blocks
==9411== Rerun with --leak-check=full to see details of leaked memory
==9411==
==9411== Use --track-origins=yes to see where uninitialised values come from
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411==
==9411== 1 errors in context 1 of 2:
==9411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9411== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9411== by 0x488CD0: stringsubst (subst.c:301)
==9411== by 0x48801B: prefork (subst.c:77)
==9411== by 0x42B318: execcmd (exec.c:2619)
==9411== by 0x428CA0: execpline2 (exec.c:1697)
==9411== by 0x427FD2: execpline (exec.c:1484)
==9411== by 0x427756: execlist (exec.c:1267)
==9411== by 0x42717C: execode (exec.c:1073)
==9411== by 0x431299: runshfunc (exec.c:5040)
==9411== by 0x430E76: doshfunc (exec.c:4920)
==9411== by 0x4302FB: execshfunc (exec.c:4557)
==9411== by 0x42D8C1: execcmd (exec.c:3373)
==9411==
==9411==
==9411== 2 errors in context 2 of 2:
==9411== Conditional jump or move depends on uninitialised value(s)
==9411== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9411== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9411== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9411== by 0x40EFC2: execbuiltin (builtin.c:450)
==9411== by 0x42D8E9: execcmd (exec.c:3378)
==9411== by 0x428CA0: execpline2 (exec.c:1697)
==9411== by 0x427FD2: execpline (exec.c:1484)
==9411== by 0x42779A: execlist (exec.c:1275)
==9411== by 0x42717C: execode (exec.c:1073)
==9411== by 0x431299: runshfunc (exec.c:5040)
==9411== by 0x430E76: doshfunc (exec.c:4920)
==9411== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9411==
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9417-by-pythonnut-on-???
==9417== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9417-by-pythonnut-on-???
==9417== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9417-by-pythonnut-on-???
==9417==
==9417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9417== don't want to do, unless you know exactly what you're doing,
==9417== or are doing some strange experiment):
==9417== /usr/lib/valgrind/../../bin/vgdb --pid=9417 ...command...
==9417==
==9417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9417== /path/to/gdb ./zsh
==9417== and then give GDB the following command
==9417== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9417
==9417== --pid is optional if only one valgrind process is running
==9417==
==9416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9416-by-pythonnut-on-???
==9416== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9416-by-pythonnut-on-???
==9416== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9416-by-pythonnut-on-???
==9416==
==9416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9416== don't want to do, unless you know exactly what you're doing,
==9416== or are doing some strange experiment):
==9416== /usr/lib/valgrind/../../bin/vgdb --pid=9416 ...command...
==9416==
==9416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9416== /path/to/gdb ./zsh
==9416== and then give GDB the following command
==9416== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9416
==9416== --pid is optional if only one valgrind process is running
==9416==
--9416-- Caught __NR_exit; running __libc_freeres()
==9415== Checked 4,806,440 bytes
==9415==
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==9418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9418-by-pythonnut-on-???
==9418== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9418-by-pythonnut-on-???
==9418== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9418-by-pythonnut-on-???
==9418==
==9418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9418== don't want to do, unless you know exactly what you're doing,
==9418== or are doing some strange experiment):
==9418== /usr/lib/valgrind/../../bin/vgdb --pid=9418 ...command...
==9418==
==9418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9418== /path/to/gdb ./zsh
==9418== and then give GDB the following command
==9418== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9418
==9418== --pid is optional if only one valgrind process is running
==9418==
--9418-- Caught __NR_exit; running __libc_freeres()
--9416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9416==
==9415== LEAK SUMMARY:
==9415== definitely lost: 1,533 bytes in 8 blocks
==9415== indirectly lost: 6,756 bytes in 7 blocks
==9415== possibly lost: 0 bytes in 0 blocks
==9415== still reachable: 3,114,552 bytes in 69,127 blocks
==9415== suppressed: 0 bytes in 0 blocks
==9415== Rerun with --leak-check=full to see details of leaked memory
==9415==
==9415== Use --track-origins=yes to see where uninitialised values come from
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9415==
==9415== 1 errors in context 1 of 2:
==9415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9415== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9415== by 0x488CD0: stringsubst (subst.c:301)
==9415== by 0x48801B: prefork (subst.c:77)
==9415== by 0x42B318: execcmd (exec.c:2619)
==9415== by 0x428CA0: execpline2 (exec.c:1697)
==9415== by 0x427FD2: execpline (exec.c:1484)
==9415== by 0x427756: execlist (exec.c:1267)
==9415== by 0x42717C: execode (exec.c:1073)
==9415== by 0x431299: runshfunc (exec.c:5040)
==9415== by 0x430E76: doshfunc (exec.c:4920)
==9415== by 0x4302FB: execshfunc (exec.c:4557)
==9415== by 0x42D8C1: execcmd (exec.c:3373)
==9415==
==9415==
==9415== 2 errors in context 2 of 2:
==9415== Conditional jump or move depends on uninitialised value(s)
==9415== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9415== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9415== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9415== by 0x40EFC2: execbuiltin (builtin.c:450)
==9415== by 0x42D8E9: execcmd (exec.c:3378)
==9415== by 0x428CA0: execpline2 (exec.c:1697)
==9415== by 0x427FD2: execpline (exec.c:1484)
==9415== by 0x42779A: execlist (exec.c:1275)
==9415== by 0x42717C: execode (exec.c:1073)
==9415== by 0x431299: runshfunc (exec.c:5040)
==9415== by 0x430E76: doshfunc (exec.c:4920)
==9415== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9415==
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416== HEAP SUMMARY:
==9416== in use at exit: 3,116,136 bytes in 68,914 blocks
==9416== total heap usage: 935,575 allocs, 866,661 frees, 66,353,475 bytes allocated
==9416==
==9419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9419-by-pythonnut-on-???
==9419== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9419-by-pythonnut-on-???
==9419== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9419-by-pythonnut-on-???
==9419==
==9419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9419== don't want to do, unless you know exactly what you're doing,
==9419== or are doing some strange experiment):
==9419== /usr/lib/valgrind/../../bin/vgdb --pid=9419 ...command...
==9419==
==9419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9419== /path/to/gdb ./zsh
==9419== and then give GDB the following command
==9419== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9419
==9419== --pid is optional if only one valgrind process is running
==9419==
--9418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9419-- Caught __NR_exit; running __libc_freeres()
==9418==
==9416== Searching for pointers to 68,914 not-freed blocks
--9416-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9416-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9416-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9416-- Scanning root segment: 0x4049000..0x404cfff (16384)
==9418== HEAP SUMMARY:
==9418== in use at exit: 3,149,061 bytes in 69,406 blocks
==9418== total heap usage: 939,280 allocs, 869,874 frees, 68,317,433 bytes allocated
==9418==
--9416-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9416-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9416-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9416-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9416-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9416-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9416-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9416-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9416-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9416-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9416-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9416-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9416-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9416-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9416-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9416-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9416-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9416-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9416-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9416-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9416-- Scanning root segment: 0x701a000..0x701afff (4096)
--9416-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9416-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9416-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9416-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9416-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9416-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9416-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9416-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9416-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9418== Searching for pointers to 69,406 not-freed blocks
--9418-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9418-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9419==
--9418-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9418-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9418-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9418-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9418-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9418-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9418-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9418-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9418-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9418-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9418-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9418-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9418-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9418-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9418-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9418-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9418-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9418-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9418-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9418-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9419== HEAP SUMMARY:
==9419== in use at exit: 3,122,843 bytes in 69,142 blocks
==9419== total heap usage: 935,690 allocs, 866,548 frees, 66,719,849 bytes allocated
==9419==
--9418-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9418-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9418-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9418-- Scanning root segment: 0x701a000..0x701afff (4096)
--9418-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9418-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9418-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9418-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9418-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9418-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9418-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9418-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9418-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9419== Searching for pointers to 69,142 not-freed blocks
--9419-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9419-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9419-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9419-- Scanning root segment: 0x4037000..0x403afff (16384)
--9419-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9419-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9419-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9419-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9419-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9419-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9419-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9419-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9419-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9419-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9419-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9419-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9419-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9419-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9419-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9419-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9419-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9419-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9419-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9419-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9419-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9419-- Scanning root segment: 0x701a000..0x701afff (4096)
--9419-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9419-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9419-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9419-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9419-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9419-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9419-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9419-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9419-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9416== Checked 4,756,384 bytes
==9416==
==9416== LEAK SUMMARY:
==9416== definitely lost: 1,533 bytes in 8 blocks
==9416== indirectly lost: 6,756 bytes in 7 blocks
==9416== possibly lost: 0 bytes in 0 blocks
==9416== still reachable: 3,107,847 bytes in 68,899 blocks
==9416== suppressed: 0 bytes in 0 blocks
==9416== Rerun with --leak-check=full to see details of leaked memory
==9416==
==9416== Use --track-origins=yes to see where uninitialised values come from
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416==
==9416== 1 errors in context 1 of 2:
==9416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9416== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9416== by 0x488CD0: stringsubst (subst.c:301)
==9416== by 0x48801B: prefork (subst.c:77)
==9416== by 0x42B318: execcmd (exec.c:2619)
==9416== by 0x428CA0: execpline2 (exec.c:1697)
==9416== by 0x427FD2: execpline (exec.c:1484)
==9416== by 0x427756: execlist (exec.c:1267)
==9416== by 0x42717C: execode (exec.c:1073)
==9416== by 0x431299: runshfunc (exec.c:5040)
==9416== by 0x430E76: doshfunc (exec.c:4920)
==9416== by 0x4302FB: execshfunc (exec.c:4557)
==9416== by 0x42D8C1: execcmd (exec.c:3373)
==9416==
==9416==
==9416== 2 errors in context 2 of 2:
==9416== Conditional jump or move depends on uninitialised value(s)
==9416== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9416== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9416== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9416== by 0x40EFC2: execbuiltin (builtin.c:450)
==9416== by 0x42D8E9: execcmd (exec.c:3378)
==9416== by 0x428CA0: execpline2 (exec.c:1697)
==9416== by 0x427FD2: execpline (exec.c:1484)
==9416== by 0x42779A: execlist (exec.c:1275)
==9416== by 0x42717C: execode (exec.c:1073)
==9416== by 0x431299: runshfunc (exec.c:5040)
==9416== by 0x430E76: doshfunc (exec.c:4920)
==9416== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9416==
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418== Checked 4,853,208 bytes
==9418==
--9420-- Caught __NR_exit; running __libc_freeres()
==9420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9420-by-pythonnut-on-???
==9420== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9420-by-pythonnut-on-???
==9420== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9420-by-pythonnut-on-???
==9420==
==9420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9420== don't want to do, unless you know exactly what you're doing,
==9420== or are doing some strange experiment):
==9420== /usr/lib/valgrind/../../bin/vgdb --pid=9420 ...command...
==9420==
==9420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9420== /path/to/gdb ./zsh
==9420== and then give GDB the following command
==9420== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9420
==9420== --pid is optional if only one valgrind process is running
==9420==
==9418== LEAK SUMMARY:
==9418== definitely lost: 1,533 bytes in 8 blocks
==9418== indirectly lost: 6,756 bytes in 7 blocks
==9418== possibly lost: 0 bytes in 0 blocks
==9418== still reachable: 3,140,772 bytes in 69,391 blocks
==9418== suppressed: 0 bytes in 0 blocks
==9418== Rerun with --leak-check=full to see details of leaked memory
==9418==
==9418== Use --track-origins=yes to see where uninitialised values come from
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418==
==9418== 1 errors in context 1 of 2:
==9418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9418== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9418== by 0x488CD0: stringsubst (subst.c:301)
==9418== by 0x48801B: prefork (subst.c:77)
==9418== by 0x42B318: execcmd (exec.c:2619)
==9418== by 0x428CA0: execpline2 (exec.c:1697)
==9418== by 0x427FD2: execpline (exec.c:1484)
==9418== by 0x427756: execlist (exec.c:1267)
==9418== by 0x42717C: execode (exec.c:1073)
==9418== by 0x431299: runshfunc (exec.c:5040)
==9418== by 0x430E76: doshfunc (exec.c:4920)
==9418== by 0x4302FB: execshfunc (exec.c:4557)
==9418== by 0x42D8C1: execcmd (exec.c:3373)
==9418==
==9418==
==9418== 2 errors in context 2 of 2:
==9418== Conditional jump or move depends on uninitialised value(s)
==9418== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9418== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9418== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9418== by 0x40EFC2: execbuiltin (builtin.c:450)
==9418== by 0x42D8E9: execcmd (exec.c:3378)
==9418== by 0x428CA0: execpline2 (exec.c:1697)
==9418== by 0x427FD2: execpline (exec.c:1484)
==9418== by 0x42779A: execlist (exec.c:1275)
==9418== by 0x42717C: execode (exec.c:1073)
==9418== by 0x431299: runshfunc (exec.c:5040)
==9418== by 0x430E76: doshfunc (exec.c:4920)
==9418== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9418==
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419== Checked 4,806,440 bytes
==9419==
--9420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9417-- Caught __NR_exit; running __libc_freeres()
==9420==
==9420== HEAP SUMMARY:
==9420== in use at exit: 3,116,072 bytes in 68,914 blocks
==9420== total heap usage: 935,555 allocs, 866,641 frees, 66,351,245 bytes allocated
==9420==
==9419== LEAK SUMMARY:
==9419== definitely lost: 1,533 bytes in 8 blocks
==9419== indirectly lost: 6,756 bytes in 7 blocks
==9419== possibly lost: 0 bytes in 0 blocks
==9419== still reachable: 3,114,554 bytes in 69,127 blocks
==9419== suppressed: 0 bytes in 0 blocks
==9419== Rerun with --leak-check=full to see details of leaked memory
==9419==
==9419== Use --track-origins=yes to see where uninitialised values come from
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419==
==9419== 1 errors in context 1 of 2:
==9419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9419== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9419== by 0x488CD0: stringsubst (subst.c:301)
==9419== by 0x48801B: prefork (subst.c:77)
==9419== by 0x42B318: execcmd (exec.c:2619)
==9419== by 0x428CA0: execpline2 (exec.c:1697)
==9419== by 0x427FD2: execpline (exec.c:1484)
==9419== by 0x427756: execlist (exec.c:1267)
==9419== by 0x42717C: execode (exec.c:1073)
==9419== by 0x431299: runshfunc (exec.c:5040)
==9419== by 0x430E76: doshfunc (exec.c:4920)
==9419== by 0x4302FB: execshfunc (exec.c:4557)
==9419== by 0x42D8C1: execcmd (exec.c:3373)
==9419==
==9419==
==9419== 2 errors in context 2 of 2:
==9419== Conditional jump or move depends on uninitialised value(s)
==9419== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9419== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9419== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9419== by 0x40EFC2: execbuiltin (builtin.c:450)
==9419== by 0x42D8E9: execcmd (exec.c:3378)
==9419== by 0x428CA0: execpline2 (exec.c:1697)
==9419== by 0x427FD2: execpline (exec.c:1484)
==9419== by 0x42779A: execlist (exec.c:1275)
==9419== by 0x42717C: execode (exec.c:1073)
==9419== by 0x431299: runshfunc (exec.c:5040)
==9419== by 0x430E76: doshfunc (exec.c:4920)
==9419== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9419==
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9396-- Caught __NR_exit; running __libc_freeres()
--9417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9417==
==9417== HEAP SUMMARY:
==9417== in use at exit: 3,146,805 bytes in 69,326 blocks
==9417== total heap usage: 939,183 allocs, 869,857 frees, 68,118,236 bytes allocated
==9417==
==9420== Searching for pointers to 68,914 not-freed blocks
--9420-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9420-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9420-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9420-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9420-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9420-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9420-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9420-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9420-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9420-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9420-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9420-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9420-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9420-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9420-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9420-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9420-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9420-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9420-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9420-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9420-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9420-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9420-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9420-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9420-- Scanning root segment: 0x701a000..0x701afff (4096)
--9420-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9420-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9420-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9420-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9420-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9420-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9420-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9420-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9420-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9396==
==9396== HEAP SUMMARY:
==9396== in use at exit: 3,120,733 bytes in 69,060 blocks
==9396== total heap usage: 935,633 allocs, 866,573 frees, 66,352,818 bytes allocated
==9396==
==9417== Searching for pointers to 69,326 not-freed blocks
--9417-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9417-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9417-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9417-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9417-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9417-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9417-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9417-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9417-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9417-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9417-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9417-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9417-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9417-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9417-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9417-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9417-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9417-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9417-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9417-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9417-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9417-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9417-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9417-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9417-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9417-- Scanning root segment: 0x701a000..0x701afff (4096)
--9417-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9417-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9417-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9417-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9417-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9417-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9417-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9417-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9417-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9396== Searching for pointers to 69,060 not-freed blocks
--9396-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9396-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9396-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9396-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9396-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9396-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9396-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9396-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9396-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9396-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9396-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9396-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9396-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9396-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9396-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9396-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9396-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9396-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9396-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9396-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9396-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9396-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9396-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9396-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9396-- Scanning root segment: 0x701a000..0x701afff (4096)
--9396-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9396-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9396-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9396-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9396-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9396-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9396-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9396-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9396-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9420== Checked 4,777,296 bytes
==9420==
==9420== LEAK SUMMARY:
==9420== definitely lost: 1,533 bytes in 8 blocks
==9420== indirectly lost: 6,756 bytes in 7 blocks
==9420== possibly lost: 0 bytes in 0 blocks
==9420== still reachable: 3,107,783 bytes in 68,899 blocks
==9420== suppressed: 0 bytes in 0 blocks
==9420== Rerun with --leak-check=full to see details of leaked memory
==9420==
==9420== Use --track-origins=yes to see where uninitialised values come from
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9420==
==9420== 1 errors in context 1 of 2:
==9420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9420== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9420== by 0x488CD0: stringsubst (subst.c:301)
==9420== by 0x48801B: prefork (subst.c:77)
==9420== by 0x42B318: execcmd (exec.c:2619)
==9420== by 0x428CA0: execpline2 (exec.c:1697)
==9420== by 0x427FD2: execpline (exec.c:1484)
==9420== by 0x427756: execlist (exec.c:1267)
==9420== by 0x42717C: execode (exec.c:1073)
==9420== by 0x431299: runshfunc (exec.c:5040)
==9420== by 0x430E76: doshfunc (exec.c:4920)
==9420== by 0x4302FB: execshfunc (exec.c:4557)
==9420== by 0x42D8C1: execcmd (exec.c:3373)
==9420==
==9420==
==9420== 2 errors in context 2 of 2:
==9420== Conditional jump or move depends on uninitialised value(s)
==9420== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9420== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9420== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9420== by 0x40EFC2: execbuiltin (builtin.c:450)
==9420== by 0x42D8E9: execcmd (exec.c:3378)
==9420== by 0x428CA0: execpline2 (exec.c:1697)
==9420== by 0x427FD2: execpline (exec.c:1484)
==9420== by 0x42779A: execlist (exec.c:1275)
==9420== by 0x42717C: execode (exec.c:1073)
==9420== by 0x431299: runshfunc (exec.c:5040)
==9420== by 0x430E76: doshfunc (exec.c:4920)
==9420== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9420==
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== Checked 4,849,264 bytes
==9417==
==9396== Checked 4,785,376 bytes
==9396==
==9423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9423-by-pythonnut-on-???
==9423== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9423-by-pythonnut-on-???
==9423== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9423-by-pythonnut-on-???
==9423==
==9423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9423== don't want to do, unless you know exactly what you're doing,
==9423== or are doing some strange experiment):
==9423== /usr/lib/valgrind/../../bin/vgdb --pid=9423 ...command...
==9423==
==9423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9423== /path/to/gdb ./zsh
==9423== and then give GDB the following command
==9423== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9423
==9423== --pid is optional if only one valgrind process is running
==9423==
==9417== LEAK SUMMARY:
==9417== definitely lost: 1,533 bytes in 8 blocks
==9417== indirectly lost: 6,756 bytes in 7 blocks
==9417== possibly lost: 0 bytes in 0 blocks
==9417== still reachable: 3,138,516 bytes in 69,311 blocks
==9417== suppressed: 0 bytes in 0 blocks
==9417== Rerun with --leak-check=full to see details of leaked memory
==9417==
==9417== Use --track-origins=yes to see where uninitialised values come from
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417==
==9417== 1 errors in context 1 of 2:
==9417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9417== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9417== by 0x488CD0: stringsubst (subst.c:301)
==9417== by 0x48801B: prefork (subst.c:77)
==9417== by 0x42B318: execcmd (exec.c:2619)
==9417== by 0x428CA0: execpline2 (exec.c:1697)
==9417== by 0x427FD2: execpline (exec.c:1484)
==9417== by 0x427756: execlist (exec.c:1267)
==9417== by 0x42717C: execode (exec.c:1073)
==9417== by 0x431299: runshfunc (exec.c:5040)
==9417== by 0x430E76: doshfunc (exec.c:4920)
==9417== by 0x4302FB: execshfunc (exec.c:4557)
==9417== by 0x42D8C1: execcmd (exec.c:3373)
==9417==
==9417==
==9417== 2 errors in context 2 of 2:
==9417== Conditional jump or move depends on uninitialised value(s)
==9417== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9417== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9417== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9417== by 0x40EFC2: execbuiltin (builtin.c:450)
==9417== by 0x42D8E9: execcmd (exec.c:3378)
==9417== by 0x428CA0: execpline2 (exec.c:1697)
==9417== by 0x427FD2: execpline (exec.c:1484)
==9417== by 0x42779A: execlist (exec.c:1275)
==9417== by 0x42717C: execode (exec.c:1073)
==9417== by 0x431299: runshfunc (exec.c:5040)
==9417== by 0x430E76: doshfunc (exec.c:4920)
==9417== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9417==
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9396== LEAK SUMMARY:
==9396== definitely lost: 1,533 bytes in 8 blocks
==9396== indirectly lost: 6,756 bytes in 7 blocks
==9396== possibly lost: 0 bytes in 0 blocks
==9396== still reachable: 3,112,444 bytes in 69,045 blocks
==9396== suppressed: 0 bytes in 0 blocks
==9396== Rerun with --leak-check=full to see details of leaked memory
==9396==
==9396== Use --track-origins=yes to see where uninitialised values come from
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF73AC, len 4
==9396==
==9396== 1 errors in context 1 of 2:
==9396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9396== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9396== by 0x488CD0: stringsubst (subst.c:301)
==9396== by 0x48801B: prefork (subst.c:77)
==9396== by 0x42B318: execcmd (exec.c:2619)
==9396== by 0x428CA0: execpline2 (exec.c:1697)
==9396== by 0x427FD2: execpline (exec.c:1484)
client request: code 4d430005, addr 0xFFEFF73AC, len 4
==9396== by 0x427756: execlist (exec.c:1267)
==9396== by 0x42717C: execode (exec.c:1073)
==9396== by 0x431299: runshfunc (exec.c:5040)
==9396== by 0x430E76: doshfunc (exec.c:4920)
==9396== by 0x4302FB: execshfunc (exec.c:4557)
==9396== by 0x42D8C1: execcmd (exec.c:3373)
==9396==
==9396==
==9396== 2 errors in context 2 of 2:
==9396== Conditional jump or move depends on uninitialised value(s)
==9396== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9396== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9396== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9396== by 0x40EFC2: execbuiltin (builtin.c:450)
==9396== by 0x42D8E9: execcmd (exec.c:3378)
==9396== by 0x428CA0: execpline2 (exec.c:1697)
==9396== by 0x427FD2: execpline (exec.c:1484)
==9396== by 0x42779A: execlist (exec.c:1275)
==9396== by 0x42717C: execode (exec.c:1073)
==9396== by 0x431299: runshfunc (exec.c:5040)
==9396== by 0x430E76: doshfunc (exec.c:4920)
==9396== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9396==
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF73AC, len 4
--9423-- Caught __NR_exit; running __libc_freeres()
==9394== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9394-by-pythonnut-on-???
==9394== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9394-by-pythonnut-on-???
==9394== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9394-by-pythonnut-on-???
==9394==
==9394== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9394== don't want to do, unless you know exactly what you're doing,
==9394== or are doing some strange experiment):
==9394== /usr/lib/valgrind/../../bin/vgdb --pid=9394 ...command...
==9394==
==9394== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9394== /path/to/gdb ./zsh
==9394== and then give GDB the following command
==9394== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9394
==9394== --pid is optional if only one valgrind process is running
==9394==
--9423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFEC39C, len 4
--9394-- Caught __NR_exit; running __libc_freeres()
==9423==
==9423== HEAP SUMMARY:
==9423== in use at exit: 3,116,113 bytes in 68,915 blocks
==9423== total heap usage: 935,568 allocs, 866,653 frees, 66,353,945 bytes allocated
==9423==
--9424-- Caught __NR_exit; running __libc_freeres()
==9424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9424-by-pythonnut-on-???
==9424== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9424-by-pythonnut-on-???
==9424== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9424-by-pythonnut-on-???
==9424==
==9424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9424== don't want to do, unless you know exactly what you're doing,
==9424== or are doing some strange experiment):
==9424== /usr/lib/valgrind/../../bin/vgdb --pid=9424 ...command...
==9424==
==9424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9424== /path/to/gdb ./zsh
==9424== and then give GDB the following command
==9424== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9424
==9424== --pid is optional if only one valgrind process is running
==9424==
--9394-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9394==
==9423== Searching for pointers to 68,915 not-freed blocks
--9423-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9423-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9423-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9423-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9423-- Scanning root segment: 0x4222000..0x4222fff (4096)
==9394== HEAP SUMMARY:
==9394== in use at exit: 3,118,684 bytes in 68,988 blocks
==9394== total heap usage: 935,576 allocs, 866,588 frees, 66,358,057 bytes allocated
==9394==
--9423-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9423-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9423-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9423-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9423-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9423-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9423-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9423-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9423-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9423-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9423-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9423-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9423-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9423-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9423-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9423-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9423-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9423-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9423-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9423-- Scanning root segment: 0x701a000..0x701afff (4096)
--9423-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9423-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9423-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9423-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9423-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9423-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9423-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9423-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9423-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424==
==9424== HEAP SUMMARY:
==9424== in use at exit: 3,148,632 bytes in 69,317 blocks
==9424== total heap usage: 939,296 allocs, 869,979 frees, 68,133,699 bytes allocated
==9424==
==9394== Searching for pointers to 68,988 not-freed blocks
--9394-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9394-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9394-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9394-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9394-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9394-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9394-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9394-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9394-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9394-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9394-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9394-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9394-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9394-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9394-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9394-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9394-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9394-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9394-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9394-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9394-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9394-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9394-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9394-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9394-- Scanning root segment: 0x701a000..0x701afff (4096)
--9394-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9394-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9394-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9394-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9394-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9394-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9394-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9394-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9394-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424== Searching for pointers to 69,317 not-freed blocks
--9424-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9424-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9424-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9424-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9424-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9424-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9424-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9424-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9424-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9424-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9424-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9424-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9424-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9424-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9424-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9424-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9424-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9424-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9424-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9424-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9424-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9424-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9424-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9424-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9424-- Scanning root segment: 0x701a000..0x701afff (4096)
--9424-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9424-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9424-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9424-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9424-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9424-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9424-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9424-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9424-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9423== Checked 4,776,824 bytes
==9423==
==9423== LEAK SUMMARY:
==9423== definitely lost: 1,533 bytes in 8 blocks
==9423== indirectly lost: 6,756 bytes in 7 blocks
==9423== possibly lost: 0 bytes in 0 blocks
==9423== still reachable: 3,107,824 bytes in 68,900 blocks
==9423== suppressed: 0 bytes in 0 blocks
==9423== Rerun with --leak-check=full to see details of leaked memory
==9423==
==9423== Use --track-origins=yes to see where uninitialised values come from
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9423==
==9423== 1 errors in context 1 of 2:
==9423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9423== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9423== by 0x488CD0: stringsubst (subst.c:301)
==9423== by 0x48801B: prefork (subst.c:77)
==9423== by 0x42B318: execcmd (exec.c:2619)
==9423== by 0x428CA0: execpline2 (exec.c:1697)
==9423== by 0x427FD2: execpline (exec.c:1484)
==9423== by 0x427756: execlist (exec.c:1267)
==9423== by 0x42717C: execode (exec.c:1073)
==9423== by 0x431299: runshfunc (exec.c:5040)
==9423== by 0x430E76: doshfunc (exec.c:4920)
==9423== by 0x4302FB: execshfunc (exec.c:4557)
==9423== by 0x42D8C1: execcmd (exec.c:3373)
==9423==
==9423==
==9423== 2 errors in context 2 of 2:
==9423== Conditional jump or move depends on uninitialised value(s)
==9423== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9423== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9423== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9423== by 0x40EFC2: execbuiltin (builtin.c:450)
==9423== by 0x42D8E9: execcmd (exec.c:3378)
==9423== by 0x428CA0: execpline2 (exec.c:1697)
==9423== by 0x427FD2: execpline (exec.c:1484)
==9423== by 0x42779A: execlist (exec.c:1275)
==9423== by 0x42717C: execode (exec.c:1073)
==9423== by 0x431299: runshfunc (exec.c:5040)
==9423== by 0x430E76: doshfunc (exec.c:4920)
==9423== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9423==
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394== Checked 4,782,328 bytes
==9394==
==9424== Checked 4,849,496 bytes
==9424==
==9426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9426-by-pythonnut-on-???
==9426== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9426-by-pythonnut-on-???
==9426== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9426-by-pythonnut-on-???
==9426==
==9426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9426== don't want to do, unless you know exactly what you're doing,
==9426== or are doing some strange experiment):
==9426== /usr/lib/valgrind/../../bin/vgdb --pid=9426 ...command...
==9426==
==9426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9426== /path/to/gdb ./zsh
==9426== and then give GDB the following command
==9426== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9426
==9426== --pid is optional if only one valgrind process is running
==9426==
--9426-- Caught __NR_exit; running __libc_freeres()
==9394== LEAK SUMMARY:
==9394== definitely lost: 1,533 bytes in 8 blocks
==9394== indirectly lost: 6,756 bytes in 7 blocks
==9394== possibly lost: 0 bytes in 0 blocks
==9394== still reachable: 3,110,395 bytes in 68,973 blocks
==9394== suppressed: 0 bytes in 0 blocks
==9394== Rerun with --leak-check=full to see details of leaked memory
==9394==
==9394== Use --track-origins=yes to see where uninitialised values come from
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394==
==9394== 1 errors in context 1 of 2:
==9394== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9394== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9394== by 0x488CD0: stringsubst (subst.c:301)
==9394== by 0x48801B: prefork (subst.c:77)
==9394== by 0x42B318: execcmd (exec.c:2619)
==9394== by 0x428CA0: execpline2 (exec.c:1697)
==9394== by 0x427FD2: execpline (exec.c:1484)
==9394== by 0x427756: execlist (exec.c:1267)
==9394== by 0x42717C: execode (exec.c:1073)
==9394== by 0x431299: runshfunc (exec.c:5040)
==9394== by 0x430E76: doshfunc (exec.c:4920)
==9394== by 0x4302FB: execshfunc (exec.c:4557)
==9394== by 0x42D8C1: execcmd (exec.c:3373)
==9394==
==9394==
==9394== 2 errors in context 2 of 2:
==9394== Conditional jump or move depends on uninitialised value(s)
==9394== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9394== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9394== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9394== by 0x40EFC2: execbuiltin (builtin.c:450)
==9394== by 0x42D8E9: execcmd (exec.c:3378)
==9394== by 0x428CA0: execpline2 (exec.c:1697)
==9394== by 0x427FD2: execpline (exec.c:1484)
==9394== by 0x42779A: execlist (exec.c:1275)
==9394== by 0x42717C: execode (exec.c:1073)
==9394== by 0x431299: runshfunc (exec.c:5040)
==9394== by 0x430E76: doshfunc (exec.c:4920)
==9394== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9394==
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424== LEAK SUMMARY:
==9424== definitely lost: 1,533 bytes in 8 blocks
==9424== indirectly lost: 6,756 bytes in 7 blocks
==9424== possibly lost: 0 bytes in 0 blocks
==9424== still reachable: 3,140,343 bytes in 69,302 blocks
==9424== suppressed: 0 bytes in 0 blocks
==9424== Rerun with --leak-check=full to see details of leaked memory
==9424==
==9424== Use --track-origins=yes to see where uninitialised values come from
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424==
==9424== 1 errors in context 1 of 2:
==9424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9424== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9424== by 0x488CD0: stringsubst (subst.c:301)
==9424== by 0x48801B: prefork (subst.c:77)
==9424== by 0x42B318: execcmd (exec.c:2619)
==9424== by 0x428CA0: execpline2 (exec.c:1697)
==9424== by 0x427FD2: execpline (exec.c:1484)
==9424== by 0x427756: execlist (exec.c:1267)
==9424== by 0x42717C: execode (exec.c:1073)
==9424== by 0x431299: runshfunc (exec.c:5040)
==9424== by 0x430E76: doshfunc (exec.c:4920)
==9424== by 0x4302FB: execshfunc (exec.c:4557)
==9424== by 0x42D8C1: execcmd (exec.c:3373)
==9424==
==9424==
==9424== 2 errors in context 2 of 2:
==9424== Conditional jump or move depends on uninitialised value(s)
==9424== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9424== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9424== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9424== by 0x40EFC2: execbuiltin (builtin.c:450)
==9424== by 0x42D8E9: execcmd (exec.c:3378)
==9424== by 0x428CA0: execpline2 (exec.c:1697)
==9424== by 0x427FD2: execpline (exec.c:1484)
==9424== by 0x42779A: execlist (exec.c:1275)
==9424== by 0x42717C: execode (exec.c:1073)
==9424== by 0x431299: runshfunc (exec.c:5040)
==9424== by 0x430E76: doshfunc (exec.c:4920)
==9424== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9424==
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9427-by-pythonnut-on-???
==9427== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9427-by-pythonnut-on-???
==9427== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9427-by-pythonnut-on-???
==9427==
==9427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9427== don't want to do, unless you know exactly what you're doing,
==9427== or are doing some strange experiment):
==9427== /usr/lib/valgrind/../../bin/vgdb --pid=9427 ...command...
==9427==
==9427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9427== /path/to/gdb ./zsh
==9427== and then give GDB the following command
==9427== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9427
==9427== --pid is optional if only one valgrind process is running
==9427==
--9426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426==
==9428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9428-by-pythonnut-on-???
==9428== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9428-by-pythonnut-on-???
==9428== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9428-by-pythonnut-on-???
==9428==
==9428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9428== don't want to do, unless you know exactly what you're doing,
==9428== or are doing some strange experiment):
==9428== /usr/lib/valgrind/../../bin/vgdb --pid=9428 ...command...
==9428==
==9428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9428== /path/to/gdb ./zsh
==9428== and then give GDB the following command
==9428== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9428
==9428== --pid is optional if only one valgrind process is running
==9428==
--9429-- Caught __NR_exit; running __libc_freeres()
--9428-- Caught __NR_exit; running __libc_freeres()
==9426== HEAP SUMMARY:
==9426== in use at exit: 3,114,632 bytes in 68,855 blocks
==9426== total heap usage: 935,538 allocs, 866,683 frees, 66,356,946 bytes allocated
==9426==
==9429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9429-by-pythonnut-on-???
==9429== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9429-by-pythonnut-on-???
==9429== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9429-by-pythonnut-on-???
==9429==
==9429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9429== don't want to do, unless you know exactly what you're doing,
==9429== or are doing some strange experiment):
==9429== /usr/lib/valgrind/../../bin/vgdb --pid=9429 ...command...
==9429==
==9429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9429== /path/to/gdb ./zsh
==9429== and then give GDB the following command
==9429== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9429
==9429== --pid is optional if only one valgrind process is running
==9429==
--9428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426== Searching for pointers to 68,855 not-freed blocks
--9426-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9426-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9426-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9426-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9426-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9426-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9426-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9426-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9426-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9426-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9426-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9426-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9426-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9426-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9426-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9426-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9426-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9426-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9426-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9426-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9426-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9426-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9426-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9426-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9426-- Scanning root segment: 0x701a000..0x701afff (4096)
--9426-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9426-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9426-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9426-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9426-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9426-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9426-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9426-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9426-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9428==
==9428== HEAP SUMMARY:
==9428== in use at exit: 3,147,816 bytes in 69,273 blocks
==9428== total heap usage: 939,253 allocs, 869,980 frees, 68,133,181 bytes allocated
==9428==
==9429==
==9429== HEAP SUMMARY:
==9429== in use at exit: 3,120,437 bytes in 69,055 blocks
==9429== total heap usage: 935,488 allocs, 866,433 frees, 66,327,215 bytes allocated
==9429==
==9428== Searching for pointers to 69,273 not-freed blocks
--9428-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9428-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9428-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9428-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9428-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9428-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9428-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9428-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9428-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9428-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9428-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428-- Scanning root segment: 0x59ba000..0x59bafff (4096)
==9429== Searching for pointers to 69,055 not-freed blocks
--9428-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9429-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9429-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9429-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9429-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9428-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9429-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9428-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9429-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9429-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9429-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9429-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428-- Scanning root segment: 0x701a000..0x701afff (4096)
--9429-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9429-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9428-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9428-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9429-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9429-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9428-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9428-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9428-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9428-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9428-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9429-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429-- Scanning root segment: 0x701a000..0x701afff (4096)
--9429-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9429-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9429-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9429-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9429-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9429-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9429-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9426== Checked 4,776,280 bytes
==9426==
==9426== LEAK SUMMARY:
==9426== definitely lost: 1,533 bytes in 8 blocks
==9426== indirectly lost: 6,756 bytes in 7 blocks
==9426== possibly lost: 0 bytes in 0 blocks
==9426== still reachable: 3,106,343 bytes in 68,840 blocks
==9426== suppressed: 0 bytes in 0 blocks
==9426== Rerun with --leak-check=full to see details of leaked memory
==9426==
==9426== Use --track-origins=yes to see where uninitialised values come from
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9426==
==9426== 1 errors in context 1 of 2:
==9426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9426== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9426== by 0x488CD0: stringsubst (subst.c:301)
==9426== by 0x48801B: prefork (subst.c:77)
==9426== by 0x42B318: execcmd (exec.c:2619)
==9426== by 0x428CA0: execpline2 (exec.c:1697)
==9426== by 0x427FD2: execpline (exec.c:1484)
==9426== by 0x427756: execlist (exec.c:1267)
==9426== by 0x42717C: execode (exec.c:1073)
==9426== by 0x431299: runshfunc (exec.c:5040)
==9426== by 0x430E76: doshfunc (exec.c:4920)
==9426== by 0x4302FB: execshfunc (exec.c:4557)
==9426== by 0x42D8C1: execcmd (exec.c:3373)
==9426==
==9426==
==9426== 2 errors in context 2 of 2:
==9426== Conditional jump or move depends on uninitialised value(s)
==9426== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9426== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9426== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9426== by 0x40EFC2: execbuiltin (builtin.c:450)
==9426== by 0x42D8E9: execcmd (exec.c:3378)
==9426== by 0x428CA0: execpline2 (exec.c:1697)
==9426== by 0x427FD2: execpline (exec.c:1484)
==9426== by 0x42779A: execlist (exec.c:1275)
==9426== by 0x42717C: execode (exec.c:1073)
==9426== by 0x431299: runshfunc (exec.c:5040)
==9426== by 0x430E76: doshfunc (exec.c:4920)
==9426== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9426==
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== Checked 4,785,704 bytes
==9429==
==9428== Checked 4,848,176 bytes
==9428==
==9428== LEAK SUMMARY:
==9429== LEAK SUMMARY:
==9428== definitely lost: 1,533 bytes in 8 blocks
==9429== definitely lost: 1,533 bytes in 8 blocks
==9428== indirectly lost: 6,756 bytes in 7 blocks
==9429== indirectly lost: 6,756 bytes in 7 blocks
==9428== possibly lost: 0 bytes in 0 blocks
==9429== possibly lost: 0 bytes in 0 blocks
==9428== still reachable: 3,139,527 bytes in 69,258 blocks
==9429== still reachable: 3,112,148 bytes in 69,040 blocks
==9428== suppressed: 0 bytes in 0 blocks
==9429== suppressed: 0 bytes in 0 blocks
==9428== Rerun with --leak-check=full to see details of leaked memory
==9429== Rerun with --leak-check=full to see details of leaked memory
==9428==
==9429==
==9428== Use --track-origins=yes to see where uninitialised values come from
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9428==
==9428== 1 errors in context 1 of 2:
==9428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9429== Use --track-origins=yes to see where uninitialised values come from
==9428== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429==
==9429== 1 errors in context 1 of 2:
==9428== by 0x488CD0: stringsubst (subst.c:301)
==9429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9428== by 0x48801B: prefork (subst.c:77)
==9428== by 0x42B318: execcmd (exec.c:2619)
==9429== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9428== by 0x428CA0: execpline2 (exec.c:1697)
==9428== by 0x427FD2: execpline (exec.c:1484)
==9428== by 0x427756: execlist (exec.c:1267)
==9429== by 0x488CD0: stringsubst (subst.c:301)
==9428== by 0x42717C: execode (exec.c:1073)
==9429== by 0x48801B: prefork (subst.c:77)
==9428== by 0x431299: runshfunc (exec.c:5040)
==9428== by 0x430E76: doshfunc (exec.c:4920)
==9429== by 0x42B318: execcmd (exec.c:2619)
==9428== by 0x4302FB: execshfunc (exec.c:4557)
==9429== by 0x428CA0: execpline2 (exec.c:1697)
==9428== by 0x42D8C1: execcmd (exec.c:3373)
==9428==
==9429== by 0x427FD2: execpline (exec.c:1484)
==9429== by 0x427756: execlist (exec.c:1267)
==9428==
==9429== by 0x42717C: execode (exec.c:1073)
==9428== 2 errors in context 2 of 2:
==9429== by 0x431299: runshfunc (exec.c:5040)
==9428== Conditional jump or move depends on uninitialised value(s)
==9429== by 0x430E76: doshfunc (exec.c:4920)
==9428== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9429== by 0x4302FB: execshfunc (exec.c:4557)
==9428== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9429== by 0x42D8C1: execcmd (exec.c:3373)
==9428== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9429==
==9428== by 0x40EFC2: execbuiltin (builtin.c:450)
==9429==
==9428== by 0x42D8E9: execcmd (exec.c:3378)
==9429== 2 errors in context 2 of 2:
==9428== by 0x428CA0: execpline2 (exec.c:1697)
==9429== Conditional jump or move depends on uninitialised value(s)
==9428== by 0x427FD2: execpline (exec.c:1484)
==9428== by 0x42779A: execlist (exec.c:1275)
==9428== by 0x42717C: execode (exec.c:1073)
==9429== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9428== by 0x431299: runshfunc (exec.c:5040)
==9428== by 0x430E76: doshfunc (exec.c:4920)
==9429== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9428== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9428==
==9429== by 0x40EFC2: execbuiltin (builtin.c:450)
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== by 0x42D8E9: execcmd (exec.c:3378)
==9429== by 0x428CA0: execpline2 (exec.c:1697)
==9429== by 0x427FD2: execpline (exec.c:1484)
==9429== by 0x42779A: execlist (exec.c:1275)
==9429== by 0x42717C: execode (exec.c:1073)
==9429== by 0x431299: runshfunc (exec.c:5040)
==9429== by 0x430E76: doshfunc (exec.c:4920)
==9429== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429==
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9431-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==9431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9431-by-pythonnut-on-???
==9431== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9431-by-pythonnut-on-???
==9431== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9431-by-pythonnut-on-???
==9431==
==9431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9431== don't want to do, unless you know exactly what you're doing,
==9431== or are doing some strange experiment):
==9431== /usr/lib/valgrind/../../bin/vgdb --pid=9431 ...command...
==9431==
==9431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9431== /path/to/gdb ./zsh
==9431== and then give GDB the following command
==9431== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9431
==9431== --pid is optional if only one valgrind process is running
==9431==
==9434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9434-by-pythonnut-on-???
==9434== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9434-by-pythonnut-on-???
==9434== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9434-by-pythonnut-on-???
==9434==
==9434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9434== don't want to do, unless you know exactly what you're doing,
==9434== or are doing some strange experiment):
==9434== /usr/lib/valgrind/../../bin/vgdb --pid=9434 ...command...
==9434==
==9434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9434== /path/to/gdb ./zsh
==9434== and then give GDB the following command
==9434== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9434
==9434== --pid is optional if only one valgrind process is running
==9434==
client request: code 4d430005, addr 0xFFEFECF3C, len 4
--9431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9435-by-pythonnut-on-???
==9435== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9435-by-pythonnut-on-???
==9435== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9435-by-pythonnut-on-???
==9435==
==9435== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9435== don't want to do, unless you know exactly what you're doing,
==9435== or are doing some strange experiment):
==9435== /usr/lib/valgrind/../../bin/vgdb --pid=9435 ...command...
==9435==
==9435== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9435== /path/to/gdb ./zsh
==9435== and then give GDB the following command
==9435== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9435
==9435== --pid is optional if only one valgrind process is running
==9435==
==9431==
==9436== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9436-by-pythonnut-on-???
==9436== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9436-by-pythonnut-on-???
==9436== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9436-by-pythonnut-on-???
==9436==
==9436== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9436== don't want to do, unless you know exactly what you're doing,
==9436== or are doing some strange experiment):
==9436== /usr/lib/valgrind/../../bin/vgdb --pid=9436 ...command...
==9436==
==9436== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9436== /path/to/gdb ./zsh
==9436== and then give GDB the following command
==9436== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9436
==9436== --pid is optional if only one valgrind process is running
==9436==
==9431== HEAP SUMMARY:
==9431== in use at exit: 3,126,864 bytes in 69,095 blocks
==9431== total heap usage: 935,895 allocs, 866,800 frees, 66,383,889 bytes allocated
==9431==
==9438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9438-by-pythonnut-on-???
==9438== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9438-by-pythonnut-on-???
==9438== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9438-by-pythonnut-on-???
==9438==
==9438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9438== don't want to do, unless you know exactly what you're doing,
==9438== or are doing some strange experiment):
==9438== /usr/lib/valgrind/../../bin/vgdb --pid=9438 ...command...
==9438==
==9438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9438== /path/to/gdb ./zsh
==9438== and then give GDB the following command
==9438== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9438
==9438== --pid is optional if only one valgrind process is running
==9438==
client request: code 4d430005, addr 0xFFEFECD7C, len 4
--9436-- Caught __NR_exit; running __libc_freeres()
==9431== Searching for pointers to 69,095 not-freed blocks
--9431-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9431-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9431-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9431-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9431-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9431-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9431-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9431-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9431-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9431-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9431-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9431-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9431-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9431-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9431-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9431-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9431-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9431-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9431-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9431-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
client request: code 4d430005, addr 0xFFEFF493C, len 4
==9439== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9439-by-pythonnut-on-???
==9439== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9439-by-pythonnut-on-???
==9439== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9439-by-pythonnut-on-???
==9439==
==9439== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9439== don't want to do, unless you know exactly what you're doing,
==9439== or are doing some strange experiment):
==9439== /usr/lib/valgrind/../../bin/vgdb --pid=9439 ...command...
==9439==
==9439== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9439== /path/to/gdb ./zsh
==9439== and then give GDB the following command
==9439== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9439
==9439== --pid is optional if only one valgrind process is running
==9439==
--9431-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9431-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9431-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9431-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9431-- Scanning root segment: 0x701a000..0x701afff (4096)
--9431-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9431-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9431-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9431-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9431-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9431-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9431-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9431-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9431-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF493C, len 4
--9439-- Caught __NR_exit; running __libc_freeres()
--9436-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9436==
==9436== HEAP SUMMARY:
==9436== in use at exit: 3,123,411 bytes in 69,121 blocks
==9436== total heap usage: 935,623 allocs, 866,502 frees, 66,585,121 bytes allocated
==9436==
--9439-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9439==
==9439== HEAP SUMMARY:
==9439== in use at exit: 3,155,620 bytes in 69,497 blocks
==9439== total heap usage: 940,029 allocs, 870,532 frees, 68,419,357 bytes allocated
==9439==
==9436== Searching for pointers to 69,121 not-freed blocks
--9436-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9436-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9436-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9436-- Scanning root segment: 0x4037000..0x403afff (16384)
--9436-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9436-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9436-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9436-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9436-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9436-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9436-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9436-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9436-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9436-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9436-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9436-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9436-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9436-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9436-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9436-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9436-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9436-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9436-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9436-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9436-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9436-- Scanning root segment: 0x701a000..0x701afff (4096)
--9436-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9436-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9436-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9436-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9436-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9436-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9436-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9436-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9436-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== Searching for pointers to 69,497 not-freed blocks
--9439-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9439-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9439-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9439-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9439-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9439-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9439-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9439-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9439-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9439-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9439-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9439-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9439-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9439-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9439-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9439-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9439-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9439-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9439-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9439-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9439-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9439-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9439-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9439-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9439-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9439-- Scanning root segment: 0x701a000..0x701afff (4096)
--9439-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9439-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9439-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9439-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9439-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9439-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9439-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9439-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9439-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9431== Checked 4,795,624 bytes
==9431==
==9431== LEAK SUMMARY:
==9431== definitely lost: 1,533 bytes in 8 blocks
==9431== indirectly lost: 6,756 bytes in 7 blocks
==9431== possibly lost: 0 bytes in 0 blocks
==9431== still reachable: 3,118,575 bytes in 69,080 blocks
==9431== suppressed: 0 bytes in 0 blocks
==9431== Rerun with --leak-check=full to see details of leaked memory
==9431==
==9431== Use --track-origins=yes to see where uninitialised values come from
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9431==
==9431== 1 errors in context 1 of 2:
==9431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9431== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9431== by 0x488CD0: stringsubst (subst.c:301)
==9431== by 0x48801B: prefork (subst.c:77)
==9431== by 0x42B318: execcmd (exec.c:2619)
==9431== by 0x428CA0: execpline2 (exec.c:1697)
==9431== by 0x427FD2: execpline (exec.c:1484)
==9431== by 0x427756: execlist (exec.c:1267)
==9431== by 0x42717C: execode (exec.c:1073)
==9431== by 0x431299: runshfunc (exec.c:5040)
==9431== by 0x430E76: doshfunc (exec.c:4920)
==9431== by 0x4302FB: execshfunc (exec.c:4557)
==9431== by 0x42D8C1: execcmd (exec.c:3373)
==9431==
==9431==
==9431== 2 errors in context 2 of 2:
==9431== Conditional jump or move depends on uninitialised value(s)
==9431== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9431== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9431== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9431== by 0x40EFC2: execbuiltin (builtin.c:450)
==9431== by 0x42D8E9: execcmd (exec.c:3378)
==9431== by 0x428CA0: execpline2 (exec.c:1697)
==9431== by 0x427FD2: execpline (exec.c:1484)
==9431== by 0x42779A: execlist (exec.c:1275)
==9431== by 0x42717C: execode (exec.c:1073)
==9431== by 0x431299: runshfunc (exec.c:5040)
==9431== by 0x430E76: doshfunc (exec.c:4920)
==9431== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9431==
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9430-- Caught __NR_exit; running __libc_freeres()
==9430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9430-by-pythonnut-on-???
==9430== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9430-by-pythonnut-on-???
==9430== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9430-by-pythonnut-on-???
==9430==
==9430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9430== don't want to do, unless you know exactly what you're doing,
==9430== or are doing some strange experiment):
==9430== /usr/lib/valgrind/../../bin/vgdb --pid=9430 ...command...
==9430==
==9430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9430== /path/to/gdb ./zsh
==9430== and then give GDB the following command
==9430== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9430
==9430== --pid is optional if only one valgrind process is running
==9430==
--9430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9430==
==9430== HEAP SUMMARY:
==9430== in use at exit: 3,126,800 bytes in 69,092 blocks
==9430== total heap usage: 935,893 allocs, 866,801 frees, 66,383,648 bytes allocated
==9430==
==9436== Checked 4,788,224 bytes
==9436==
==9439== Checked 4,873,248 bytes
==9439==
==9436== LEAK SUMMARY:
==9436== definitely lost: 1,533 bytes in 8 blocks
==9436== indirectly lost: 6,756 bytes in 7 blocks
==9436== possibly lost: 0 bytes in 0 blocks
==9436== still reachable: 3,115,122 bytes in 69,106 blocks
==9436== suppressed: 0 bytes in 0 blocks
==9436== Rerun with --leak-check=full to see details of leaked memory
==9436==
==9436== Use --track-origins=yes to see where uninitialised values come from
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9436==
==9436== 1 errors in context 1 of 2:
==9436== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9436== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9436== by 0x488CD0: stringsubst (subst.c:301)
==9436== by 0x48801B: prefork (subst.c:77)
==9436== by 0x42B318: execcmd (exec.c:2619)
==9436== by 0x428CA0: execpline2 (exec.c:1697)
==9436== by 0x427FD2: execpline (exec.c:1484)
==9436== by 0x427756: execlist (exec.c:1267)
==9436== by 0x42717C: execode (exec.c:1073)
==9436== by 0x431299: runshfunc (exec.c:5040)
==9436== by 0x430E76: doshfunc (exec.c:4920)
==9436== by 0x4302FB: execshfunc (exec.c:4557)
==9436== by 0x42D8C1: execcmd (exec.c:3373)
==9436==
==9436==
==9436== 2 errors in context 2 of 2:
==9436== Conditional jump or move depends on uninitialised value(s)
==9436== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9436== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9436== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9436== by 0x40EFC2: execbuiltin (builtin.c:450)
==9436== by 0x42D8E9: execcmd (exec.c:3378)
==9436== by 0x428CA0: execpline2 (exec.c:1697)
==9436== by 0x427FD2: execpline (exec.c:1484)
==9436== by 0x42779A: execlist (exec.c:1275)
==9436== by 0x42717C: execode (exec.c:1073)
==9436== by 0x431299: runshfunc (exec.c:5040)
==9436== by 0x430E76: doshfunc (exec.c:4920)
==9436== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9436==
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430== Searching for pointers to 69,092 not-freed blocks
--9430-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9430-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9430-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9430-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9430-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9430-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9430-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9430-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9430-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9430-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9430-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9430-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9430-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9430-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9430-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9430-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9430-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9430-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9430-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9430-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9430-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9430-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9430-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9430-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9430-- Scanning root segment: 0x701a000..0x701afff (4096)
--9430-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9430-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9430-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9430-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9430-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9430-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9430-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9430-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9430-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== LEAK SUMMARY:
==9439== definitely lost: 1,533 bytes in 8 blocks
==9439== indirectly lost: 6,756 bytes in 7 blocks
==9439== possibly lost: 0 bytes in 0 blocks
==9439== still reachable: 3,147,331 bytes in 69,482 blocks
==9439== suppressed: 0 bytes in 0 blocks
==9439== Rerun with --leak-check=full to see details of leaked memory
==9439==
==9439== Use --track-origins=yes to see where uninitialised values come from
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9439==
==9439== 1 errors in context 1 of 2:
==9439== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9439== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9439== by 0x488CD0: stringsubst (subst.c:301)
==9439== by 0x48801B: prefork (subst.c:77)
==9439== by 0x42B318: execcmd (exec.c:2619)
==9439== by 0x428CA0: execpline2 (exec.c:1697)
==9439== by 0x427FD2: execpline (exec.c:1484)
==9439== by 0x427756: execlist (exec.c:1267)
==9439== by 0x42717C: execode (exec.c:1073)
==9439== by 0x431299: runshfunc (exec.c:5040)
==9439== by 0x430E76: doshfunc (exec.c:4920)
==9439== by 0x4302FB: execshfunc (exec.c:4557)
==9439== by 0x42D8C1: execcmd (exec.c:3373)
==9439==
==9439==
==9439== 2 errors in context 2 of 2:
==9439== Conditional jump or move depends on uninitialised value(s)
==9439== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9439== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9439== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9439== by 0x40EFC2: execbuiltin (builtin.c:450)
==9439== by 0x42D8E9: execcmd (exec.c:3378)
==9439== by 0x428CA0: execpline2 (exec.c:1697)
==9439== by 0x427FD2: execpline (exec.c:1484)
==9439== by 0x42779A: execlist (exec.c:1275)
==9439== by 0x42717C: execode (exec.c:1073)
==9439== by 0x431299: runshfunc (exec.c:5040)
==9439== by 0x430E76: doshfunc (exec.c:4920)
==9439== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9439==
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9438-- Caught __NR_exit; running __libc_freeres()
==9440== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9440-by-pythonnut-on-???
==9440== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9440-by-pythonnut-on-???
==9440== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9440-by-pythonnut-on-???
==9440==
==9440== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9440== don't want to do, unless you know exactly what you're doing,
==9440== or are doing some strange experiment):
==9440== /usr/lib/valgrind/../../bin/vgdb --pid=9440 ...command...
==9440==
==9440== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9440== /path/to/gdb ./zsh
==9440== and then give GDB the following command
==9440== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9440
==9440== --pid is optional if only one valgrind process is running
==9440==
==9441== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9441-by-pythonnut-on-???
==9441== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9441-by-pythonnut-on-???
==9441== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9441-by-pythonnut-on-???
==9441==
==9441== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9441== don't want to do, unless you know exactly what you're doing,
==9441== or are doing some strange experiment):
==9441== /usr/lib/valgrind/../../bin/vgdb --pid=9441 ...command...
==9441==
==9441== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9441== /path/to/gdb ./zsh
==9441== and then give GDB the following command
==9441== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9441
==9441== --pid is optional if only one valgrind process is running
==9441==
--9441-- Caught __NR_exit; running __libc_freeres()
--9438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9438==
==9438== HEAP SUMMARY:
==9438== in use at exit: 3,153,268 bytes in 69,417 blocks
==9438== total heap usage: 939,935 allocs, 870,518 frees, 68,220,162 bytes allocated
==9438==
--9441-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9441==
==9441== HEAP SUMMARY:
==9441== in use at exit: 3,196,790 bytes in 69,128 blocks
==9441== total heap usage: 935,631 allocs, 866,503 frees, 66,661,652 bytes allocated
==9441==
==9438== Searching for pointers to 69,417 not-freed blocks
--9438-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9438-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9438-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9438-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9438-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9438-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9438-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9438-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9438-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9438-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9438-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9438-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9438-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9438-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9438-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9438-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9438-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9438-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9438-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9438-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9438-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9438-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9438-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9438-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9438-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9438-- Scanning root segment: 0x701a000..0x701afff (4096)
--9438-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9438-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9438-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9438-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9438-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9438-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9438-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9438-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9438-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== Checked 4,794,936 bytes
==9430==
==9441== Searching for pointers to 69,128 not-freed blocks
--9441-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9441-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9441-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9441-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9441-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9441-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9441-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9441-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9441-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9441-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9441-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9441-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9441-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9441-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9441-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9441-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9441-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9441-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9441-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9441-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9441-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9441-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9441-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9441-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9441-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9441-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9441-- Scanning root segment: 0x701a000..0x701afff (4096)
--9441-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9441-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9441-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9441-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9441-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9441-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9441-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9441-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9441-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== LEAK SUMMARY:
==9430== definitely lost: 1,533 bytes in 8 blocks
==9430== indirectly lost: 6,756 bytes in 7 blocks
==9430== possibly lost: 0 bytes in 0 blocks
==9430== still reachable: 3,118,511 bytes in 69,077 blocks
==9430== suppressed: 0 bytes in 0 blocks
==9430== Rerun with --leak-check=full to see details of leaked memory
==9430==
==9430== Use --track-origins=yes to see where uninitialised values come from
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430==
==9430== 1 errors in context 1 of 2:
==9430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9430== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9430== by 0x488CD0: stringsubst (subst.c:301)
==9430== by 0x48801B: prefork (subst.c:77)
==9430== by 0x42B318: execcmd (exec.c:2619)
==9430== by 0x428CA0: execpline2 (exec.c:1697)
==9430== by 0x427FD2: execpline (exec.c:1484)
==9430== by 0x427756: execlist (exec.c:1267)
==9430== by 0x42717C: execode (exec.c:1073)
==9430== by 0x431299: runshfunc (exec.c:5040)
==9430== by 0x430E76: doshfunc (exec.c:4920)
==9430== by 0x4302FB: execshfunc (exec.c:4557)
==9430== by 0x42D8C1: execcmd (exec.c:3373)
==9430==
==9430==
==9430== 2 errors in context 2 of 2:
==9430== Conditional jump or move depends on uninitialised value(s)
==9430== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9430== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9430== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9430== by 0x40EFC2: execbuiltin (builtin.c:450)
==9430== by 0x42D8E9: execcmd (exec.c:3378)
==9430== by 0x428CA0: execpline2 (exec.c:1697)
==9430== by 0x427FD2: execpline (exec.c:1484)
==9430== by 0x42779A: execlist (exec.c:1275)
==9430== by 0x42717C: execode (exec.c:1073)
==9430== by 0x431299: runshfunc (exec.c:5040)
==9430== by 0x430E76: doshfunc (exec.c:4920)
==9430== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9430==
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9442-by-pythonnut-on-???
==9442== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9442-by-pythonnut-on-???
==9442== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9442-by-pythonnut-on-???
==9442==
==9442== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9442== don't want to do, unless you know exactly what you're doing,
==9442== or are doing some strange experiment):
==9442== /usr/lib/valgrind/../../bin/vgdb --pid=9442 ...command...
==9442==
==9442== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9442== /path/to/gdb ./zsh
==9442== and then give GDB the following command
==9442== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9442
==9442== --pid is optional if only one valgrind process is running
==9442==
--9442-- Caught __NR_exit; running __libc_freeres()
--9442-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9442==
==9442== HEAP SUMMARY:
==9442== in use at exit: 3,126,807 bytes in 69,092 blocks
==9442== total heap usage: 935,908 allocs, 866,816 frees, 66,388,646 bytes allocated
==9442==
==9438== Checked 4,852,816 bytes
==9438==
==9442== Searching for pointers to 69,092 not-freed blocks
--9442-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9442-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9442-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9442-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9442-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9442-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9442-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9442-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9442-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9442-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9442-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9442-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9442-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9442-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9442-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9442-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9442-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9442-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9442-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9442-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9442-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9442-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9442-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9442-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9442-- Scanning root segment: 0x701a000..0x701afff (4096)
--9442-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9442-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9442-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9442-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9442-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9442-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9442-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9442-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9442-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9438== LEAK SUMMARY:
==9438== definitely lost: 1,533 bytes in 8 blocks
==9438== indirectly lost: 6,756 bytes in 7 blocks
==9438== possibly lost: 0 bytes in 0 blocks
==9438== still reachable: 3,144,979 bytes in 69,402 blocks
==9438== suppressed: 0 bytes in 0 blocks
==9438== Rerun with --leak-check=full to see details of leaked memory
==9438==
==9438== Use --track-origins=yes to see where uninitialised values come from
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9438==
==9438== 1 errors in context 1 of 2:
==9438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9438== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9438== by 0x488CD0: stringsubst (subst.c:301)
==9438== by 0x48801B: prefork (subst.c:77)
==9438== by 0x42B318: execcmd (exec.c:2619)
==9438== by 0x428CA0: execpline2 (exec.c:1697)
==9438== by 0x427FD2: execpline (exec.c:1484)
==9438== by 0x427756: execlist (exec.c:1267)
==9438== by 0x42717C: execode (exec.c:1073)
==9438== by 0x431299: runshfunc (exec.c:5040)
==9438== by 0x430E76: doshfunc (exec.c:4920)
==9438== by 0x4302FB: execshfunc (exec.c:4557)
==9438== by 0x42D8C1: execcmd (exec.c:3373)
==9438==
==9438==
==9438== 2 errors in context 2 of 2:
==9438== Conditional jump or move depends on uninitialised value(s)
==9438== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9438== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9438== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9438== by 0x40EFC2: execbuiltin (builtin.c:450)
==9438== by 0x42D8E9: execcmd (exec.c:3378)
==9438== by 0x428CA0: execpline2 (exec.c:1697)
==9438== by 0x427FD2: execpline (exec.c:1484)
==9438== by 0x42779A: execlist (exec.c:1275)
==9438== by 0x42717C: execode (exec.c:1073)
==9438== by 0x431299: runshfunc (exec.c:5040)
==9438== by 0x430E76: doshfunc (exec.c:4920)
==9438== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9438==
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441== Checked 4,973,128 bytes
==9441==
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
==9441== LEAK SUMMARY:
==9441== definitely lost: 1,533 bytes in 8 blocks
==9441== indirectly lost: 6,756 bytes in 7 blocks
==9441== possibly lost: 0 bytes in 0 blocks
==9441== still reachable: 3,188,501 bytes in 69,113 blocks
==9441== suppressed: 0 bytes in 0 blocks
==9441== Rerun with --leak-check=full to see details of leaked memory
==9441==
==9441== Use --track-origins=yes to see where uninitialised values come from
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441==
==9441== 1 errors in context 1 of 2:
==9441== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9441== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9441== by 0x488CD0: stringsubst (subst.c:301)
==9441== by 0x48801B: prefork (subst.c:77)
==9441== by 0x42B318: execcmd (exec.c:2619)
==9441== by 0x428CA0: execpline2 (exec.c:1697)
==9441== by 0x427FD2: execpline (exec.c:1484)
==9441== by 0x427756: execlist (exec.c:1267)
==9441== by 0x42717C: execode (exec.c:1073)
==9441== by 0x431299: runshfunc (exec.c:5040)
==9441== by 0x430E76: doshfunc (exec.c:4920)
==9441== by 0x4302FB: execshfunc (exec.c:4557)
==9441== by 0x42D8C1: execcmd (exec.c:3373)
==9441==
==9441==
==9441== 2 errors in context 2 of 2:
==9441== Conditional jump or move depends on uninitialised value(s)
==9441== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9441== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9441== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9441== by 0x40EFC2: execbuiltin (builtin.c:450)
==9441== by 0x42D8E9: execcmd (exec.c:3378)
==9441== by 0x428CA0: execpline2 (exec.c:1697)
==9441== by 0x427FD2: execpline (exec.c:1484)
==9441== by 0x42779A: execlist (exec.c:1275)
==9441== by 0x42717C: execode (exec.c:1073)
==9441== by 0x431299: runshfunc (exec.c:5040)
==9441== by 0x430E76: doshfunc (exec.c:4920)
==9441== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9441==
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9445-by-pythonnut-on-???
==9445== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9445-by-pythonnut-on-???
==9445== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9445-by-pythonnut-on-???
==9445==
==9445== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9445== don't want to do, unless you know exactly what you're doing,
==9445== or are doing some strange experiment):
==9445== /usr/lib/valgrind/../../bin/vgdb --pid=9445 ...command...
==9445==
==9445== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9445== /path/to/gdb ./zsh
==9445== and then give GDB the following command
==9445== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9445
==9445== --pid is optional if only one valgrind process is running
==9445==
==9446== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9446-by-pythonnut-on-???
==9446== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9446-by-pythonnut-on-???
==9446== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9446-by-pythonnut-on-???
==9446==
==9446== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9446== don't want to do, unless you know exactly what you're doing,
==9446== or are doing some strange experiment):
==9446== /usr/lib/valgrind/../../bin/vgdb --pid=9446 ...command...
==9446==
==9446== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9446== /path/to/gdb ./zsh
==9446== and then give GDB the following command
==9446== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9446
==9446== --pid is optional if only one valgrind process is running
==9446==
--9446-- Caught __NR_exit; running __libc_freeres()
--9446-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9446==
==9442== Checked 4,795,080 bytes
==9442==
==9446== HEAP SUMMARY:
==9446== in use at exit: 3,161,803 bytes in 69,586 blocks
==9446== total heap usage: 940,249 allocs, 870,663 frees, 68,480,976 bytes allocated
==9446==
==9442== LEAK SUMMARY:
==9442== definitely lost: 1,533 bytes in 8 blocks
==9442== indirectly lost: 6,756 bytes in 7 blocks
==9442== possibly lost: 0 bytes in 0 blocks
==9442== still reachable: 3,118,518 bytes in 69,077 blocks
==9442== suppressed: 0 bytes in 0 blocks
==9442== Rerun with --leak-check=full to see details of leaked memory
==9442==
==9442== Use --track-origins=yes to see where uninitialised values come from
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442==
==9442== 1 errors in context 1 of 2:
==9442== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9442== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9442== by 0x488CD0: stringsubst (subst.c:301)
==9442== by 0x48801B: prefork (subst.c:77)
==9442== by 0x42B318: execcmd (exec.c:2619)
==9442== by 0x428CA0: execpline2 (exec.c:1697)
==9442== by 0x427FD2: execpline (exec.c:1484)
==9442== by 0x427756: execlist (exec.c:1267)
==9442== by 0x42717C: execode (exec.c:1073)
==9442== by 0x431299: runshfunc (exec.c:5040)
==9442== by 0x430E76: doshfunc (exec.c:4920)
==9442== by 0x4302FB: execshfunc (exec.c:4557)
==9442== by 0x42D8C1: execcmd (exec.c:3373)
==9442==
==9442==
==9442== 2 errors in context 2 of 2:
==9442== Conditional jump or move depends on uninitialised value(s)
==9442== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9442== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9442== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9442== by 0x40EFC2: execbuiltin (builtin.c:450)
==9442== by 0x42D8E9: execcmd (exec.c:3378)
==9442== by 0x428CA0: execpline2 (exec.c:1697)
==9442== by 0x427FD2: execpline (exec.c:1484)
==9442== by 0x42779A: execlist (exec.c:1275)
==9442== by 0x42717C: execode (exec.c:1073)
==9442== by 0x431299: runshfunc (exec.c:5040)
==9442== by 0x430E76: doshfunc (exec.c:4920)
==9442== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9442==
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446== Searching for pointers to 69,586 not-freed blocks
--9446-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9446-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9446-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9446-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9446-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9446-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9446-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9446-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9446-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9446-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9446-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9446-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9446-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9446-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9446-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9446-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9446-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9446-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9446-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9446-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9446-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9446-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9446-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9446-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9446-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9446-- Scanning root segment: 0x701a000..0x701afff (4096)
--9446-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9446-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9446-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9446-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9446-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9446-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9446-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9446-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9446-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9447-- Caught __NR_exit; running __libc_freeres()
==9447== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9447-by-pythonnut-on-???
==9447== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9447-by-pythonnut-on-???
==9447== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9447-by-pythonnut-on-???
==9447==
==9447== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9447== don't want to do, unless you know exactly what you're doing,
==9447== or are doing some strange experiment):
==9447== /usr/lib/valgrind/../../bin/vgdb --pid=9447 ...command...
==9447==
==9447== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9447== /path/to/gdb ./zsh
==9447== and then give GDB the following command
==9447== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9447
==9447== --pid is optional if only one valgrind process is running
==9447==
--9447-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9447==
==9447== HEAP SUMMARY:
==9447== in use at exit: 3,126,903 bytes in 69,092 blocks
==9447== total heap usage: 935,924 allocs, 866,832 frees, 66,393,433 bytes allocated
==9447==
==9447== Searching for pointers to 69,092 not-freed blocks
--9447-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9447-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9447-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9447-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9447-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9447-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9447-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9447-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9447-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9447-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9447-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9447-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9447-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9447-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9447-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9447-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9447-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9447-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9447-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9447-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9447-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9447-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9447-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9447-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9447-- Scanning root segment: 0x701a000..0x701afff (4096)
--9447-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9447-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9447-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9447-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9447-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9447-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9447-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9447-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9447-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9446== Checked 4,880,528 bytes
==9446==
==9446== LEAK SUMMARY:
==9446== definitely lost: 1,533 bytes in 8 blocks
==9446== indirectly lost: 6,756 bytes in 7 blocks
==9446== possibly lost: 0 bytes in 0 blocks
==9446== still reachable: 3,153,514 bytes in 69,571 blocks
==9446== suppressed: 0 bytes in 0 blocks
==9446== Rerun with --leak-check=full to see details of leaked memory
==9446==
==9446== Use --track-origins=yes to see where uninitialised values come from
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446==
==9446== 1 errors in context 1 of 2:
==9446== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9446== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9446== by 0x488CD0: stringsubst (subst.c:301)
==9446== by 0x48801B: prefork (subst.c:77)
==9446== by 0x42B318: execcmd (exec.c:2619)
==9446== by 0x428CA0: execpline2 (exec.c:1697)
==9446== by 0x427FD2: execpline (exec.c:1484)
==9446== by 0x427756: execlist (exec.c:1267)
==9446== by 0x42717C: execode (exec.c:1073)
==9446== by 0x431299: runshfunc (exec.c:5040)
==9446== by 0x430E76: doshfunc (exec.c:4920)
==9446== by 0x4302FB: execshfunc (exec.c:4557)
==9446== by 0x42D8C1: execcmd (exec.c:3373)
==9446==
==9446==
==9446== 2 errors in context 2 of 2:
==9446== Conditional jump or move depends on uninitialised value(s)
==9446== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9446== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9446== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9446== by 0x40EFC2: execbuiltin (builtin.c:450)
==9446== by 0x42D8E9: execcmd (exec.c:3378)
==9446== by 0x428CA0: execpline2 (exec.c:1697)
==9446== by 0x427FD2: execpline (exec.c:1484)
==9446== by 0x42779A: execlist (exec.c:1275)
==9446== by 0x42717C: execode (exec.c:1073)
==9446== by 0x431299: runshfunc (exec.c:5040)
==9446== by 0x430E76: doshfunc (exec.c:4920)
==9446== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9446==
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445-- Caught __NR_exit; running __libc_freeres()
--9445-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9445==
==9445== HEAP SUMMARY:
==9445== in use at exit: 3,159,428 bytes in 69,505 blocks
==9445== total heap usage: 940,189 allocs, 870,684 frees, 68,251,078 bytes allocated
==9445==
==9447== Checked 4,794,360 bytes
==9447==
==9445== Searching for pointers to 69,505 not-freed blocks
--9445-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9445-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9445-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9445-- Scanning root segment: 0x4037000..0x4046fff (65536)
==9447== LEAK SUMMARY:
==9447== definitely lost: 1,533 bytes in 8 blocks
==9447== indirectly lost: 6,756 bytes in 7 blocks
==9447== possibly lost: 0 bytes in 0 blocks
==9447== still reachable: 3,118,614 bytes in 69,077 blocks
==9447== suppressed: 0 bytes in 0 blocks
==9447== Rerun with --leak-check=full to see details of leaked memory
==9447==
==9447== Use --track-origins=yes to see where uninitialised values come from
--9445-- Scanning root segment: 0x4049000..0x404cfff (16384)
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9447==
==9447== 1 errors in context 1 of 2:
==9447== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9447== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9447== by 0x488CD0: stringsubst (subst.c:301)
==9447== by 0x48801B: prefork (subst.c:77)
==9447== by 0x42B318: execcmd (exec.c:2619)
==9447== by 0x428CA0: execpline2 (exec.c:1697)
==9447== by 0x427FD2: execpline (exec.c:1484)
==9447== by 0x427756: execlist (exec.c:1267)
==9447== by 0x42717C: execode (exec.c:1073)
==9447== by 0x431299: runshfunc (exec.c:5040)
==9447== by 0x430E76: doshfunc (exec.c:4920)
==9447== by 0x4302FB: execshfunc (exec.c:4557)
--9445-- Scanning root segment: 0x4222000..0x4222fff (4096)
==9447== by 0x42D8C1: execcmd (exec.c:3373)
==9447==
==9447==
==9447== 2 errors in context 2 of 2:
--9445-- Scanning root segment: 0x4223000..0x4223fff (4096)
==9447== Conditional jump or move depends on uninitialised value(s)
==9447== at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9445-- Scanning root segment: 0x4224000..0x4224fff (4096)
==9447== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9447== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--9445-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9447== by 0x40EFC2: execbuiltin (builtin.c:450)
==9447== by 0x42D8E9: execcmd (exec.c:3378)
--9445-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9447== by 0x428CA0: execpline2 (exec.c:1697)
==9447== by 0x427FD2: execpline (exec.c:1484)
==9447== by 0x42779A: execlist (exec.c:1275)
==9447== by 0x42717C: execode (exec.c:1073)
==9447== by 0x431299: runshfunc (exec.c:5040)
--9445-- Scanning root segment: 0x5041000..0x5041fff (4096)
==9447== by 0x430E76: doshfunc (exec.c:4920)
==9447== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9447==
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9445-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9445-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9445-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9445-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9445-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9445-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9445-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9445-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9445-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9445-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9445-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9445-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9445-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9445-- Scanning root segment: 0x701a000..0x701afff (4096)
--9445-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9445-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9445-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9445-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9445-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9445-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9445-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9445-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9445-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9448== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9448-by-pythonnut-on-???
==9448== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9448-by-pythonnut-on-???
==9448== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9448-by-pythonnut-on-???
==9448==
==9448== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9448== don't want to do, unless you know exactly what you're doing,
==9448== or are doing some strange experiment):
==9448== /usr/lib/valgrind/../../bin/vgdb --pid=9448 ...command...
==9448==
==9448== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9448== /path/to/gdb ./zsh
==9448== and then give GDB the following command
==9448== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9448
==9448== --pid is optional if only one valgrind process is running
==9448==
--9448-- Caught __NR_exit; running __libc_freeres()
--9440-- Caught __NR_exit; running __libc_freeres()
--9448-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9448==
==9448== HEAP SUMMARY:
==9448== in use at exit: 3,127,145 bytes in 69,098 blocks
==9448== total heap usage: 935,972 allocs, 866,874 frees, 66,402,449 bytes allocated
==9448==
--9440-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9440==
==9440== HEAP SUMMARY:
==9440== in use at exit: 3,160,363 bytes in 69,128 blocks
==9440== total heap usage: 939,349 allocs, 870,221 frees, 67,889,809 bytes allocated
==9440==
==9445== Checked 4,876,592 bytes
==9445==
==9448== Searching for pointers to 69,098 not-freed blocks
--9448-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9448-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9448-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9448-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9448-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9448-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9448-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9448-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9448-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9448-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9448-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9448-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9448-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9448-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9448-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9448-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9448-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9448-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9448-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9448-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9448-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9448-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9448-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9448-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9448-- Scanning root segment: 0x701a000..0x701afff (4096)
--9448-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9448-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9448-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9448-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9448-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9448-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9448-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9448-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9448-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9445== LEAK SUMMARY:
==9445== definitely lost: 1,533 bytes in 8 blocks
==9445== indirectly lost: 6,756 bytes in 7 blocks
==9445== possibly lost: 0 bytes in 0 blocks
==9445== still reachable: 3,151,139 bytes in 69,490 blocks
==9445== suppressed: 0 bytes in 0 blocks
==9445== Rerun with --leak-check=full to see details of leaked memory
==9445==
==9445== Use --track-origins=yes to see where uninitialised values come from
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445==
==9445== 1 errors in context 1 of 2:
==9445== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9445== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9445== by 0x488CD0: stringsubst (subst.c:301)
==9445== by 0x48801B: prefork (subst.c:77)
==9445== by 0x42B318: execcmd (exec.c:2619)
==9445== by 0x428CA0: execpline2 (exec.c:1697)
==9445== by 0x427FD2: execpline (exec.c:1484)
==9445== by 0x427756: execlist (exec.c:1267)
==9445== by 0x42717C: execode (exec.c:1073)
==9445== by 0x431299: runshfunc (exec.c:5040)
==9445== by 0x430E76: doshfunc (exec.c:4920)
==9445== by 0x4302FB: execshfunc (exec.c:4557)
==9445== by 0x42D8C1: execcmd (exec.c:3373)
==9445==
==9445==
==9445== 2 errors in context 2 of 2:
==9445== Conditional jump or move depends on uninitialised value(s)
==9445== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9445== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9445== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9445== by 0x40EFC2: execbuiltin (builtin.c:450)
==9445== by 0x42D8E9: execcmd (exec.c:3378)
==9445== by 0x428CA0: execpline2 (exec.c:1697)
==9445== by 0x427FD2: execpline (exec.c:1484)
==9445== by 0x42779A: execlist (exec.c:1275)
==9445== by 0x42717C: execode (exec.c:1073)
==9445== by 0x431299: runshfunc (exec.c:5040)
==9445== by 0x430E76: doshfunc (exec.c:4920)
==9445== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9445==
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440== Searching for pointers to 69,128 not-freed blocks
--9440-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9440-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
client request: code 4d430005, addr 0xFFEFF540C, len 4
--9440-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9440-- Scanning root segment: 0x4037000..0x4043fff (53248)
client request: code 4d430005, addr 0xFFEFF540C, len 4
--9440-- Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005, addr 0xFFEFF540C, len 4
--9440-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9440-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9440-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9440-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9440-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9440-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9440-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9440-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9440-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9440-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9440-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9440-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9440-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9440-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9440-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9440-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9440-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9440-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9440-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
--9440-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9440-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9440-- Scanning root segment: 0x701a000..0x701afff (4096)
--9440-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9440-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9440-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9440-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9440-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9440-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9440-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9440-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
--9440-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF3DBC, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
client request: code 4d430005, addr 0xFFEFE992C, len 4
==9448== Checked 4,794,528 bytes
==9448==
==9451== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9451-by-pythonnut-on-???
==9451== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9451-by-pythonnut-on-???
==9451== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9451-by-pythonnut-on-???
==9451==
==9451== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9451== don't want to do, unless you know exactly what you're doing,
==9451== or are doing some strange experiment):
==9451== /usr/lib/valgrind/../../bin/vgdb --pid=9451 ...command...
==9451==
==9451== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9451== /path/to/gdb ./zsh
==9451== and then give GDB the following command
==9451== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9451
==9451== --pid is optional if only one valgrind process is running
==9451==
client request: code 4d430005, addr 0xFFEFE87EC, len 4
==9448== LEAK SUMMARY:
==9448== definitely lost: 1,533 bytes in 8 blocks
==9448== indirectly lost: 6,756 bytes in 7 blocks
==9448== possibly lost: 0 bytes in 0 blocks
==9448== still reachable: 3,118,856 bytes in 69,083 blocks
==9448== suppressed: 0 bytes in 0 blocks
==9448== Rerun with --leak-check=full to see details of leaked memory
==9448==
==9448== Use --track-origins=yes to see where uninitialised values come from
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9448==
==9448== 1 errors in context 1 of 2:
==9448== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9448== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9448== by 0x488CD0: stringsubst (subst.c:301)
==9448== by 0x48801B: prefork (subst.c:77)
==9448== by 0x42B318: execcmd (exec.c:2619)
==9448== by 0x428CA0: execpline2 (exec.c:1697)
==9448== by 0x427FD2: execpline (exec.c:1484)
==9448== by 0x427756: execlist (exec.c:1267)
==9448== by 0x42717C: execode (exec.c:1073)
==9448== by 0x431299: runshfunc (exec.c:5040)
==9448== by 0x430E76: doshfunc (exec.c:4920)
==9448== by 0x4302FB: execshfunc (exec.c:4557)
==9448== by 0x42D8C1: execcmd (exec.c:3373)
==9448==
==9448==
==9448== 2 errors in context 2 of 2:
==9448== Conditional jump or move depends on uninitialised value(s)
==9448== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9448== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9448== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9448== by 0x40EFC2: execbuiltin (builtin.c:450)
==9448== by 0x42D8E9: execcmd (exec.c:3378)
==9448== by 0x428CA0: execpline2 (exec.c:1697)
==9448== by 0x427FD2: execpline (exec.c:1484)
==9448== by 0x42779A: execlist (exec.c:1275)
==9448== by 0x42717C: execode (exec.c:1073)
==9448== by 0x431299: runshfunc (exec.c:5040)
==9448== by 0x430E76: doshfunc (exec.c:4920)
==9448== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9448==
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9450-by-pythonnut-on-???
==9450== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9450-by-pythonnut-on-???
==9450== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9450-by-pythonnut-on-???
==9450==
==9450== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9450== don't want to do, unless you know exactly what you're doing,
==9450== or are doing some strange experiment):
==9450== /usr/lib/valgrind/../../bin/vgdb --pid=9450 ...command...
==9450==
==9450== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9450== /path/to/gdb ./zsh
==9450== and then give GDB the following command
==9450== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9450
==9450== --pid is optional if only one valgrind process is running
==9450==
==9440== Checked 4,936,016 bytes
==9440==
--9450-- Caught __NR_exit; running __libc_freeres()
--9452-- Caught __NR_exit; running __libc_freeres()
==9452== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9452-by-pythonnut-on-???
==9452== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9452-by-pythonnut-on-???
==9452== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9452-by-pythonnut-on-???
==9452==
==9452== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9452== don't want to do, unless you know exactly what you're doing,
==9452== or are doing some strange experiment):
==9452== /usr/lib/valgrind/../../bin/vgdb --pid=9452 ...command...
==9452==
==9452== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9452== /path/to/gdb ./zsh
==9452== and then give GDB the following command
==9452== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9452
==9452== --pid is optional if only one valgrind process is running
==9452==
==9440== LEAK SUMMARY:
==9440== definitely lost: 1,533 bytes in 8 blocks
==9440== indirectly lost: 6,756 bytes in 7 blocks
==9440== possibly lost: 0 bytes in 0 blocks
==9440== still reachable: 3,152,074 bytes in 69,113 blocks
==9440== suppressed: 0 bytes in 0 blocks
==9440== Rerun with --leak-check=full to see details of leaked memory
==9440==
==9440== Use --track-origins=yes to see where uninitialised values come from
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440==
==9440== 1 errors in context 1 of 2:
==9440== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9440== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9440== by 0x488CD0: stringsubst (subst.c:301)
==9440== by 0x48801B: prefork (subst.c:77)
==9440== by 0x42B318: execcmd (exec.c:2619)
==9440== by 0x428CA0: execpline2 (exec.c:1697)
==9440== by 0x427FD2: execpline (exec.c:1484)
==9440== by 0x427756: execlist (exec.c:1267)
==9440== by 0x42717C: execode (exec.c:1073)
==9440== by 0x431299: runshfunc (exec.c:5040)
==9440== by 0x430E76: doshfunc (exec.c:4920)
==9440== by 0x4302FB: execshfunc (exec.c:4557)
==9440== by 0x42D8C1: execcmd (exec.c:3373)
==9440==
==9440==
==9440== 2 errors in context 2 of 2:
==9440== Conditional jump or move depends on uninitialised value(s)
==9440== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9440== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9440== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9440== by 0x40EFC2: execbuiltin (builtin.c:450)
==9440== by 0x42D8E9: execcmd (exec.c:3378)
==9440== by 0x428CA0: execpline2 (exec.c:1697)
==9440== by 0x427FD2: execpline (exec.c:1484)
==9440== by 0x42779A: execlist (exec.c:1275)
==9440== by 0x42717C: execode (exec.c:1073)
==9440== by 0x431299: runshfunc (exec.c:5040)
==9440== by 0x430E76: doshfunc (exec.c:4920)
==9440== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9440==
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9450-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450==
--9452-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450== HEAP SUMMARY:
==9450== in use at exit: 3,168,179 bytes in 69,594 blocks
==9450== total heap usage: 940,514 allocs, 870,920 frees, 68,297,051 bytes allocated
==9450==
==9452==
==9452== HEAP SUMMARY:
==9452== in use at exit: 3,127,081 bytes in 69,098 blocks
==9452== total heap usage: 935,952 allocs, 866,854 frees, 66,400,219 bytes allocated
==9452==
==9453== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9453-by-pythonnut-on-???
==9453== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9453-by-pythonnut-on-???
==9453== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9453-by-pythonnut-on-???
==9453==
==9453== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9453== don't want to do, unless you know exactly what you're doing,
==9453== or are doing some strange experiment):
==9453== /usr/lib/valgrind/../../bin/vgdb --pid=9453 ...command...
==9453==
==9453== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9453== /path/to/gdb ./zsh
==9453== and then give GDB the following command
==9453== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9453
==9453== --pid is optional if only one valgrind process is running
==9453==
--9453-- Caught __NR_exit; running __libc_freeres()
==9450== Searching for pointers to 69,594 not-freed blocks
--9450-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9450-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9450-- Scanning root segment: 0x4022000..0x4026fff (20480)
client request: code 4d430005, addr 0xFFEFEDFFC, len 4
--9450-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9450-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9450-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9450-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9450-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9450-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9450-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9450-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9450-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9450-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9450-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9450-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9450-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9450-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9450-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9450-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9450-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9450-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9450-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9450-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9450-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9450-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9450-- Scanning root segment: 0x701a000..0x701afff (4096)
--9450-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9450-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9450-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9450-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9450-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9450-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9450-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9450-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9450-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9452== Searching for pointers to 69,098 not-freed blocks
--9452-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9452-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9452-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9452-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9452-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9452-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9452-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9452-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9452-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9452-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9452-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9452-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9452-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9452-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9452-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9452-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9452-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9452-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9452-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9452-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9452-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9452-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9452-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9452-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9452-- Scanning root segment: 0x701a000..0x701afff (4096)
--9452-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9452-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9452-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9452-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9452-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9452-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9452-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9452-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9452-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9454-- Caught __NR_exit; running __libc_freeres()
--9453-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9453==
==9454== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9454-by-pythonnut-on-???
==9454== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9454-by-pythonnut-on-???
==9454== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9454-by-pythonnut-on-???
==9454==
==9454== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9454== don't want to do, unless you know exactly what you're doing,
==9454== or are doing some strange experiment):
==9454== /usr/lib/valgrind/../../bin/vgdb --pid=9454 ...command...
==9454==
==9454== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9454== /path/to/gdb ./zsh
==9454== and then give GDB the following command
==9454== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9454
==9454== --pid is optional if only one valgrind process is running
==9454==
==9453== HEAP SUMMARY:
==9453== in use at exit: 3,166,577 bytes in 69,128 blocks
==9453== total heap usage: 935,636 allocs, 866,508 frees, 66,670,146 bytes allocated
==9453==
--9454-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9454==
==9454== HEAP SUMMARY:
==9454== in use at exit: 3,145,105 bytes in 69,128 blocks
==9454== total heap usage: 935,642 allocs, 866,514 frees, 66,672,266 bytes allocated
==9454==
==9453== Searching for pointers to 69,128 not-freed blocks
--9453-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9453-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9453-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9453-- Scanning root segment: 0x4037000..0x4047fff (69632)
--9453-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9453-- Scanning root segment: 0x41d6000..0x4204fff (192512)
--9453-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9453-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9453-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9453-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9453-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9453-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9453-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9453-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9453-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9453-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9453-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9453-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9453-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9453-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9453-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9453-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9453-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9453-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9453-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9453-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9453-- Scanning root segment: 0x701a000..0x701afff (4096)
--9453-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9453-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9453-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9453-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9453-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9453-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9453-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9453-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9453-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Searching for pointers to 69,128 not-freed blocks
--9454-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9454-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9454-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9454-- Scanning root segment: 0x4037000..0x4047fff (69632)
--9454-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9454-- Scanning root segment: 0x41d6000..0x4204fff (192512)
--9454-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9454-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9454-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9454-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9454-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9454-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9454-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9454-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9454-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9454-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9454-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9454-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9454-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9454-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9454-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9454-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9454-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9454-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9454-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9454-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9454-- Scanning root segment: 0x701a000..0x701afff (4096)
--9454-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==9450== Checked 4,889,672 bytes
==9450==
--9454-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9454-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9454-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9454-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9454-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9454-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9454-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9454-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9450== LEAK SUMMARY:
==9450== definitely lost: 1,533 bytes in 8 blocks
==9450== indirectly lost: 6,756 bytes in 7 blocks
==9450== possibly lost: 0 bytes in 0 blocks
==9450== still reachable: 3,159,890 bytes in 69,579 blocks
==9450== suppressed: 0 bytes in 0 blocks
==9450== Rerun with --leak-check=full to see details of leaked memory
==9450==
==9450== Use --track-origins=yes to see where uninitialised values come from
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450==
==9450== 1 errors in context 1 of 2:
==9450== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9450== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9450== by 0x488CD0: stringsubst (subst.c:301)
==9450== by 0x48801B: prefork (subst.c:77)
==9450== by 0x42B318: execcmd (exec.c:2619)
==9450== by 0x428CA0: execpline2 (exec.c:1697)
==9450== by 0x427FD2: execpline (exec.c:1484)
==9450== by 0x427756: execlist (exec.c:1267)
==9450== by 0x42717C: execode (exec.c:1073)
==9450== by 0x431299: runshfunc (exec.c:5040)
==9450== by 0x430E76: doshfunc (exec.c:4920)
==9450== by 0x4302FB: execshfunc (exec.c:4557)
==9450== by 0x42D8C1: execcmd (exec.c:3373)
==9450==
==9450==
==9450== 2 errors in context 2 of 2:
==9450== Conditional jump or move depends on uninitialised value(s)
==9450== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9450== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9450== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9450== by 0x40EFC2: execbuiltin (builtin.c:450)
==9450== by 0x42D8E9: execcmd (exec.c:3378)
==9450== by 0x428CA0: execpline2 (exec.c:1697)
==9450== by 0x427FD2: execpline (exec.c:1484)
==9450== by 0x42779A: execlist (exec.c:1275)
==9450== by 0x42717C: execode (exec.c:1073)
==9450== by 0x431299: runshfunc (exec.c:5040)
==9450== by 0x430E76: doshfunc (exec.c:4920)
==9450== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9450==
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452== Checked 4,794,456 bytes
==9452==
--9457-- Caught __NR_exit; running __libc_freeres()
==9452== LEAK SUMMARY:
==9452== definitely lost: 1,533 bytes in 8 blocks
==9452== indirectly lost: 6,756 bytes in 7 blocks
==9452== possibly lost: 0 bytes in 0 blocks
==9452== still reachable: 3,118,792 bytes in 69,083 blocks
==9452== suppressed: 0 bytes in 0 blocks
==9452== Rerun with --leak-check=full to see details of leaked memory
==9452==
==9452== Use --track-origins=yes to see where uninitialised values come from
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452==
==9452== 1 errors in context 1 of 2:
==9452== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9452== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9452== by 0x488CD0: stringsubst (subst.c:301)
==9452== by 0x48801B: prefork (subst.c:77)
==9452== by 0x42B318: execcmd (exec.c:2619)
==9452== by 0x428CA0: execpline2 (exec.c:1697)
==9452== by 0x427FD2: execpline (exec.c:1484)
==9452== by 0x427756: execlist (exec.c:1267)
==9452== by 0x42717C: execode (exec.c:1073)
==9452== by 0x431299: runshfunc (exec.c:5040)
==9452== by 0x430E76: doshfunc (exec.c:4920)
==9452== by 0x4302FB: execshfunc (exec.c:4557)
==9452== by 0x42D8C1: execcmd (exec.c:3373)
==9452==
==9452==
==9452== 2 errors in context 2 of 2:
==9452== Conditional jump or move depends on uninitialised value(s)
==9452== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9452== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9452== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9452== by 0x40EFC2: execbuiltin (builtin.c:450)
==9452== by 0x42D8E9: execcmd (exec.c:3378)
==9452== by 0x428CA0: execpline2 (exec.c:1697)
==9452== by 0x427FD2: execpline (exec.c:1484)
==9452== by 0x42779A: execlist (exec.c:1275)
==9452== by 0x42717C: execode (exec.c:1073)
==9452== by 0x431299: runshfunc (exec.c:5040)
==9452== by 0x430E76: doshfunc (exec.c:4920)
==9452== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9452==
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFE7F8C, len 4
==9457== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9457-by-pythonnut-on-???
==9457== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9457-by-pythonnut-on-???
==9457== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9457-by-pythonnut-on-???
==9457==
==9457== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9457== don't want to do, unless you know exactly what you're doing,
==9457== or are doing some strange experiment):
==9457== /usr/lib/valgrind/../../bin/vgdb --pid=9457 ...command...
==9457==
==9457== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9457== /path/to/gdb ./zsh
==9457== and then give GDB the following command
==9457== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9457
==9457== --pid is optional if only one valgrind process is running
==9457==
--9457-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9459-by-pythonnut-on-???
==9459== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9459-by-pythonnut-on-???
==9459== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9459-by-pythonnut-on-???
==9459==
==9459== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9459== don't want to do, unless you know exactly what you're doing,
==9459== or are doing some strange experiment):
==9459== /usr/lib/valgrind/../../bin/vgdb --pid=9459 ...command...
==9459==
==9459== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9459== /path/to/gdb ./zsh
==9459== and then give GDB the following command
==9459== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9459
==9459== --pid is optional if only one valgrind process is running
==9459==
==9457==
==9453== Checked 5,077,056 bytes
==9453==
==9457== HEAP SUMMARY:
==9457== in use at exit: 3,168,335 bytes in 69,600 blocks
==9457== total heap usage: 940,523 allocs, 870,923 frees, 68,299,047 bytes allocated
==9457==
--9459-- Caught __NR_exit; running __libc_freeres()
==9453== LEAK SUMMARY:
==9453== definitely lost: 1,533 bytes in 8 blocks
==9453== indirectly lost: 6,756 bytes in 7 blocks
==9453== possibly lost: 0 bytes in 0 blocks
==9453== still reachable: 3,158,288 bytes in 69,113 blocks
==9453== suppressed: 0 bytes in 0 blocks
==9453== Rerun with --leak-check=full to see details of leaked memory
==9453==
==9453== Use --track-origins=yes to see where uninitialised values come from
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9453==
==9453== 1 errors in context 1 of 2:
==9453== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9453== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9453== by 0x488CD0: stringsubst (subst.c:301)
==9453== by 0x48801B: prefork (subst.c:77)
==9453== by 0x42B318: execcmd (exec.c:2619)
==9453== by 0x428CA0: execpline2 (exec.c:1697)
==9453== by 0x427FD2: execpline (exec.c:1484)
==9453== by 0x427756: execlist (exec.c:1267)
==9453== by 0x42717C: execode (exec.c:1073)
==9453== by 0x431299: runshfunc (exec.c:5040)
==9453== by 0x430E76: doshfunc (exec.c:4920)
==9453== by 0x4302FB: execshfunc (exec.c:4557)
==9453== by 0x42D8C1: execcmd (exec.c:3373)
==9453==
==9453==
==9453== 2 errors in context 2 of 2:
==9453== Conditional jump or move depends on uninitialised value(s)
==9453== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9453== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9453== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9453== by 0x40EFC2: execbuiltin (builtin.c:450)
==9453== by 0x42D8E9: execcmd (exec.c:3378)
==9453== by 0x428CA0: execpline2 (exec.c:1697)
==9453== by 0x427FD2: execpline (exec.c:1484)
==9453== by 0x42779A: execlist (exec.c:1275)
==9453== by 0x42717C: execode (exec.c:1073)
==9453== by 0x431299: runshfunc (exec.c:5040)
==9453== by 0x430E76: doshfunc (exec.c:4920)
==9453== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9453==
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457== Searching for pointers to 69,600 not-freed blocks
--9457-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9457-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9457-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9457-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9457-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9457-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9457-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9457-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9457-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9457-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9457-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9457-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9457-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9457-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9457-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9457-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9457-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9457-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9457-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9457-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9457-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9457-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9457-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9457-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9457-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9457-- Scanning root segment: 0x701a000..0x701afff (4096)
--9457-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9457-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9457-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9457-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9457-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9457-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9457-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9457-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9457-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Checked 5,055,704 bytes
==9454==
--9459-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459==
==9459== HEAP SUMMARY:
==9459== in use at exit: 3,127,122 bytes in 69,099 blocks
==9459== total heap usage: 935,965 allocs, 866,866 frees, 66,402,919 bytes allocated
==9459==
==9454== LEAK SUMMARY:
==9454== definitely lost: 1,557 bytes in 9 blocks
==9454== indirectly lost: 6,796 bytes in 9 blocks
==9454== possibly lost: 0 bytes in 0 blocks
==9454== still reachable: 3,136,752 bytes in 69,110 blocks
==9454== suppressed: 0 bytes in 0 blocks
==9454== Rerun with --leak-check=full to see details of leaked memory
==9454==
==9454== Use --track-origins=yes to see where uninitialised values come from
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9454==
==9454== 1 errors in context 1 of 2:
==9454== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9454== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9454== by 0x488CD0: stringsubst (subst.c:301)
==9454== by 0x48801B: prefork (subst.c:77)
==9454== by 0x42B318: execcmd (exec.c:2619)
==9454== by 0x428CA0: execpline2 (exec.c:1697)
==9454== by 0x427FD2: execpline (exec.c:1484)
==9454== by 0x427756: execlist (exec.c:1267)
==9454== by 0x42717C: execode (exec.c:1073)
==9454== by 0x431299: runshfunc (exec.c:5040)
==9454== by 0x430E76: doshfunc (exec.c:4920)
==9454== by 0x4302FB: execshfunc (exec.c:4557)
==9454== by 0x42D8C1: execcmd (exec.c:3373)
==9454==
==9454==
==9454== 2 errors in context 2 of 2:
==9454== Conditional jump or move depends on uninitialised value(s)
==9454== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9454== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9454== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9454== by 0x40EFC2: execbuiltin (builtin.c:450)
==9454== by 0x42D8E9: execcmd (exec.c:3378)
==9454== by 0x428CA0: execpline2 (exec.c:1697)
==9454== by 0x427FD2: execpline (exec.c:1484)
==9454== by 0x42779A: execlist (exec.c:1275)
==9454== by 0x42717C: execode (exec.c:1073)
==9454== by 0x431299: runshfunc (exec.c:5040)
==9454== by 0x430E76: doshfunc (exec.c:4920)
==9454== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9454==
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9460== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9460-by-pythonnut-on-???
==9460== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9460-by-pythonnut-on-???
==9460== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9460-by-pythonnut-on-???
==9460==
==9460== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9460== don't want to do, unless you know exactly what you're doing,
==9460== or are doing some strange experiment):
==9460== /usr/lib/valgrind/../../bin/vgdb --pid=9460 ...command...
==9460==
==9460== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9460== /path/to/gdb ./zsh
==9460== and then give GDB the following command
==9460== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9460
==9460== --pid is optional if only one valgrind process is running
==9460==
==9459== Searching for pointers to 69,099 not-freed blocks
--9459-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9459-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9459-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9459-- Scanning root segment: 0x4037000..0x403afff (16384)
--9459-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9459-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9459-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9459-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9459-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9459-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9459-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9459-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9459-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9459-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9459-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9459-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9459-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9459-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9459-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9459-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9459-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9459-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9459-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9459-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9459-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9459-- Scanning root segment: 0x701a000..0x701afff (4096)
--9459-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9459-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9459-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9459-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9459-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9459-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9459-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9459-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9459-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFEE97C, len 4
--9435-- Caught __NR_exit; running __libc_freeres()
--9435-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435==
==9435== HEAP SUMMARY:
==9435== in use at exit: 3,122,924 bytes in 69,110 blocks
==9435== total heap usage: 935,643 allocs, 866,533 frees, 66,672,834 bytes allocated
==9435==
==9457== Checked 4,890,952 bytes
==9457==
==9457== LEAK SUMMARY:
==9457== definitely lost: 1,533 bytes in 8 blocks
==9457== indirectly lost: 6,756 bytes in 7 blocks
==9457== possibly lost: 0 bytes in 0 blocks
==9457== still reachable: 3,160,046 bytes in 69,585 blocks
==9457== suppressed: 0 bytes in 0 blocks
==9457== Rerun with --leak-check=full to see details of leaked memory
==9457==
==9457== Use --track-origins=yes to see where uninitialised values come from
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457==
==9457== 1 errors in context 1 of 2:
==9457== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9457== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435== Searching for pointers to 69,110 not-freed blocks
==9457== by 0x488CD0: stringsubst (subst.c:301)
--9435-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==9457== by 0x48801B: prefork (subst.c:77)
==9457== by 0x42B318: execcmd (exec.c:2619)
==9457== by 0x428CA0: execpline2 (exec.c:1697)
==9457== by 0x427FD2: execpline (exec.c:1484)
==9457== by 0x427756: execlist (exec.c:1267)
==9457== by 0x42717C: execode (exec.c:1073)
==9457== by 0x431299: runshfunc (exec.c:5040)
==9457== by 0x430E76: doshfunc (exec.c:4920)
==9457== by 0x4302FB: execshfunc (exec.c:4557)
==9457== by 0x42D8C1: execcmd (exec.c:3373)
==9457==
==9457==
==9457== 2 errors in context 2 of 2:
==9457== Conditional jump or move depends on uninitialised value(s)
==9457== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9457== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9457== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9457== by 0x40EFC2: execbuiltin (builtin.c:450)
==9457== by 0x42D8E9: execcmd (exec.c:3378)
==9457== by 0x428CA0: execpline2 (exec.c:1697)
==9457== by 0x427FD2: execpline (exec.c:1484)
==9457== by 0x42779A: execlist (exec.c:1275)
==9457== by 0x42717C: execode (exec.c:1073)
--9435-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9457== by 0x431299: runshfunc (exec.c:5040)
==9457== by 0x430E76: doshfunc (exec.c:4920)
==9457== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9457==
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9435-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9435-- Scanning root segment: 0x4037000..0x403afff (16384)
--9435-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9435-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9435-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9435-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9435-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9435-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9435-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9435-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9435-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9435-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9435-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9435-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9435-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9435-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9435-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9435-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9435-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9435-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9435-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9435-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9435-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9435-- Scanning root segment: 0x701a000..0x701afff (4096)
--9435-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9435-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9435-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9435-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9435-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9435-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9435-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9435-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9435-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9456-- Caught __NR_exit; running __libc_freeres()
==9456== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9456-by-pythonnut-on-???
==9456== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9456-by-pythonnut-on-???
==9456== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9456-by-pythonnut-on-???
==9456==
==9456== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9456== don't want to do, unless you know exactly what you're doing,
==9456== or are doing some strange experiment):
==9456== /usr/lib/valgrind/../../bin/vgdb --pid=9456 ...command...
==9456==
==9456== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9456== /path/to/gdb ./zsh
==9456== and then give GDB the following command
==9456== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9456
==9456== --pid is optional if only one valgrind process is running
==9456==
==9459== Checked 4,810,368 bytes
==9459==
--9456-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== LEAK SUMMARY:
==9459== definitely lost: 1,533 bytes in 8 blocks
==9459== indirectly lost: 6,756 bytes in 7 blocks
==9459== possibly lost: 0 bytes in 0 blocks
==9459== still reachable: 3,118,833 bytes in 69,084 blocks
==9459== suppressed: 0 bytes in 0 blocks
==9459== Rerun with --leak-check=full to see details of leaked memory
==9459==
==9459== Use --track-origins=yes to see where uninitialised values come from
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9459==
==9459== 1 errors in context 1 of 2:
==9459== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9459== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9459== by 0x488CD0: stringsubst (subst.c:301)
==9459== by 0x48801B: prefork (subst.c:77)
==9459== by 0x42B318: execcmd (exec.c:2619)
==9459== by 0x428CA0: execpline2 (exec.c:1697)
==9459== by 0x427FD2: execpline (exec.c:1484)
==9459== by 0x427756: execlist (exec.c:1267)
==9459== by 0x42717C: execode (exec.c:1073)
==9459== by 0x431299: runshfunc (exec.c:5040)
==9459== by 0x430E76: doshfunc (exec.c:4920)
==9459== by 0x4302FB: execshfunc (exec.c:4557)
==9459== by 0x42D8C1: execcmd (exec.c:3373)
==9459==
==9459==
==9459== 2 errors in context 2 of 2:
==9459== Conditional jump or move depends on uninitialised value(s)
==9459== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9459== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9459== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9459== by 0x40EFC2: execbuiltin (builtin.c:450)
==9459== by 0x42D8E9: execcmd (exec.c:3378)
==9459== by 0x428CA0: execpline2 (exec.c:1697)
==9459== by 0x427FD2: execpline (exec.c:1484)
==9459== by 0x42779A: execlist (exec.c:1275)
==9459== by 0x42717C: execode (exec.c:1073)
==9459== by 0x431299: runshfunc (exec.c:5040)
==9459== by 0x430E76: doshfunc (exec.c:4920)
==9459== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9459==
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456==
==9456== HEAP SUMMARY:
==9456== in use at exit: 3,168,271 bytes in 69,597 blocks
==9456== total heap usage: 940,525 allocs, 870,928 frees, 68,299,591 bytes allocated
==9456==
==9456== Searching for pointers to 69,597 not-freed blocks
--9456-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9456-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9456-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9456-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9456-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9456-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9456-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9456-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9456-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9456-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9456-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9456-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9456-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9456-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9456-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9456-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9456-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9456-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9456-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9456-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9456-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9456-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9456-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9456-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9456-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9456-- Scanning root segment: 0x701a000..0x701afff (4096)
--9456-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9456-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9456-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9456-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9456-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9456-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9456-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9456-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9456-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9435== Checked 4,785,696 bytes
==9435==
==9435== LEAK SUMMARY:
==9435== definitely lost: 1,533 bytes in 8 blocks
==9435== indirectly lost: 6,756 bytes in 7 blocks
==9435== possibly lost: 0 bytes in 0 blocks
==9435== still reachable: 3,114,635 bytes in 69,095 blocks
==9435== suppressed: 0 bytes in 0 blocks
==9435== Rerun with --leak-check=full to see details of leaked memory
==9435==
==9435== Use --track-origins=yes to see where uninitialised values come from
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9435==
==9435== 1 errors in context 1 of 2:
==9435== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9435== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435== by 0x488CD0: stringsubst (subst.c:301)
==9435== by 0x48801B: prefork (subst.c:77)
==9435== by 0x42B318: execcmd (exec.c:2619)
==9435== by 0x428CA0: execpline2 (exec.c:1697)
==9435== by 0x427FD2: execpline (exec.c:1484)
==9435== by 0x427756: execlist (exec.c:1267)
==9435== by 0x42717C: execode (exec.c:1073)
==9435== by 0x431299: runshfunc (exec.c:5040)
==9435== by 0x430E76: doshfunc (exec.c:4920)
==9435== by 0x4302FB: execshfunc (exec.c:4557)
==9435== by 0x42D8C1: execcmd (exec.c:3373)
==9435==
==9435==
==9435== 2 errors in context 2 of 2:
==9435== Conditional jump or move depends on uninitialised value(s)
==9435== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9435== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9435== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9435== by 0x40EFC2: execbuiltin (builtin.c:450)
==9435== by 0x42D8E9: execcmd (exec.c:3378)
==9435== by 0x428CA0: execpline2 (exec.c:1697)
==9435== by 0x427FD2: execpline (exec.c:1484)
==9435== by 0x42779A: execlist (exec.c:1275)
==9435== by 0x42717C: execode (exec.c:1073)
==9435== by 0x431299: runshfunc (exec.c:5040)
==9435== by 0x430E76: doshfunc (exec.c:4920)
==9435== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9435==
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9463-by-pythonnut-on-???
==9463== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9463-by-pythonnut-on-???
==9463== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9463-by-pythonnut-on-???
==9463==
==9463== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9463== don't want to do, unless you know exactly what you're doing,
==9463== or are doing some strange experiment):
==9463== /usr/lib/valgrind/../../bin/vgdb --pid=9463 ...command...
==9463==
==9463== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9463== /path/to/gdb ./zsh
==9463== and then give GDB the following command
==9463== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9463
==9463== --pid is optional if only one valgrind process is running
==9463==
--9463-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEF77C, len 4
==9456== Checked 4,890,264 bytes
==9456==
--9463-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9456== LEAK SUMMARY:
==9456== definitely lost: 1,533 bytes in 8 blocks
==9456== indirectly lost: 6,756 bytes in 7 blocks
==9456== possibly lost: 0 bytes in 0 blocks
==9456== still reachable: 3,159,982 bytes in 69,582 blocks
==9456== suppressed: 0 bytes in 0 blocks
==9456== Rerun with --leak-check=full to see details of leaked memory
==9456==
==9456== Use --track-origins=yes to see where uninitialised values come from
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456==
==9456== 1 errors in context 1 of 2:
==9456== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9456== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9456== by 0x488CD0: stringsubst (subst.c:301)
==9456== by 0x48801B: prefork (subst.c:77)
==9456== by 0x42B318: execcmd (exec.c:2619)
==9456== by 0x428CA0: execpline2 (exec.c:1697)
==9456== by 0x427FD2: execpline (exec.c:1484)
==9456== by 0x427756: execlist (exec.c:1267)
==9456== by 0x42717C: execode (exec.c:1073)
==9456== by 0x431299: runshfunc (exec.c:5040)
==9456== by 0x430E76: doshfunc (exec.c:4920)
==9456== by 0x4302FB: execshfunc (exec.c:4557)
==9456== by 0x42D8C1: execcmd (exec.c:3373)
==9456==
==9456==
==9456== 2 errors in context 2 of 2:
==9456== Conditional jump or move depends on uninitialised value(s)
==9456== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9456== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9456== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9456== by 0x40EFC2: execbuiltin (builtin.c:450)
==9456== by 0x42D8E9: execcmd (exec.c:3378)
==9456== by 0x428CA0: execpline2 (exec.c:1697)
==9456== by 0x427FD2: execpline (exec.c:1484)
==9456== by 0x42779A: execlist (exec.c:1275)
==9456== by 0x42717C: execode (exec.c:1073)
==9456== by 0x431299: runshfunc (exec.c:5040)
==9456== by 0x430E76: doshfunc (exec.c:4920)
==9456== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9456==
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463==
==9463== HEAP SUMMARY:
==9463== in use at exit: 3,160,434 bytes in 69,111 blocks
==9463== total heap usage: 935,607 allocs, 866,496 frees, 66,623,672 bytes allocated
==9463==
==9465== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9465-by-pythonnut-on-???
==9465== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9465-by-pythonnut-on-???
==9465== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9465-by-pythonnut-on-???
==9465==
==9465== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9465== don't want to do, unless you know exactly what you're doing,
==9465== or are doing some strange experiment):
==9465== /usr/lib/valgrind/../../bin/vgdb --pid=9465 ...command...
==9465==
==9465== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9465== /path/to/gdb ./zsh
==9465== and then give GDB the following command
==9465== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9465
==9465== --pid is optional if only one valgrind process is running
==9465==
--9466-- Caught __NR_exit; running __libc_freeres()
==9463== Searching for pointers to 69,111 not-freed blocks
--9463-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9463-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9463-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9463-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9463-- Scanning root segment: 0x41d6000..0x41edfff (98304)
--9463-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9463-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9463-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9463-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9463-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9463-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9463-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9463-- Scanning root segment: 0x54ac000..0x54acfff (4096)
client request: code 4d430005, addr 0xFFEFE77CC, len 4
--9463-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9463-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9463-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9463-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9463-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9463-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9463-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9463-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9463-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9463-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9463-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9463-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9463-- Scanning root segment: 0x701a000..0x701afff (4096)
--9463-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9463-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9463-- Scanning root segment: 0xae51000..0xae52fff (8192)
==9466== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9466-by-pythonnut-on-???
==9466== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9466-by-pythonnut-on-???
==9466== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9466-by-pythonnut-on-???
==9466==
==9466== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9466== don't want to do, unless you know exactly what you're doing,
==9466== or are doing some strange experiment):
==9466== /usr/lib/valgrind/../../bin/vgdb --pid=9466 ...command...
==9466==
==9466== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9466== /path/to/gdb ./zsh
==9466== and then give GDB the following command
==9466== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9466
==9466== --pid is optional if only one valgrind process is running
==9466==
--9463-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9463-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9463-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9463-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9463-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9463-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9466-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466==
==9466== HEAP SUMMARY:
==9466== in use at exit: 3,168,432 bytes in 69,603 blocks
==9466== total heap usage: 940,530 allocs, 870,927 frees, 68,301,256 bytes allocated
==9466==
==9466== Searching for pointers to 69,603 not-freed blocks
--9466-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9466-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9466-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9466-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9466-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9466-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9466-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9466-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9466-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9466-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9466-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9466-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9466-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9466-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9466-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9466-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9466-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9466-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9466-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9466-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9466-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9466-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9466-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9466-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9466-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9466-- Scanning root segment: 0x701a000..0x701afff (4096)
--9466-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9466-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9466-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9466-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9466-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9466-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9466-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9466-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9466-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9463== Checked 4,979,568 bytes
==9463==
==9463== LEAK SUMMARY:
==9463== definitely lost: 1,533 bytes in 8 blocks
==9463== indirectly lost: 6,756 bytes in 7 blocks
==9463== possibly lost: 0 bytes in 0 blocks
==9463== still reachable: 3,152,145 bytes in 69,096 blocks
==9463== suppressed: 0 bytes in 0 blocks
==9463== Rerun with --leak-check=full to see details of leaked memory
==9463==
==9463== Use --track-origins=yes to see where uninitialised values come from
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463==
==9463== 1 errors in context 1 of 2:
==9463== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9463== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9463== by 0x488CD0: stringsubst (subst.c:301)
==9463== by 0x48801B: prefork (subst.c:77)
==9463== by 0x42B318: execcmd (exec.c:2619)
==9463== by 0x428CA0: execpline2 (exec.c:1697)
==9463== by 0x427FD2: execpline (exec.c:1484)
==9463== by 0x427756: execlist (exec.c:1267)
==9463== by 0x42717C: execode (exec.c:1073)
==9463== by 0x431299: runshfunc (exec.c:5040)
==9463== by 0x430E76: doshfunc (exec.c:4920)
==9463== by 0x4302FB: execshfunc (exec.c:4557)
==9463== by 0x42D8C1: execcmd (exec.c:3373)
==9463==
==9463==
==9463== 2 errors in context 2 of 2:
==9463== Conditional jump or move depends on uninitialised value(s)
==9463== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9463== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9463== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9463== by 0x40EFC2: execbuiltin (builtin.c:450)
==9463== by 0x42D8E9: execcmd (exec.c:3378)
==9463== by 0x428CA0: execpline2 (exec.c:1697)
==9463== by 0x427FD2: execpline (exec.c:1484)
==9463== by 0x42779A: execlist (exec.c:1275)
==9463== by 0x42717C: execode (exec.c:1073)
==9463== by 0x431299: runshfunc (exec.c:5040)
==9463== by 0x430E76: doshfunc (exec.c:4920)
==9463== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9463==
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9434-- Caught __NR_exit; running __libc_freeres()
--9434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466== Checked 4,891,552 bytes
==9466==
==9434==
==9434== HEAP SUMMARY:
==9434== in use at exit: 3,121,665 bytes in 69,077 blocks
==9434== total heap usage: 935,610 allocs, 866,533 frees, 66,624,248 bytes allocated
==9434==
==9466== LEAK SUMMARY:
==9466== definitely lost: 1,533 bytes in 8 blocks
==9466== indirectly lost: 6,756 bytes in 7 blocks
==9466== possibly lost: 0 bytes in 0 blocks
==9466== still reachable: 3,160,143 bytes in 69,588 blocks
==9466== suppressed: 0 bytes in 0 blocks
==9466== Rerun with --leak-check=full to see details of leaked memory
==9466==
==9466== Use --track-origins=yes to see where uninitialised values come from
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9466==
==9466== 1 errors in context 1 of 2:
==9466== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9466== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9466== by 0x488CD0: stringsubst (subst.c:301)
==9466== by 0x48801B: prefork (subst.c:77)
==9466== by 0x42B318: execcmd (exec.c:2619)
==9466== by 0x428CA0: execpline2 (exec.c:1697)
==9466== by 0x427FD2: execpline (exec.c:1484)
==9466== by 0x427756: execlist (exec.c:1267)
==9466== by 0x42717C: execode (exec.c:1073)
==9466== by 0x431299: runshfunc (exec.c:5040)
==9466== by 0x430E76: doshfunc (exec.c:4920)
==9466== by 0x4302FB: execshfunc (exec.c:4557)
==9466== by 0x42D8C1: execcmd (exec.c:3373)
==9466==
==9466==
==9466== 2 errors in context 2 of 2:
==9466== Conditional jump or move depends on uninitialised value(s)
==9466== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9466== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9466== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9466== by 0x40EFC2: execbuiltin (builtin.c:450)
==9466== by 0x42D8E9: execcmd (exec.c:3378)
==9466== by 0x428CA0: execpline2 (exec.c:1697)
==9466== by 0x427FD2: execpline (exec.c:1484)
==9466== by 0x42779A: execlist (exec.c:1275)
==9466== by 0x42717C: execode (exec.c:1073)
==9466== by 0x431299: runshfunc (exec.c:5040)
==9466== by 0x430E76: doshfunc (exec.c:4920)
==9466== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9466==
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9465-- Caught __NR_exit; running __libc_freeres()
==9434== Searching for pointers to 69,077 not-freed blocks
--9434-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9434-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9434-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9434-- Scanning root segment: 0x4037000..0x403afff (16384)
--9434-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9434-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9434-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9434-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9434-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9434-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9434-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9434-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9434-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9434-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9434-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9434-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9434-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9434-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9434-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9434-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9434-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9434-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9434-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9434-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9434-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9434-- Scanning root segment: 0x701a000..0x701afff (4096)
--9434-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9434-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9434-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9434-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9434-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9434-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9434-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9434-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9434-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9465-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9465==
==9465== HEAP SUMMARY:
==9465== in use at exit: 3,168,368 bytes in 69,600 blocks
==9465== total heap usage: 940,532 allocs, 870,932 frees, 68,301,800 bytes allocated
==9465==
==9465== Searching for pointers to 69,600 not-freed blocks
--9465-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9465-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9465-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9465-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9465-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9465-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9465-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9465-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9465-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9465-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9465-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9465-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9465-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9465-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9465-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9465-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9465-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9465-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9465-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9465-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9465-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9465-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9465-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9465-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9465-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9465-- Scanning root segment: 0x701a000..0x701afff (4096)
--9465-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9465-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9465-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9465-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9465-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9465-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9465-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9465-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9465-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9434== Checked 4,803,984 bytes
==9434==
==9434== LEAK SUMMARY:
==9434== definitely lost: 1,533 bytes in 8 blocks
==9434== indirectly lost: 6,756 bytes in 7 blocks
==9434== possibly lost: 0 bytes in 0 blocks
==9434== still reachable: 3,113,376 bytes in 69,062 blocks
==9434== suppressed: 0 bytes in 0 blocks
==9434== Rerun with --leak-check=full to see details of leaked memory
==9434==
==9434== Use --track-origins=yes to see where uninitialised values come from
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9434==
==9434== 1 errors in context 1 of 2:
==9434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9434== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9434== by 0x488CD0: stringsubst (subst.c:301)
==9434== by 0x48801B: prefork (subst.c:77)
==9434== by 0x42B318: execcmd (exec.c:2619)
==9434== by 0x428CA0: execpline2 (exec.c:1697)
==9434== by 0x427FD2: execpline (exec.c:1484)
==9434== by 0x427756: execlist (exec.c:1267)
==9434== by 0x42717C: execode (exec.c:1073)
==9434== by 0x431299: runshfunc (exec.c:5040)
==9434== by 0x430E76: doshfunc (exec.c:4920)
==9434== by 0x4302FB: execshfunc (exec.c:4557)
==9434== by 0x42D8C1: execcmd (exec.c:3373)
==9434==
==9434==
==9434== 2 errors in context 2 of 2:
==9434== Conditional jump or move depends on uninitialised value(s)
==9434== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9434== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9434== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9434== by 0x40EFC2: execbuiltin (builtin.c:450)
==9434== by 0x42D8E9: execcmd (exec.c:3378)
==9434== by 0x428CA0: execpline2 (exec.c:1697)
==9434== by 0x427FD2: execpline (exec.c:1484)
==9434== by 0x42779A: execlist (exec.c:1275)
==9434== by 0x42717C: execode (exec.c:1073)
==9434== by 0x431299: runshfunc (exec.c:5040)
==9434== by 0x430E76: doshfunc (exec.c:4920)
==9434== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9434==
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465== Checked 4,890,872 bytes
==9465==
==9465== LEAK SUMMARY:
==9465== definitely lost: 1,533 bytes in 8 blocks
==9465== indirectly lost: 6,756 bytes in 7 blocks
==9465== possibly lost: 0 bytes in 0 blocks
==9465== still reachable: 3,160,079 bytes in 69,585 blocks
==9465== suppressed: 0 bytes in 0 blocks
==9465== Rerun with --leak-check=full to see details of leaked memory
==9465==
==9465== Use --track-origins=yes to see where uninitialised values come from
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465==
==9465== 1 errors in context 1 of 2:
==9465== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9465== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9465== by 0x488CD0: stringsubst (subst.c:301)
==9465== by 0x48801B: prefork (subst.c:77)
==9465== by 0x42B318: execcmd (exec.c:2619)
==9465== by 0x428CA0: execpline2 (exec.c:1697)
==9465== by 0x427FD2: execpline (exec.c:1484)
==9465== by 0x427756: execlist (exec.c:1267)
==9465== by 0x42717C: execode (exec.c:1073)
==9465== by 0x431299: runshfunc (exec.c:5040)
==9465== by 0x430E76: doshfunc (exec.c:4920)
==9465== by 0x4302FB: execshfunc (exec.c:4557)
==9465== by 0x42D8C1: execcmd (exec.c:3373)
==9465==
==9465==
==9465== 2 errors in context 2 of 2:
==9465== Conditional jump or move depends on uninitialised value(s)
==9465== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9465== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9465== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9465== by 0x40EFC2: execbuiltin (builtin.c:450)
==9465== by 0x42D8E9: execcmd (exec.c:3378)
==9465== by 0x428CA0: execpline2 (exec.c:1697)
==9465== by 0x427FD2: execpline (exec.c:1484)
==9465== by 0x42779A: execlist (exec.c:1275)
==9465== by 0x42717C: execode (exec.c:1073)
==9465== by 0x431299: runshfunc (exec.c:5040)
==9465== by 0x430E76: doshfunc (exec.c:4920)
==9465== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9465==
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF757C, len 4
client request: code 4d430005, addr 0xFFEFF642C, len 4
client request: code 4d430005, addr 0xFFEFF933C, len 4
--9407-- Caught __NR_exit; running __libc_freeres()
--9407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9407==
==9407== HEAP SUMMARY:
==9407== in use at exit: 3,146,689 bytes in 69,118 blocks
==9407== total heap usage: 940,623 allocs, 871,505 frees, 68,318,571 bytes allocated
==9407==
==9407== Searching for pointers to 69,118 not-freed blocks
--9407-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9407-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9407-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9407-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9407-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9407-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9407-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9407-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9407-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9407-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9407-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9407-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9407-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9407-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9407-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9407-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9407-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9407-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9407-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9407-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9407-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9407-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9407-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9407-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9407-- Scanning root segment: 0x701a000..0x701afff (4096)
--9407-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9407-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9407-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9407-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9407-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9407-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9407-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9407-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9407-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9407== Checked 4,793,040 bytes
==9407==
==9407== LEAK SUMMARY:
==9407== definitely lost: 1,533 bytes in 8 blocks
==9407== indirectly lost: 6,756 bytes in 7 blocks
==9407== possibly lost: 0 bytes in 0 blocks
==9407== still reachable: 3,138,400 bytes in 69,103 blocks
==9407== suppressed: 0 bytes in 0 blocks
==9407== Rerun with --leak-check=full to see details of leaked memory
==9407==
==9407== Use --track-origins=yes to see where uninitialised values come from
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9407==
==9407== 1 errors in context 1 of 2:
==9407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9407== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9407== by 0x488CD0: stringsubst (subst.c:301)
==9407== by 0x48801B: prefork (subst.c:77)
==9407== by 0x42B318: execcmd (exec.c:2619)
==9407== by 0x428CA0: execpline2 (exec.c:1697)
==9407== by 0x427FD2: execpline (exec.c:1484)
==9407== by 0x427756: execlist (exec.c:1267)
==9407== by 0x42717C: execode (exec.c:1073)
==9407== by 0x431299: runshfunc (exec.c:5040)
==9407== by 0x430E76: doshfunc (exec.c:4920)
==9407== by 0x4302FB: execshfunc (exec.c:4557)
==9407== by 0x42D8C1: execcmd (exec.c:3373)
==9407==
==9407==
==9407== 2 errors in context 2 of 2:
==9407== Conditional jump or move depends on uninitialised value(s)
==9407== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9407== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9407== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9407== by 0x40EFC2: execbuiltin (builtin.c:450)
==9407== by 0x42D8E9: execcmd (exec.c:3378)
==9407== by 0x428CA0: execpline2 (exec.c:1697)
==9407== by 0x427FD2: execpline (exec.c:1484)
==9407== by 0x42779A: execlist (exec.c:1275)
==9407== by 0x42717C: execode (exec.c:1073)
==9407== by 0x431299: runshfunc (exec.c:5040)
==9407== by 0x430E76: doshfunc (exec.c:4920)
==9407== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9407==
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9400-- Caught __NR_exit; running __libc_freeres()
--9400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9400==
==9400== HEAP SUMMARY:
==9400== in use at exit: 3,116,601 bytes in 68,889 blocks
==9400== total heap usage: 935,507 allocs, 866,618 frees, 66,585,332 bytes allocated
==9400==
==9400== Searching for pointers to 68,889 not-freed blocks
--9400-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9400-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9400-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9400-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9400-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9400-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9400-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9400-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9400-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9400-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9400-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9400-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9400-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9400-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9400-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9400-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9400-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9400-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9400-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9400-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9400-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9400-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9400-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9400-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9400-- Scanning root segment: 0x701a000..0x701afff (4096)
--9400-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9400-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9400-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9400-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9400-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9400-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9400-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9400-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9400-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9400== Checked 4,761,832 bytes
==9400==
==9400== LEAK SUMMARY:
==9400== definitely lost: 1,533 bytes in 8 blocks
==9400== indirectly lost: 6,756 bytes in 7 blocks
==9400== possibly lost: 0 bytes in 0 blocks
==9400== still reachable: 3,108,312 bytes in 68,874 blocks
==9400== suppressed: 0 bytes in 0 blocks
==9400== Rerun with --leak-check=full to see details of leaked memory
==9400==
==9400== Use --track-origins=yes to see where uninitialised values come from
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9400==
==9400== 1 errors in context 1 of 2:
==9400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9400== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9400== by 0x488CD0: stringsubst (subst.c:301)
==9400== by 0x48801B: prefork (subst.c:77)
==9400== by 0x42B318: execcmd (exec.c:2619)
==9400== by 0x428CA0: execpline2 (exec.c:1697)
==9400== by 0x427FD2: execpline (exec.c:1484)
==9400== by 0x427756: execlist (exec.c:1267)
==9400== by 0x42717C: execode (exec.c:1073)
==9400== by 0x431299: runshfunc (exec.c:5040)
==9400== by 0x430E76: doshfunc (exec.c:4920)
==9400== by 0x4302FB: execshfunc (exec.c:4557)
==9400== by 0x42D8C1: execcmd (exec.c:3373)
==9400==
==9400==
==9400== 2 errors in context 2 of 2:
==9400== Conditional jump or move depends on uninitialised value(s)
==9400== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9400== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9400== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9400== by 0x40EFC2: execbuiltin (builtin.c:450)
==9400== by 0x42D8E9: execcmd (exec.c:3378)
==9400== by 0x428CA0: execpline2 (exec.c:1697)
==9400== by 0x427FD2: execpline (exec.c:1484)
==9400== by 0x42779A: execlist (exec.c:1275)
==9400== by 0x42717C: execode (exec.c:1073)
==9400== by 0x431299: runshfunc (exec.c:5040)
==9400== by 0x430E76: doshfunc (exec.c:4920)
==9400== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9400==
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9469-- Caught __NR_exit; running __libc_freeres()
==9469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9469-by-pythonnut-on-???
==9469== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9469-by-pythonnut-on-???
==9469== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9469-by-pythonnut-on-???
==9469==
==9469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9469== don't want to do, unless you know exactly what you're doing,
==9469== or are doing some strange experiment):
==9469== /usr/lib/valgrind/../../bin/vgdb --pid=9469 ...command...
==9469==
==9469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9469== /path/to/gdb ./zsh
==9469== and then give GDB the following command
==9469== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9469
==9469== --pid is optional if only one valgrind process is running
==9469==
==9470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9470-by-pythonnut-on-???
==9470== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9470-by-pythonnut-on-???
==9470== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9470-by-pythonnut-on-???
==9470==
==9470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9470== don't want to do, unless you know exactly what you're doing,
==9470== or are doing some strange experiment):
==9470== /usr/lib/valgrind/../../bin/vgdb --pid=9470 ...command...
==9470==
==9470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9470== /path/to/gdb ./zsh
==9470== and then give GDB the following command
==9470== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9470
==9470== --pid is optional if only one valgrind process is running
==9470==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--9469-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9469==
==9469== HEAP SUMMARY:
==9469== in use at exit: 3,118,245 bytes in 68,941 blocks
==9469== total heap usage: 935,566 allocs, 866,625 frees, 66,590,100 bytes allocated
==9469==
==9469== Searching for pointers to 68,941 not-freed blocks
--9469-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9469-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9469-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9469-- Scanning root segment: 0x4037000..0x403afff (16384)
--9469-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9469-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9469-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9469-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9469-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9469-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9469-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9469-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9469-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9469-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9469-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9469-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9469-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9469-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9469-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9469-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9469-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9469-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9469-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9469-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9469-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9469-- Scanning root segment: 0x701a000..0x701afff (4096)
--9469-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9469-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9469-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9469-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9469-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9469-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9469-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9469-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9469-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9469== Checked 4,780,400 bytes
==9469==
==9469== LEAK SUMMARY:
==9469== definitely lost: 1,533 bytes in 8 blocks
==9469== indirectly lost: 6,756 bytes in 7 blocks
==9469== possibly lost: 0 bytes in 0 blocks
==9469== still reachable: 3,109,956 bytes in 68,926 blocks
==9469== suppressed: 0 bytes in 0 blocks
==9469== Rerun with --leak-check=full to see details of leaked memory
==9469==
==9469== Use --track-origins=yes to see where uninitialised values come from
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9469==
==9469== 1 errors in context 1 of 2:
==9469== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9469== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9469== by 0x488CD0: stringsubst (subst.c:301)
==9469== by 0x48801B: prefork (subst.c:77)
==9469== by 0x42B318: execcmd (exec.c:2619)
==9469== by 0x428CA0: execpline2 (exec.c:1697)
==9469== by 0x427FD2: execpline (exec.c:1484)
==9469== by 0x427756: execlist (exec.c:1267)
==9469== by 0x42717C: execode (exec.c:1073)
==9469== by 0x431299: runshfunc (exec.c:5040)
==9469== by 0x430E76: doshfunc (exec.c:4920)
==9469== by 0x4302FB: execshfunc (exec.c:4557)
==9469== by 0x42D8C1: execcmd (exec.c:3373)
==9469==
==9469==
==9469== 2 errors in context 2 of 2:
==9469== Conditional jump or move depends on uninitialised value(s)
==9469== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9469== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9469== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9469== by 0x40EFC2: execbuiltin (builtin.c:450)
==9469== by 0x42D8E9: execcmd (exec.c:3378)
==9469== by 0x428CA0: execpline2 (exec.c:1697)
==9469== by 0x427FD2: execpline (exec.c:1484)
==9469== by 0x42779A: execlist (exec.c:1275)
==9469== by 0x42717C: execode (exec.c:1073)
==9469== by 0x431299: runshfunc (exec.c:5040)
==9469== by 0x430E76: doshfunc (exec.c:4920)
==9469== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9469==
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9468-by-pythonnut-on-???
==9468== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9468-by-pythonnut-on-???
==9468== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9468-by-pythonnut-on-???
==9468==
==9468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9468== don't want to do, unless you know exactly what you're doing,
==9468== or are doing some strange experiment):
==9468== /usr/lib/valgrind/../../bin/vgdb --pid=9468 ...command...
==9468==
==9468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9468== /path/to/gdb ./zsh
==9468== and then give GDB the following command
==9468== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9468
==9468== --pid is optional if only one valgrind process is running
==9468==
--9468-- Caught __NR_exit; running __libc_freeres()
--9468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9468==
==9468== HEAP SUMMARY:
==9468== in use at exit: 3,118,181 bytes in 68,938 blocks
==9468== total heap usage: 935,568 allocs, 866,630 frees, 66,590,644 bytes allocated
==9468==
==9468== Searching for pointers to 68,938 not-freed blocks
--9468-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9468-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9468-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9468-- Scanning root segment: 0x4037000..0x403afff (16384)
--9468-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9468-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9468-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9468-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9468-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9468-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9468-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9468-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9468-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9468-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9468-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9468-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9468-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9468-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9468-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9468-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9468-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9468-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9468-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9468-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9468-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9468-- Scanning root segment: 0x701a000..0x701afff (4096)
--9468-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9468-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9468-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9468-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9468-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9468-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9468-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9468-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9468-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9468== Checked 4,779,712 bytes
==9468==
==9468== LEAK SUMMARY:
==9468== definitely lost: 1,533 bytes in 8 blocks
==9468== indirectly lost: 6,756 bytes in 7 blocks
==9468== possibly lost: 0 bytes in 0 blocks
==9468== still reachable: 3,109,892 bytes in 68,923 blocks
==9468== suppressed: 0 bytes in 0 blocks
==9468== Rerun with --leak-check=full to see details of leaked memory
==9468==
==9468== Use --track-origins=yes to see where uninitialised values come from
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468==
==9468== 1 errors in context 1 of 2:
==9468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9468== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9468== by 0x488CD0: stringsubst (subst.c:301)
==9468== by 0x48801B: prefork (subst.c:77)
==9468== by 0x42B318: execcmd (exec.c:2619)
==9468== by 0x428CA0: execpline2 (exec.c:1697)
==9468== by 0x427FD2: execpline (exec.c:1484)
==9468== by 0x427756: execlist (exec.c:1267)
==9468== by 0x42717C: execode (exec.c:1073)
==9468== by 0x431299: runshfunc (exec.c:5040)
==9468== by 0x430E76: doshfunc (exec.c:4920)
==9468== by 0x4302FB: execshfunc (exec.c:4557)
==9468== by 0x42D8C1: execcmd (exec.c:3373)
==9468==
==9468==
==9468== 2 errors in context 2 of 2:
==9468== Conditional jump or move depends on uninitialised value(s)
==9468== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9468== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9468== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9468== by 0x40EFC2: execbuiltin (builtin.c:450)
==9468== by 0x42D8E9: execcmd (exec.c:3378)
==9468== by 0x428CA0: execpline2 (exec.c:1697)
==9468== by 0x427FD2: execpline (exec.c:1484)
==9468== by 0x42779A: execlist (exec.c:1275)
==9468== by 0x42717C: execode (exec.c:1073)
==9468== by 0x431299: runshfunc (exec.c:5040)
==9468== by 0x430E76: doshfunc (exec.c:4920)
==9468== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9468==
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9473-by-pythonnut-on-???
==9473== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9473-by-pythonnut-on-???
==9473== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9473-by-pythonnut-on-???
==9473==
==9473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9473== don't want to do, unless you know exactly what you're doing,
==9473== or are doing some strange experiment):
==9473== /usr/lib/valgrind/../../bin/vgdb --pid=9473 ...command...
==9473==
==9473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9473== /path/to/gdb ./zsh
==9473== and then give GDB the following command
==9473== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9473
==9473== --pid is optional if only one valgrind process is running
==9473==
--9473-- Caught __NR_exit; running __libc_freeres()
--9473-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9473==
==9473== HEAP SUMMARY:
==9473== in use at exit: 3,118,181 bytes in 68,938 blocks
==9473== total heap usage: 935,583 allocs, 866,645 frees, 66,595,628 bytes allocated
==9473==
==9473== Searching for pointers to 68,938 not-freed blocks
--9473-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9473-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9473-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9473-- Scanning root segment: 0x4037000..0x403afff (16384)
--9473-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9473-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9473-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9473-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9473-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9473-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9473-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9473-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9473-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9473-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9473-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9473-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9473-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9473-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9473-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9473-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9473-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9473-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9473-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9473-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9473-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9473-- Scanning root segment: 0x701a000..0x701afff (4096)
--9473-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9473-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9473-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9473-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9473-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9473-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9473-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9473-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9473-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9473== Checked 4,779,712 bytes
==9473==
==9473== LEAK SUMMARY:
==9473== definitely lost: 1,533 bytes in 8 blocks
==9473== indirectly lost: 6,756 bytes in 7 blocks
==9473== possibly lost: 0 bytes in 0 blocks
==9473== still reachable: 3,109,892 bytes in 68,923 blocks
==9473== suppressed: 0 bytes in 0 blocks
==9473== Rerun with --leak-check=full to see details of leaked memory
==9473==
==9473== Use --track-origins=yes to see where uninitialised values come from
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473==
==9473== 1 errors in context 1 of 2:
==9473== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9473== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9473== by 0x488CD0: stringsubst (subst.c:301)
==9473== by 0x48801B: prefork (subst.c:77)
==9473== by 0x42B318: execcmd (exec.c:2619)
==9473== by 0x428CA0: execpline2 (exec.c:1697)
==9473== by 0x427FD2: execpline (exec.c:1484)
==9473== by 0x427756: execlist (exec.c:1267)
==9473== by 0x42717C: execode (exec.c:1073)
==9473== by 0x431299: runshfunc (exec.c:5040)
==9473== by 0x430E76: doshfunc (exec.c:4920)
==9473== by 0x4302FB: execshfunc (exec.c:4557)
==9473== by 0x42D8C1: execcmd (exec.c:3373)
==9473==
==9473==
==9473== 2 errors in context 2 of 2:
==9473== Conditional jump or move depends on uninitialised value(s)
==9473== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9473== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9473== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9473== by 0x40EFC2: execbuiltin (builtin.c:450)
==9473== by 0x42D8E9: execcmd (exec.c:3378)
==9473== by 0x428CA0: execpline2 (exec.c:1697)
==9473== by 0x427FD2: execpline (exec.c:1484)
==9473== by 0x42779A: execlist (exec.c:1275)
==9473== by 0x42717C: execode (exec.c:1073)
==9473== by 0x431299: runshfunc (exec.c:5040)
==9473== by 0x430E76: doshfunc (exec.c:4920)
==9473== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9473==
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9474-by-pythonnut-on-???
==9474== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9474-by-pythonnut-on-???
==9474== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9474-by-pythonnut-on-???
==9474==
==9474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9474== don't want to do, unless you know exactly what you're doing,
==9474== or are doing some strange experiment):
==9474== /usr/lib/valgrind/../../bin/vgdb --pid=9474 ...command...
==9474==
==9474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9474== /path/to/gdb ./zsh
==9474== and then give GDB the following command
==9474== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9474
==9474== --pid is optional if only one valgrind process is running
==9474==
--9474-- Caught __NR_exit; running __libc_freeres()
--9474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9474==
==9474== HEAP SUMMARY:
==9474== in use at exit: 3,118,181 bytes in 68,938 blocks
==9474== total heap usage: 935,588 allocs, 866,650 frees, 66,597,741 bytes allocated
==9474==
==9474== Searching for pointers to 68,938 not-freed blocks
--9474-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9474-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9474-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9474-- Scanning root segment: 0x4037000..0x403afff (16384)
--9474-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9474-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9474-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9474-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9474-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9474-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9474-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9474-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9474-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9474-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9474-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9474-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9474-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9474-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9474-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9474-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9474-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9474-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9474-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9474-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9474-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9474-- Scanning root segment: 0x701a000..0x701afff (4096)
--9474-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9474-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9474-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9474-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9474-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9474-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9474-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9474-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9474-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9474== Checked 4,779,712 bytes
==9474==
==9474== LEAK SUMMARY:
==9474== definitely lost: 1,533 bytes in 8 blocks
==9474== indirectly lost: 6,756 bytes in 7 blocks
==9474== possibly lost: 0 bytes in 0 blocks
==9474== still reachable: 3,109,892 bytes in 68,923 blocks
==9474== suppressed: 0 bytes in 0 blocks
==9474== Rerun with --leak-check=full to see details of leaked memory
==9474==
==9474== Use --track-origins=yes to see where uninitialised values come from
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474==
==9474== 1 errors in context 1 of 2:
==9474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9474== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9474== by 0x488CD0: stringsubst (subst.c:301)
==9474== by 0x48801B: prefork (subst.c:77)
==9474== by 0x42B318: execcmd (exec.c:2619)
==9474== by 0x428CA0: execpline2 (exec.c:1697)
==9474== by 0x427FD2: execpline (exec.c:1484)
==9474== by 0x427756: execlist (exec.c:1267)
==9474== by 0x42717C: execode (exec.c:1073)
==9474== by 0x431299: runshfunc (exec.c:5040)
==9474== by 0x430E76: doshfunc (exec.c:4920)
==9474== by 0x4302FB: execshfunc (exec.c:4557)
==9474== by 0x42D8C1: execcmd (exec.c:3373)
==9474==
==9474==
==9474== 2 errors in context 2 of 2:
==9474== Conditional jump or move depends on uninitialised value(s)
==9474== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9474== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9474== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9474== by 0x40EFC2: execbuiltin (builtin.c:450)
==9474== by 0x42D8E9: execcmd (exec.c:3378)
==9474== by 0x428CA0: execpline2 (exec.c:1697)
==9474== by 0x427FD2: execpline (exec.c:1484)
==9474== by 0x42779A: execlist (exec.c:1275)
==9474== by 0x42717C: execode (exec.c:1073)
==9474== by 0x431299: runshfunc (exec.c:5040)
==9474== by 0x430E76: doshfunc (exec.c:4920)
==9474== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9474==
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9475-- Caught __NR_exit; running __libc_freeres()
==9475== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9475-by-pythonnut-on-???
==9475== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9475-by-pythonnut-on-???
==9475== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9475-by-pythonnut-on-???
==9475==
==9475== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9475== don't want to do, unless you know exactly what you're doing,
==9475== or are doing some strange experiment):
==9475== /usr/lib/valgrind/../../bin/vgdb --pid=9475 ...command...
==9475==
==9475== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9475== /path/to/gdb ./zsh
==9475== and then give GDB the following command
==9475== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9475
==9475== --pid is optional if only one valgrind process is running
==9475==
--9475-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9475==
==9475== HEAP SUMMARY:
==9475== in use at exit: 3,118,181 bytes in 68,938 blocks
==9475== total heap usage: 935,593 allocs, 866,655 frees, 66,599,854 bytes allocated
==9475==
==9475== Searching for pointers to 68,938 not-freed blocks
--9475-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9475-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9475-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9475-- Scanning root segment: 0x4037000..0x403afff (16384)
--9475-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9475-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9475-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9475-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9475-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9475-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9475-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9475-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9475-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9475-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9475-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9475-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9475-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9475-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9475-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9475-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9475-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9475-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9475-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9475-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9475-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9475-- Scanning root segment: 0x701a000..0x701afff (4096)
--9475-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9475-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9475-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9475-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9475-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9475-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9475-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9475-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9475-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9475== Checked 4,779,712 bytes
==9475==
==9475== LEAK SUMMARY:
==9475== definitely lost: 1,533 bytes in 8 blocks
==9475== indirectly lost: 6,756 bytes in 7 blocks
==9475== possibly lost: 0 bytes in 0 blocks
==9475== still reachable: 3,109,892 bytes in 68,923 blocks
==9475== suppressed: 0 bytes in 0 blocks
==9475== Rerun with --leak-check=full to see details of leaked memory
==9475==
==9475== Use --track-origins=yes to see where uninitialised values come from
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9475==
==9475== 1 errors in context 1 of 2:
==9475== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9475== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9475== by 0x488CD0: stringsubst (subst.c:301)
==9475== by 0x48801B: prefork (subst.c:77)
==9475== by 0x42B318: execcmd (exec.c:2619)
==9475== by 0x428CA0: execpline2 (exec.c:1697)
==9475== by 0x427FD2: execpline (exec.c:1484)
==9475== by 0x427756: execlist (exec.c:1267)
==9475== by 0x42717C: execode (exec.c:1073)
==9475== by 0x431299: runshfunc (exec.c:5040)
==9475== by 0x430E76: doshfunc (exec.c:4920)
==9475== by 0x4302FB: execshfunc (exec.c:4557)
==9475== by 0x42D8C1: execcmd (exec.c:3373)
==9475==
==9475==
==9475== 2 errors in context 2 of 2:
==9475== Conditional jump or move depends on uninitialised value(s)
==9475== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9475== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9475== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9475== by 0x40EFC2: execbuiltin (builtin.c:450)
==9475== by 0x42D8E9: execcmd (exec.c:3378)
==9475== by 0x428CA0: execpline2 (exec.c:1697)
==9475== by 0x427FD2: execpline (exec.c:1484)
==9475== by 0x42779A: execlist (exec.c:1275)
==9475== by 0x42717C: execode (exec.c:1073)
==9475== by 0x431299: runshfunc (exec.c:5040)
==9475== by 0x430E76: doshfunc (exec.c:4920)
==9475== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9475==
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9476-by-pythonnut-on-???
==9476== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9476-by-pythonnut-on-???
==9476== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9476-by-pythonnut-on-???
==9476==
==9476== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9476== don't want to do, unless you know exactly what you're doing,
==9476== or are doing some strange experiment):
==9476== /usr/lib/valgrind/../../bin/vgdb --pid=9476 ...command...
==9476==
==9476== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9476== /path/to/gdb ./zsh
==9476== and then give GDB the following command
==9476== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9476
==9476== --pid is optional if only one valgrind process is running
==9476==
--9476-- Caught __NR_exit; running __libc_freeres()
--9476-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9476==
==9476== HEAP SUMMARY:
==9476== in use at exit: 3,118,181 bytes in 68,938 blocks
==9476== total heap usage: 935,598 allocs, 866,660 frees, 66,601,967 bytes allocated
==9476==
==9476== Searching for pointers to 68,938 not-freed blocks
--9476-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9476-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9476-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9476-- Scanning root segment: 0x4037000..0x403afff (16384)
--9476-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9476-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9476-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9476-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9476-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9476-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9476-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9476-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9476-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9476-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9476-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9476-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9476-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9476-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9476-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9476-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9476-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9476-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9476-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9476-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9476-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9476-- Scanning root segment: 0x701a000..0x701afff (4096)
--9476-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9476-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9476-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9476-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9476-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9476-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9476-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9476-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9476-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9476== Checked 4,779,712 bytes
==9476==
==9476== LEAK SUMMARY:
==9476== definitely lost: 1,533 bytes in 8 blocks
==9476== indirectly lost: 6,756 bytes in 7 blocks
==9476== possibly lost: 0 bytes in 0 blocks
==9476== still reachable: 3,109,892 bytes in 68,923 blocks
==9476== suppressed: 0 bytes in 0 blocks
==9476== Rerun with --leak-check=full to see details of leaked memory
==9476==
==9476== Use --track-origins=yes to see where uninitialised values come from
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476==
==9476== 1 errors in context 1 of 2:
==9476== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9476== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9476== by 0x488CD0: stringsubst (subst.c:301)
==9476== by 0x48801B: prefork (subst.c:77)
==9476== by 0x42B318: execcmd (exec.c:2619)
==9476== by 0x428CA0: execpline2 (exec.c:1697)
==9476== by 0x427FD2: execpline (exec.c:1484)
==9476== by 0x427756: execlist (exec.c:1267)
==9476== by 0x42717C: execode (exec.c:1073)
==9476== by 0x431299: runshfunc (exec.c:5040)
==9476== by 0x430E76: doshfunc (exec.c:4920)
==9476== by 0x4302FB: execshfunc (exec.c:4557)
==9476== by 0x42D8C1: execcmd (exec.c:3373)
==9476==
==9476==
==9476== 2 errors in context 2 of 2:
==9476== Conditional jump or move depends on uninitialised value(s)
==9476== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9476== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9476== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9476== by 0x40EFC2: execbuiltin (builtin.c:450)
==9476== by 0x42D8E9: execcmd (exec.c:3378)
==9476== by 0x428CA0: execpline2 (exec.c:1697)
==9476== by 0x427FD2: execpline (exec.c:1484)
==9476== by 0x42779A: execlist (exec.c:1275)
==9476== by 0x42717C: execode (exec.c:1073)
==9476== by 0x431299: runshfunc (exec.c:5040)
==9476== by 0x430E76: doshfunc (exec.c:4920)
==9476== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9476==
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9477-by-pythonnut-on-???
==9477== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9477-by-pythonnut-on-???
==9477== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9477-by-pythonnut-on-???
==9477==
==9477== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9477== don't want to do, unless you know exactly what you're doing,
==9477== or are doing some strange experiment):
==9477== /usr/lib/valgrind/../../bin/vgdb --pid=9477 ...command...
==9477==
==9477== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9477== /path/to/gdb ./zsh
==9477== and then give GDB the following command
==9477== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9477
==9477== --pid is optional if only one valgrind process is running
==9477==
--9477-- Caught __NR_exit; running __libc_freeres()
--9477-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9477==
==9477== HEAP SUMMARY:
==9477== in use at exit: 3,118,181 bytes in 68,938 blocks
==9477== total heap usage: 935,603 allocs, 866,665 frees, 66,604,080 bytes allocated
==9477==
==9477== Searching for pointers to 68,938 not-freed blocks
--9477-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9477-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9477-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9477-- Scanning root segment: 0x4037000..0x403afff (16384)
--9477-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9477-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9477-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9477-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9477-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9477-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9477-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9477-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9477-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9477-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9477-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9477-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9477-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9477-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9477-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9477-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9477-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9477-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9477-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9477-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9477-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9477-- Scanning root segment: 0x701a000..0x701afff (4096)
--9477-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9477-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9477-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9477-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9477-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9477-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9477-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9477-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9477-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9477== Checked 4,779,712 bytes
==9477==
==9477== LEAK SUMMARY:
==9477== definitely lost: 1,533 bytes in 8 blocks
==9477== indirectly lost: 6,756 bytes in 7 blocks
==9477== possibly lost: 0 bytes in 0 blocks
==9477== still reachable: 3,109,892 bytes in 68,923 blocks
==9477== suppressed: 0 bytes in 0 blocks
==9477== Rerun with --leak-check=full to see details of leaked memory
==9477==
==9477== Use --track-origins=yes to see where uninitialised values come from
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477==
==9477== 1 errors in context 1 of 2:
==9477== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9477== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9477== by 0x488CD0: stringsubst (subst.c:301)
==9477== by 0x48801B: prefork (subst.c:77)
==9477== by 0x42B318: execcmd (exec.c:2619)
==9477== by 0x428CA0: execpline2 (exec.c:1697)
==9477== by 0x427FD2: execpline (exec.c:1484)
==9477== by 0x427756: execlist (exec.c:1267)
==9477== by 0x42717C: execode (exec.c:1073)
==9477== by 0x431299: runshfunc (exec.c:5040)
==9477== by 0x430E76: doshfunc (exec.c:4920)
==9477== by 0x4302FB: execshfunc (exec.c:4557)
==9477== by 0x42D8C1: execcmd (exec.c:3373)
==9477==
==9477==
==9477== 2 errors in context 2 of 2:
==9477== Conditional jump or move depends on uninitialised value(s)
==9477== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9477== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9477== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9477== by 0x40EFC2: execbuiltin (builtin.c:450)
==9477== by 0x42D8E9: execcmd (exec.c:3378)
==9477== by 0x428CA0: execpline2 (exec.c:1697)
==9477== by 0x427FD2: execpline (exec.c:1484)
==9477== by 0x42779A: execlist (exec.c:1275)
==9477== by 0x42717C: execode (exec.c:1073)
==9477== by 0x431299: runshfunc (exec.c:5040)
==9477== by 0x430E76: doshfunc (exec.c:4920)
==9477== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9477==
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9480-by-pythonnut-on-???
==9480== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9480-by-pythonnut-on-???
==9480== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9480-by-pythonnut-on-???
==9480==
==9480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9480== don't want to do, unless you know exactly what you're doing,
==9480== or are doing some strange experiment):
==9480== /usr/lib/valgrind/../../bin/vgdb --pid=9480 ...command...
==9480==
==9480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9480== /path/to/gdb ./zsh
==9480== and then give GDB the following command
==9480== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9480
==9480== --pid is optional if only one valgrind process is running
==9480==
--9480-- Caught __NR_exit; running __libc_freeres()
--9480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9480==
==9480== HEAP SUMMARY:
==9480== in use at exit: 3,118,181 bytes in 68,938 blocks
==9480== total heap usage: 935,608 allocs, 866,670 frees, 66,606,189 bytes allocated
==9480==
==9480== Searching for pointers to 68,938 not-freed blocks
--9480-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9480-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9480-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9480-- Scanning root segment: 0x4037000..0x403afff (16384)
--9480-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9480-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9480-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9480-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9480-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9480-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9480-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9480-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9480-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9480-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9480-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9480-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9480-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9480-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9480-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9480-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9480-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9480-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9480-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9480-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9480-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9480-- Scanning root segment: 0x701a000..0x701afff (4096)
--9480-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9480-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9480-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9480-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9480-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9480-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9480-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9480-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9480-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9480== Checked 4,779,712 bytes
==9480==
==9480== LEAK SUMMARY:
==9480== definitely lost: 1,533 bytes in 8 blocks
==9480== indirectly lost: 6,756 bytes in 7 blocks
==9480== possibly lost: 0 bytes in 0 blocks
==9480== still reachable: 3,109,892 bytes in 68,923 blocks
==9480== suppressed: 0 bytes in 0 blocks
==9480== Rerun with --leak-check=full to see details of leaked memory
==9480==
==9480== Use --track-origins=yes to see where uninitialised values come from
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480==
==9480== 1 errors in context 1 of 2:
==9480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9480== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9480== by 0x488CD0: stringsubst (subst.c:301)
==9480== by 0x48801B: prefork (subst.c:77)
==9480== by 0x42B318: execcmd (exec.c:2619)
==9480== by 0x428CA0: execpline2 (exec.c:1697)
==9480== by 0x427FD2: execpline (exec.c:1484)
==9480== by 0x427756: execlist (exec.c:1267)
==9480== by 0x42717C: execode (exec.c:1073)
==9480== by 0x431299: runshfunc (exec.c:5040)
==9480== by 0x430E76: doshfunc (exec.c:4920)
==9480== by 0x4302FB: execshfunc (exec.c:4557)
==9480== by 0x42D8C1: execcmd (exec.c:3373)
==9480==
==9480==
==9480== 2 errors in context 2 of 2:
==9480== Conditional jump or move depends on uninitialised value(s)
==9480== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9480== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9480== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9480== by 0x40EFC2: execbuiltin (builtin.c:450)
==9480== by 0x42D8E9: execcmd (exec.c:3378)
==9480== by 0x428CA0: execpline2 (exec.c:1697)
==9480== by 0x427FD2: execpline (exec.c:1484)
==9480== by 0x42779A: execlist (exec.c:1275)
==9480== by 0x42717C: execode (exec.c:1073)
==9480== by 0x431299: runshfunc (exec.c:5040)
==9480== by 0x430E76: doshfunc (exec.c:4920)
==9480== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9480==
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9481-by-pythonnut-on-???
==9481== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9481-by-pythonnut-on-???
==9481== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9481-by-pythonnut-on-???
==9481==
==9481== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9481== don't want to do, unless you know exactly what you're doing,
==9481== or are doing some strange experiment):
==9481== /usr/lib/valgrind/../../bin/vgdb --pid=9481 ...command...
==9481==
==9481== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9481== /path/to/gdb ./zsh
==9481== and then give GDB the following command
==9481== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9481
==9481== --pid is optional if only one valgrind process is running
==9481==
--9481-- Caught __NR_exit; running __libc_freeres()
--9481-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9481==
==9481== HEAP SUMMARY:
==9481== in use at exit: 3,118,181 bytes in 68,938 blocks
==9481== total heap usage: 935,613 allocs, 866,675 frees, 66,608,306 bytes allocated
==9481==
==9481== Searching for pointers to 68,938 not-freed blocks
--9481-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9481-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9481-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9481-- Scanning root segment: 0x4037000..0x403afff (16384)
--9481-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9481-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9481-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9481-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9481-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9481-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9481-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9481-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9481-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9481-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9481-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9481-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9481-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9481-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9481-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9481-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9481-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9481-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9481-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9481-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9481-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9481-- Scanning root segment: 0x701a000..0x701afff (4096)
--9481-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9481-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9481-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9481-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9481-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9481-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9481-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9481-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9481-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9481== Checked 4,779,712 bytes
==9481==
==9481== LEAK SUMMARY:
==9481== definitely lost: 1,533 bytes in 8 blocks
==9481== indirectly lost: 6,756 bytes in 7 blocks
==9481== possibly lost: 0 bytes in 0 blocks
==9481== still reachable: 3,109,892 bytes in 68,923 blocks
==9481== suppressed: 0 bytes in 0 blocks
==9481== Rerun with --leak-check=full to see details of leaked memory
==9481==
==9481== Use --track-origins=yes to see where uninitialised values come from
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481==
==9481== 1 errors in context 1 of 2:
==9481== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9481== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9481== by 0x488CD0: stringsubst (subst.c:301)
==9481== by 0x48801B: prefork (subst.c:77)
==9481== by 0x42B318: execcmd (exec.c:2619)
==9481== by 0x428CA0: execpline2 (exec.c:1697)
==9481== by 0x427FD2: execpline (exec.c:1484)
==9481== by 0x427756: execlist (exec.c:1267)
==9481== by 0x42717C: execode (exec.c:1073)
==9481== by 0x431299: runshfunc (exec.c:5040)
==9481== by 0x430E76: doshfunc (exec.c:4920)
==9481== by 0x4302FB: execshfunc (exec.c:4557)
==9481== by 0x42D8C1: execcmd (exec.c:3373)
==9481==
==9481==
==9481== 2 errors in context 2 of 2:
==9481== Conditional jump or move depends on uninitialised value(s)
==9481== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9481== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9481== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9481== by 0x40EFC2: execbuiltin (builtin.c:450)
==9481== by 0x42D8E9: execcmd (exec.c:3378)
==9481== by 0x428CA0: execpline2 (exec.c:1697)
==9481== by 0x427FD2: execpline (exec.c:1484)
==9481== by 0x42779A: execlist (exec.c:1275)
==9481== by 0x42717C: execode (exec.c:1073)
==9481== by 0x431299: runshfunc (exec.c:5040)
==9481== by 0x430E76: doshfunc (exec.c:4920)
==9481== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9481==
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9483-- Caught __NR_exit; running __libc_freeres()
==9484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9484-by-pythonnut-on-???
==9484== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9484-by-pythonnut-on-???
==9484== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9484-by-pythonnut-on-???
==9484==
==9484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9484== don't want to do, unless you know exactly what you're doing,
==9484== or are doing some strange experiment):
==9484== /usr/lib/valgrind/../../bin/vgdb --pid=9484 ...command...
==9484==
==9484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9484== /path/to/gdb ./zsh
==9484== and then give GDB the following command
==9484== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9484
==9484== --pid is optional if only one valgrind process is running
==9484==
==9483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9483-by-pythonnut-on-???
==9483== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9483-by-pythonnut-on-???
==9483== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9483-by-pythonnut-on-???
==9483==
==9483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9483== don't want to do, unless you know exactly what you're doing,
==9483== or are doing some strange experiment):
==9483== /usr/lib/valgrind/../../bin/vgdb --pid=9483 ...command...
==9483==
==9483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9483== /path/to/gdb ./zsh
==9483== and then give GDB the following command
==9483== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9483
==9483== --pid is optional if only one valgrind process is running
==9483==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--9483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9483==
==9483== HEAP SUMMARY:
==9483== in use at exit: 3,118,337 bytes in 68,943 blocks
==9483== total heap usage: 935,617 allocs, 866,674 frees, 66,611,728 bytes allocated
==9483==
==9483== Searching for pointers to 68,943 not-freed blocks
--9483-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9483-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9483-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9483-- Scanning root segment: 0x4037000..0x403afff (16384)
--9483-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9483-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9483-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9483-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9483-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9483-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9483-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9483-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9483-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9483-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9483-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9483-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9483-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9483-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9483-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9483-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9483-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9483-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9483-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9483-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9483-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9483-- Scanning root segment: 0x701a000..0x701afff (4096)
--9483-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9483-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9483-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9483-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9483-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9483-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9483-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9483-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9483-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9483== Checked 4,780,488 bytes
==9483==
==9483== LEAK SUMMARY:
==9483== definitely lost: 1,533 bytes in 8 blocks
==9483== indirectly lost: 6,756 bytes in 7 blocks
==9483== possibly lost: 0 bytes in 0 blocks
==9483== still reachable: 3,110,048 bytes in 68,928 blocks
==9483== suppressed: 0 bytes in 0 blocks
==9483== Rerun with --leak-check=full to see details of leaked memory
==9483==
==9483== Use --track-origins=yes to see where uninitialised values come from
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9483==
==9483== 1 errors in context 1 of 2:
==9483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9483== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9483== by 0x488CD0: stringsubst (subst.c:301)
==9483== by 0x48801B: prefork (subst.c:77)
==9483== by 0x42B318: execcmd (exec.c:2619)
==9483== by 0x428CA0: execpline2 (exec.c:1697)
==9483== by 0x427FD2: execpline (exec.c:1484)
==9483== by 0x427756: execlist (exec.c:1267)
==9483== by 0x42717C: execode (exec.c:1073)
==9483== by 0x431299: runshfunc (exec.c:5040)
==9483== by 0x430E76: doshfunc (exec.c:4920)
==9483== by 0x4302FB: execshfunc (exec.c:4557)
==9483== by 0x42D8C1: execcmd (exec.c:3373)
==9483==
==9483==
==9483== 2 errors in context 2 of 2:
==9483== Conditional jump or move depends on uninitialised value(s)
==9483== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9483== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9483== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9483== by 0x40EFC2: execbuiltin (builtin.c:450)
==9483== by 0x42D8E9: execcmd (exec.c:3378)
==9483== by 0x428CA0: execpline2 (exec.c:1697)
==9483== by 0x427FD2: execpline (exec.c:1484)
==9483== by 0x42779A: execlist (exec.c:1275)
==9483== by 0x42717C: execode (exec.c:1073)
==9483== by 0x431299: runshfunc (exec.c:5040)
==9483== by 0x430E76: doshfunc (exec.c:4920)
==9483== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9483==
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9482-by-pythonnut-on-???
==9482== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9482-by-pythonnut-on-???
==9482== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9482-by-pythonnut-on-???
==9482==
==9482== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9482== don't want to do, unless you know exactly what you're doing,
==9482== or are doing some strange experiment):
==9482== /usr/lib/valgrind/../../bin/vgdb --pid=9482 ...command...
==9482==
==9482== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9482== /path/to/gdb ./zsh
==9482== and then give GDB the following command
==9482== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9482
==9482== --pid is optional if only one valgrind process is running
==9482==
--9482-- Caught __NR_exit; running __libc_freeres()
--9482-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9482==
==9482== HEAP SUMMARY:
==9482== in use at exit: 3,118,273 bytes in 68,940 blocks
==9482== total heap usage: 935,619 allocs, 866,679 frees, 66,612,272 bytes allocated
==9482==
==9482== Searching for pointers to 68,940 not-freed blocks
--9482-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9482-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9482-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9482-- Scanning root segment: 0x4037000..0x403afff (16384)
--9482-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9482-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9482-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9482-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9482-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9482-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9482-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9482-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9482-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9482-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9482-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9482-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9482-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9482-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9482-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9482-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9482-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9482-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9482-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9482-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9482-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9482-- Scanning root segment: 0x701a000..0x701afff (4096)
--9482-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9482-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9482-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9482-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9482-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9482-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9482-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9482-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9482-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9482== Checked 4,779,800 bytes
==9482==
==9482== LEAK SUMMARY:
==9482== definitely lost: 1,533 bytes in 8 blocks
==9482== indirectly lost: 6,756 bytes in 7 blocks
==9482== possibly lost: 0 bytes in 0 blocks
==9482== still reachable: 3,109,984 bytes in 68,925 blocks
==9482== suppressed: 0 bytes in 0 blocks
==9482== Rerun with --leak-check=full to see details of leaked memory
==9482==
==9482== Use --track-origins=yes to see where uninitialised values come from
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482==
==9482== 1 errors in context 1 of 2:
==9482== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9482== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9482== by 0x488CD0: stringsubst (subst.c:301)
==9482== by 0x48801B: prefork (subst.c:77)
==9482== by 0x42B318: execcmd (exec.c:2619)
==9482== by 0x428CA0: execpline2 (exec.c:1697)
==9482== by 0x427FD2: execpline (exec.c:1484)
==9482== by 0x427756: execlist (exec.c:1267)
==9482== by 0x42717C: execode (exec.c:1073)
==9482== by 0x431299: runshfunc (exec.c:5040)
==9482== by 0x430E76: doshfunc (exec.c:4920)
==9482== by 0x4302FB: execshfunc (exec.c:4557)
==9482== by 0x42D8C1: execcmd (exec.c:3373)
==9482==
==9482==
==9482== 2 errors in context 2 of 2:
==9482== Conditional jump or move depends on uninitialised value(s)
==9482== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9482== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9482== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9482== by 0x40EFC2: execbuiltin (builtin.c:450)
==9482== by 0x42D8E9: execcmd (exec.c:3378)
==9482== by 0x428CA0: execpline2 (exec.c:1697)
==9482== by 0x427FD2: execpline (exec.c:1484)
==9482== by 0x42779A: execlist (exec.c:1275)
==9482== by 0x42717C: execode (exec.c:1073)
==9482== by 0x431299: runshfunc (exec.c:5040)
==9482== by 0x430E76: doshfunc (exec.c:4920)
==9482== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9482==
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9399-- Caught __NR_exit; running __libc_freeres()
--9399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9399==
==9399== HEAP SUMMARY:
==9399== in use at exit: 3,115,805 bytes in 68,873 blocks
==9399== total heap usage: 935,618 allocs, 866,745 frees, 66,613,856 bytes allocated
==9399==
==9399== Searching for pointers to 68,873 not-freed blocks
--9399-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9399-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9399-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9399-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9399-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9399-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9399-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9399-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9399-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9399-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9399-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9399-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9399-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9399-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9399-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9399-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9399-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9399-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9399-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9399-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9399-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9399-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9399-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9399-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9399-- Scanning root segment: 0x701a000..0x701afff (4096)
--9399-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9399-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9399-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9399-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9399-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9399-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9399-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9399-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9399-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9399== Checked 4,757,928 bytes
==9399==
==9399== LEAK SUMMARY:
==9399== definitely lost: 1,533 bytes in 8 blocks
==9399== indirectly lost: 6,756 bytes in 7 blocks
==9399== possibly lost: 0 bytes in 0 blocks
==9399== still reachable: 3,107,516 bytes in 68,858 blocks
==9399== suppressed: 0 bytes in 0 blocks
==9399== Rerun with --leak-check=full to see details of leaked memory
==9399==
==9399== Use --track-origins=yes to see where uninitialised values come from
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9399==
==9399== 1 errors in context 1 of 2:
==9399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9399== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9399== by 0x488CD0: stringsubst (subst.c:301)
==9399== by 0x48801B: prefork (subst.c:77)
==9399== by 0x42B318: execcmd (exec.c:2619)
==9399== by 0x428CA0: execpline2 (exec.c:1697)
==9399== by 0x427FD2: execpline (exec.c:1484)
==9399== by 0x427756: execlist (exec.c:1267)
==9399== by 0x42717C: execode (exec.c:1073)
==9399== by 0x431299: runshfunc (exec.c:5040)
==9399== by 0x430E76: doshfunc (exec.c:4920)
==9399== by 0x4302FB: execshfunc (exec.c:4557)
==9399== by 0x42D8C1: execcmd (exec.c:3373)
==9399==
==9399==
==9399== 2 errors in context 2 of 2:
==9399== Conditional jump or move depends on uninitialised value(s)
==9399== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9399== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9399== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9399== by 0x40EFC2: execbuiltin (builtin.c:450)
==9399== by 0x42D8E9: execcmd (exec.c:3378)
==9399== by 0x428CA0: execpline2 (exec.c:1697)
==9399== by 0x427FD2: execpline (exec.c:1484)
==9399== by 0x42779A: execlist (exec.c:1275)
==9399== by 0x42717C: execode (exec.c:1073)
==9399== by 0x431299: runshfunc (exec.c:5040)
==9399== by 0x430E76: doshfunc (exec.c:4920)
==9399== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9399==
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9485-by-pythonnut-on-???
==9485== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9485-by-pythonnut-on-???
==9485== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9485-by-pythonnut-on-???
==9485==
==9485== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9485== don't want to do, unless you know exactly what you're doing,
==9485== or are doing some strange experiment):
==9485== /usr/lib/valgrind/../../bin/vgdb --pid=9485 ...command...
==9485==
==9485== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9485== /path/to/gdb ./zsh
==9485== and then give GDB the following command
==9485== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9485
==9485== --pid is optional if only one valgrind process is running
==9485==
==9487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9487-by-pythonnut-on-???
==9487== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9487-by-pythonnut-on-???
==9487== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9487-by-pythonnut-on-???
==9487==
==9487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9487== don't want to do, unless you know exactly what you're doing,
==9487== or are doing some strange experiment):
==9487== /usr/lib/valgrind/../../bin/vgdb --pid=9487 ...command...
==9487==
==9487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9487== /path/to/gdb ./zsh
==9487== and then give GDB the following command
==9487== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9487
==9487== --pid is optional if only one valgrind process is running
==9487==
client request: code 4d430005, addr 0xFFEFF263C, len 4
==9486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9486-by-pythonnut-on-???
==9486== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9486-by-pythonnut-on-???
==9486== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9486-by-pythonnut-on-???
==9486==
==9486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9486== don't want to do, unless you know exactly what you're doing,
==9486== or are doing some strange experiment):
==9486== /usr/lib/valgrind/../../bin/vgdb --pid=9486 ...command...
==9486==
==9486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9486== /path/to/gdb ./zsh
==9486== and then give GDB the following command
==9486== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9486
==9486== --pid is optional if only one valgrind process is running
==9486==
--9486-- Caught __NR_exit; running __libc_freeres()
--9486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9486==
==9486== HEAP SUMMARY:
==9486== in use at exit: 3,116,309 bytes in 68,885 blocks
==9486== total heap usage: 935,462 allocs, 866,577 frees, 66,570,788 bytes allocated
==9486==
==9486== Searching for pointers to 68,885 not-freed blocks
--9486-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9486-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9486-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9486-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9486-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9486-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9486-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9486-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9486-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9486-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9486-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9486-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9486-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9486-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9486-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9486-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9486-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9486-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9486-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9486-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9486-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9486-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9486-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9486-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9486-- Scanning root segment: 0x701a000..0x701afff (4096)
--9486-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9486-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9486-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9486-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9486-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9486-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9486-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9486-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9486-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9486== Checked 4,760,480 bytes
==9486==
==9486== LEAK SUMMARY:
==9486== definitely lost: 1,533 bytes in 8 blocks
==9486== indirectly lost: 6,756 bytes in 7 blocks
==9486== possibly lost: 0 bytes in 0 blocks
==9486== still reachable: 3,108,020 bytes in 68,870 blocks
==9486== suppressed: 0 bytes in 0 blocks
==9486== Rerun with --leak-check=full to see details of leaked memory
==9486==
==9486== Use --track-origins=yes to see where uninitialised values come from
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9486==
==9486== 1 errors in context 1 of 2:
==9486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9486== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9486== by 0x488CD0: stringsubst (subst.c:301)
==9486== by 0x48801B: prefork (subst.c:77)
==9486== by 0x42B318: execcmd (exec.c:2619)
==9486== by 0x428CA0: execpline2 (exec.c:1697)
==9486== by 0x427FD2: execpline (exec.c:1484)
==9486== by 0x427756: execlist (exec.c:1267)
==9486== by 0x42717C: execode (exec.c:1073)
==9486== by 0x431299: runshfunc (exec.c:5040)
==9486== by 0x430E76: doshfunc (exec.c:4920)
==9486== by 0x4302FB: execshfunc (exec.c:4557)
==9486== by 0x42D8C1: execcmd (exec.c:3373)
==9486==
==9486==
==9486== 2 errors in context 2 of 2:
==9486== Conditional jump or move depends on uninitialised value(s)
==9486== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9486== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9486== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9486== by 0x40EFC2: execbuiltin (builtin.c:450)
==9486== by 0x42D8E9: execcmd (exec.c:3378)
==9486== by 0x428CA0: execpline2 (exec.c:1697)
==9486== by 0x427FD2: execpline (exec.c:1484)
==9486== by 0x42779A: execlist (exec.c:1275)
==9486== by 0x42717C: execode (exec.c:1073)
==9486== by 0x431299: runshfunc (exec.c:5040)
==9486== by 0x430E76: doshfunc (exec.c:4920)
==9486== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9486==
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9490-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9490-by-pythonnut-on-???
==9490== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9490-by-pythonnut-on-???
==9490== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9490-by-pythonnut-on-???
==9490==
==9490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9490== don't want to do, unless you know exactly what you're doing,
==9490== or are doing some strange experiment):
==9490== /usr/lib/valgrind/../../bin/vgdb --pid=9490 ...command...
==9490==
==9490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9490== /path/to/gdb ./zsh
==9490== and then give GDB the following command
==9490== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9490
==9490== --pid is optional if only one valgrind process is running
==9490==
client request: code 4d430005, addr 0xFFEFFB37C, len 4
client request: code 4d430005, addr 0xFFEFF836C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF895C, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
client request: code 4d430005, addr 0xFFEFEEBFC, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
==9492== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9492-by-pythonnut-on-???
==9492== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9492-by-pythonnut-on-???
==9492== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9492-by-pythonnut-on-???
==9492==
==9492== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9492== don't want to do, unless you know exactly what you're doing,
==9492== or are doing some strange experiment):
==9492== /usr/lib/valgrind/../../bin/vgdb --pid=9492 ...command...
==9492==
==9492== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9492== /path/to/gdb ./zsh
==9492== and then give GDB the following command
==9492== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9492
==9492== --pid is optional if only one valgrind process is running
==9492==
client request: code 4d430005, addr 0xFFEFF562C, len 4
==9493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9493-by-pythonnut-on-???
==9493== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9493-by-pythonnut-on-???
==9493== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9493-by-pythonnut-on-???
==9493==
==9493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9493== don't want to do, unless you know exactly what you're doing,
==9493== or are doing some strange experiment):
==9493== /usr/lib/valgrind/../../bin/vgdb --pid=9493 ...command...
==9493==
==9493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9493== /path/to/gdb ./zsh
==9493== and then give GDB the following command
==9493== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9493
==9493== --pid is optional if only one valgrind process is running
==9493==
client request: code 4d430005, addr 0xFFEFF562C, len 4
--9493-- Caught __NR_exit; running __libc_freeres()
--9493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9493==
==9493== HEAP SUMMARY:
==9493== in use at exit: 3,147,995 bytes in 69,382 blocks
==9493== total heap usage: 939,232 allocs, 869,850 frees, 68,340,739 bytes allocated
==9493==
==9493== Searching for pointers to 69,382 not-freed blocks
--9493-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9493-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9493-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9493-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9493-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9493-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9493-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9493-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9493-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9493-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9493-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9493-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9493-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9493-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9493-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9493-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9493-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9493-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9493-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9493-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9493-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9493-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9493-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9493-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9493-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9493-- Scanning root segment: 0x701a000..0x701afff (4096)
--9493-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9493-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9493-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9493-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9493-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9493-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9493-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9493-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9493-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9493== Checked 4,848,552 bytes
==9493==
==9493== LEAK SUMMARY:
==9493== definitely lost: 1,533 bytes in 8 blocks
==9493== indirectly lost: 6,756 bytes in 7 blocks
==9493== possibly lost: 0 bytes in 0 blocks
==9493== still reachable: 3,139,706 bytes in 69,367 blocks
==9493== suppressed: 0 bytes in 0 blocks
==9493== Rerun with --leak-check=full to see details of leaked memory
==9493==
==9493== Use --track-origins=yes to see where uninitialised values come from
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9493==
==9493== 1 errors in context 1 of 2:
==9493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9493== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9493== by 0x488CD0: stringsubst (subst.c:301)
==9493== by 0x48801B: prefork (subst.c:77)
==9493== by 0x42B318: execcmd (exec.c:2619)
==9493== by 0x428CA0: execpline2 (exec.c:1697)
==9493== by 0x427FD2: execpline (exec.c:1484)
==9493== by 0x427756: execlist (exec.c:1267)
==9493== by 0x42717C: execode (exec.c:1073)
==9493== by 0x431299: runshfunc (exec.c:5040)
==9493== by 0x430E76: doshfunc (exec.c:4920)
==9493== by 0x4302FB: execshfunc (exec.c:4557)
==9493== by 0x42D8C1: execcmd (exec.c:3373)
==9493==
==9493==
==9493== 2 errors in context 2 of 2:
==9493== Conditional jump or move depends on uninitialised value(s)
==9493== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9493== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9493== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9493== by 0x40EFC2: execbuiltin (builtin.c:450)
==9493== by 0x42D8E9: execcmd (exec.c:3378)
==9493== by 0x428CA0: execpline2 (exec.c:1697)
==9493== by 0x427FD2: execpline (exec.c:1484)
==9493== by 0x42779A: execlist (exec.c:1275)
==9493== by 0x42717C: execode (exec.c:1073)
==9493== by 0x431299: runshfunc (exec.c:5040)
==9493== by 0x430E76: doshfunc (exec.c:4920)
==9493== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9493==
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9492-- Caught __NR_exit; running __libc_freeres()
--9492-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9492==
==9492== HEAP SUMMARY:
==9492== in use at exit: 3,145,713 bytes in 69,302 blocks
==9492== total heap usage: 939,137 allocs, 869,835 frees, 68,108,800 bytes allocated
==9492==
==9494== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9494-by-pythonnut-on-???
==9494== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9494-by-pythonnut-on-???
==9494== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9494-by-pythonnut-on-???
==9494==
==9494== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9494== don't want to do, unless you know exactly what you're doing,
==9494== or are doing some strange experiment):
==9494== /usr/lib/valgrind/../../bin/vgdb --pid=9494 ...command...
==9494==
==9494== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9494== /path/to/gdb ./zsh
==9494== and then give GDB the following command
==9494== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9494
==9494== --pid is optional if only one valgrind process is running
==9494==
==9492== Searching for pointers to 69,302 not-freed blocks
--9492-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9492-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9492-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9492-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9492-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9492-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9492-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9492-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9492-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9492-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9492-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9492-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9492-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9492-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9492-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9492-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9492-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9492-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9492-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9492-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9492-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9492-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9492-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9492-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9492-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9492-- Scanning root segment: 0x701a000..0x701afff (4096)
--9492-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9492-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9492-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9492-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9492-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9492-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9492-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9492-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9492-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9494-- Caught __NR_exit; running __libc_freeres()
--9494-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9494==
==9494== HEAP SUMMARY:
==9494== in use at exit: 3,156,775 bytes in 69,075 blocks
==9494== total heap usage: 935,537 allocs, 866,462 frees, 66,603,912 bytes allocated
==9494==
==9492== Checked 4,844,576 bytes
==9492==
==9494== Searching for pointers to 69,075 not-freed blocks
--9494-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9494-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9494-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9494-- Scanning root segment: 0x4037000..0x4047fff (69632)
--9494-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9494-- Scanning root segment: 0x41d6000..0x421efff (299008)
--9494-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9494-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9494-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9494-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9494-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9494-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9494-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9494-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9494-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9494-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9494-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9494-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9494-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9494-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9494-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9494-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9494-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9494-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9494-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9494-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9494-- Scanning root segment: 0x701a000..0x701afff (4096)
--9494-- Scanning root segment: 0x881b000..0x8837fff (118784)
--9494-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9494-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9494-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9494-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9494-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9494-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9494-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9494-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9494-- Scanning root segment: 0xbc84000..0xbc96fff (77824)
--9494-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9492== LEAK SUMMARY:
==9492== definitely lost: 1,533 bytes in 8 blocks
==9492== indirectly lost: 6,756 bytes in 7 blocks
==9492== possibly lost: 0 bytes in 0 blocks
==9492== still reachable: 3,137,424 bytes in 69,287 blocks
==9492== suppressed: 0 bytes in 0 blocks
==9492== Rerun with --leak-check=full to see details of leaked memory
==9492==
==9492== Use --track-origins=yes to see where uninitialised values come from
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9492==
==9492== 1 errors in context 1 of 2:
==9492== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9492== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9492== by 0x488CD0: stringsubst (subst.c:301)
==9492== by 0x48801B: prefork (subst.c:77)
==9492== by 0x42B318: execcmd (exec.c:2619)
==9492== by 0x428CA0: execpline2 (exec.c:1697)
==9492== by 0x427FD2: execpline (exec.c:1484)
==9492== by 0x427756: execlist (exec.c:1267)
==9492== by 0x42717C: execode (exec.c:1073)
==9492== by 0x431299: runshfunc (exec.c:5040)
==9492== by 0x430E76: doshfunc (exec.c:4920)
==9492== by 0x4302FB: execshfunc (exec.c:4557)
==9492== by 0x42D8C1: execcmd (exec.c:3373)
==9492==
==9492==
==9492== 2 errors in context 2 of 2:
==9492== Conditional jump or move depends on uninitialised value(s)
==9492== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9492== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9492== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9492== by 0x40EFC2: execbuiltin (builtin.c:450)
==9492== by 0x42D8E9: execcmd (exec.c:3378)
==9492== by 0x428CA0: execpline2 (exec.c:1697)
==9492== by 0x427FD2: execpline (exec.c:1484)
==9492== by 0x42779A: execlist (exec.c:1275)
==9492== by 0x42717C: execode (exec.c:1073)
==9492== by 0x431299: runshfunc (exec.c:5040)
==9492== by 0x430E76: doshfunc (exec.c:4920)
==9492== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9492==
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9495-by-pythonnut-on-???
==9495== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9495-by-pythonnut-on-???
==9495== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9495-by-pythonnut-on-???
==9495==
==9495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9495== don't want to do, unless you know exactly what you're doing,
==9495== or are doing some strange experiment):
==9495== /usr/lib/valgrind/../../bin/vgdb --pid=9495 ...command...
==9495==
==9495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9495== /path/to/gdb ./zsh
==9495== and then give GDB the following command
==9495== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9495
==9495== --pid is optional if only one valgrind process is running
==9495==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==9496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9496-by-pythonnut-on-???
==9496== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9496-by-pythonnut-on-???
==9496== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9496-by-pythonnut-on-???
==9496==
==9496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9496== don't want to do, unless you know exactly what you're doing,
==9496== or are doing some strange experiment):
==9496== /usr/lib/valgrind/../../bin/vgdb --pid=9496 ...command...
==9496==
==9496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9496== /path/to/gdb ./zsh
==9496== and then give GDB the following command
==9496== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9496
==9496== --pid is optional if only one valgrind process is running
==9496==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
--9496-- Caught __NR_exit; running __libc_freeres()
--9496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9496==
==9494== Checked 5,388,032 bytes
==9494==
==9496== HEAP SUMMARY:
==9496== in use at exit: 3,148,242 bytes in 69,390 blocks
==9496== total heap usage: 939,249 allocs, 869,859 frees, 68,310,910 bytes allocated
==9496==
==9494== LEAK SUMMARY:
==9494== definitely lost: 1,533 bytes in 8 blocks
==9494== indirectly lost: 6,756 bytes in 7 blocks
==9494== possibly lost: 0 bytes in 0 blocks
==9494== still reachable: 3,148,486 bytes in 69,060 blocks
==9494== suppressed: 0 bytes in 0 blocks
==9494== Rerun with --leak-check=full to see details of leaked memory
==9494==
==9494== Use --track-origins=yes to see where uninitialised values come from
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9494==
==9494== 1 errors in context 1 of 2:
==9494== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9494== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9494== by 0x488CD0: stringsubst (subst.c:301)
==9494== by 0x48801B: prefork (subst.c:77)
==9494== by 0x42B318: execcmd (exec.c:2619)
==9494== by 0x428CA0: execpline2 (exec.c:1697)
==9494== by 0x427FD2: execpline (exec.c:1484)
==9494== by 0x427756: execlist (exec.c:1267)
==9494== by 0x42717C: execode (exec.c:1073)
==9494== by 0x431299: runshfunc (exec.c:5040)
==9494== by 0x430E76: doshfunc (exec.c:4920)
==9494== by 0x4302FB: execshfunc (exec.c:4557)
==9494== by 0x42D8C1: execcmd (exec.c:3373)
==9494==
==9494==
==9494== 2 errors in context 2 of 2:
==9494== Conditional jump or move depends on uninitialised value(s)
==9494== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9494== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9494== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9494== by 0x40EFC2: execbuiltin (builtin.c:450)
==9494== by 0x42D8E9: execcmd (exec.c:3378)
==9494== by 0x428CA0: execpline2 (exec.c:1697)
==9494== by 0x427FD2: execpline (exec.c:1484)
==9494== by 0x42779A: execlist (exec.c:1275)
==9494== by 0x42717C: execode (exec.c:1073)
==9494== by 0x431299: runshfunc (exec.c:5040)
==9494== by 0x430E76: doshfunc (exec.c:4920)
==9494== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9494==
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496== Searching for pointers to 69,390 not-freed blocks
--9496-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9496-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9496-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9496-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9496-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9496-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9496-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9496-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9496-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9496-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9496-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9496-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9496-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9496-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9496-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9496-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9496-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9496-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9496-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9496-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9496-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9496-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9496-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9496-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9496-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9496-- Scanning root segment: 0x701a000..0x701afff (4096)
--9496-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9496-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9496-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9496-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9496-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9496-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9496-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9496-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9496-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9427-- Caught __NR_exit; running __libc_freeres()
--9427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9427==
==9427== HEAP SUMMARY:
==9427== in use at exit: 3,118,776 bytes in 68,989 blocks
==9427== total heap usage: 937,012 allocs, 868,023 frees, 66,697,131 bytes allocated
==9427==
==9496== Checked 4,849,280 bytes
==9496==
==9427== Searching for pointers to 68,989 not-freed blocks
--9427-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9427-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9427-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9427-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9427-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9427-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9427-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9427-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9427-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9427-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9427-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9427-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9427-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9427-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9427-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9427-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9427-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9427-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9427-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9427-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9427-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9427-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9427-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9427-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9427-- Scanning root segment: 0x701a000..0x701afff (4096)
--9427-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9427-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9427-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9427-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9427-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9427-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9427-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9427-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9427-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9496== LEAK SUMMARY:
==9496== definitely lost: 1,533 bytes in 8 blocks
==9496== indirectly lost: 6,756 bytes in 7 blocks
==9496== possibly lost: 0 bytes in 0 blocks
==9496== still reachable: 3,139,953 bytes in 69,375 blocks
==9496== suppressed: 0 bytes in 0 blocks
==9496== Rerun with --leak-check=full to see details of leaked memory
==9496==
==9496== Use --track-origins=yes to see where uninitialised values come from
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496==
==9496== 1 errors in context 1 of 2:
==9496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9496== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9496== by 0x488CD0: stringsubst (subst.c:301)
==9496== by 0x48801B: prefork (subst.c:77)
==9496== by 0x42B318: execcmd (exec.c:2619)
==9496== by 0x428CA0: execpline2 (exec.c:1697)
==9496== by 0x427FD2: execpline (exec.c:1484)
==9496== by 0x427756: execlist (exec.c:1267)
==9496== by 0x42717C: execode (exec.c:1073)
==9496== by 0x431299: runshfunc (exec.c:5040)
==9496== by 0x430E76: doshfunc (exec.c:4920)
==9496== by 0x4302FB: execshfunc (exec.c:4557)
==9496== by 0x42D8C1: execcmd (exec.c:3373)
==9496==
==9496==
==9496== 2 errors in context 2 of 2:
==9496== Conditional jump or move depends on uninitialised value(s)
==9496== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9496== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9496== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9496== by 0x40EFC2: execbuiltin (builtin.c:450)
==9496== by 0x42D8E9: execcmd (exec.c:3378)
==9496== by 0x428CA0: execpline2 (exec.c:1697)
==9496== by 0x427FD2: execpline (exec.c:1484)
==9496== by 0x42779A: execlist (exec.c:1275)
==9496== by 0x42717C: execode (exec.c:1073)
==9496== by 0x431299: runshfunc (exec.c:5040)
==9496== by 0x430E76: doshfunc (exec.c:4920)
==9496== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9496==
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9495-- Caught __NR_exit; running __libc_freeres()
--9495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9495==
==9495== HEAP SUMMARY:
==9495== in use at exit: 3,145,986 bytes in 69,310 blocks
==9495== total heap usage: 939,152 allocs, 869,842 frees, 68,111,713 bytes allocated
==9495==
==9495== Searching for pointers to 69,310 not-freed blocks
--9495-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9495-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9495-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9495-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9495-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9495-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9495-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9495-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9495-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9495-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9495-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9495-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9495-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9495-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9495-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9495-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9495-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9495-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9495-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9495-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9495-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9495-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9495-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9495-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9495-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9495-- Scanning root segment: 0x701a000..0x701afff (4096)
--9495-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9495-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9495-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9495-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9495-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9495-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9495-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9495-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9495-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9427== Checked 4,782,416 bytes
==9427==
==9427== LEAK SUMMARY:
==9427== definitely lost: 1,533 bytes in 8 blocks
==9427== indirectly lost: 6,756 bytes in 7 blocks
==9427== possibly lost: 0 bytes in 0 blocks
==9427== still reachable: 3,110,487 bytes in 68,974 blocks
==9427== suppressed: 0 bytes in 0 blocks
==9427== Rerun with --leak-check=full to see details of leaked memory
==9427==
==9427== Use --track-origins=yes to see where uninitialised values come from
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427==
==9427== 1 errors in context 1 of 2:
==9427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9427== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9427== by 0x488CD0: stringsubst (subst.c:301)
==9427== by 0x48801B: prefork (subst.c:77)
==9427== by 0x42B318: execcmd (exec.c:2619)
==9427== by 0x428CA0: execpline2 (exec.c:1697)
==9427== by 0x427FD2: execpline (exec.c:1484)
==9427== by 0x427756: execlist (exec.c:1267)
==9427== by 0x42717C: execode (exec.c:1073)
==9427== by 0x431299: runshfunc (exec.c:5040)
==9427== by 0x430E76: doshfunc (exec.c:4920)
==9427== by 0x4302FB: execshfunc (exec.c:4557)
==9427== by 0x42D8C1: execcmd (exec.c:3373)
==9427==
==9427==
==9427== 2 errors in context 2 of 2:
==9427== Conditional jump or move depends on uninitialised value(s)
==9427== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9427== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9427== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9427== by 0x40EFC2: execbuiltin (builtin.c:450)
==9427== by 0x42D8E9: execcmd (exec.c:3378)
==9427== by 0x428CA0: execpline2 (exec.c:1697)
==9427== by 0x427FD2: execpline (exec.c:1484)
==9427== by 0x42779A: execlist (exec.c:1275)
==9427== by 0x42717C: execode (exec.c:1073)
==9427== by 0x431299: runshfunc (exec.c:5040)
==9427== by 0x430E76: doshfunc (exec.c:4920)
==9427== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9427==
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9393-- Caught __NR_exit; running __libc_freeres()
--9393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFE62DC, len 4
==9393==
==9393== HEAP SUMMARY:
==9393== in use at exit: 3,116,779 bytes in 68,919 blocks
==9393== total heap usage: 935,375 allocs, 866,456 frees, 66,324,081 bytes allocated
==9393==
==9500== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9500-by-pythonnut-on-???
==9500== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9500-by-pythonnut-on-???
==9500== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9500-by-pythonnut-on-???
==9500==
==9500== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9500== don't want to do, unless you know exactly what you're doing,
==9500== or are doing some strange experiment):
==9500== /usr/lib/valgrind/../../bin/vgdb --pid=9500 ...command...
==9500==
==9500== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9500== /path/to/gdb ./zsh
==9500== and then give GDB the following command
==9500== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9500
==9500== --pid is optional if only one valgrind process is running
==9500==
==9495== Checked 4,845,336 bytes
==9495==
==9393== Searching for pointers to 68,919 not-freed blocks
--9393-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9393-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9393-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9393-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9393-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9393-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9393-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9393-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9393-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9393-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9393-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9393-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9393-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9393-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9393-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9393-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9393-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9393-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9393-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9393-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9393-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9393-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9393-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9393-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9393-- Scanning root segment: 0x701a000..0x701afff (4096)
--9393-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9393-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9393-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9393-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9393-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9393-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9393-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9393-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9393-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9501-- Caught __NR_exit; running __libc_freeres()
==9495== LEAK SUMMARY:
==9495== definitely lost: 1,533 bytes in 8 blocks
==9495== indirectly lost: 6,756 bytes in 7 blocks
==9495== possibly lost: 0 bytes in 0 blocks
==9495== still reachable: 3,137,697 bytes in 69,295 blocks
==9495== suppressed: 0 bytes in 0 blocks
==9495== Rerun with --leak-check=full to see details of leaked memory
==9495==
==9495== Use --track-origins=yes to see where uninitialised values come from
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495==
==9495== 1 errors in context 1 of 2:
==9495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9495== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9495== by 0x488CD0: stringsubst (subst.c:301)
==9495== by 0x48801B: prefork (subst.c:77)
==9495== by 0x42B318: execcmd (exec.c:2619)
==9495== by 0x428CA0: execpline2 (exec.c:1697)
==9495== by 0x427FD2: execpline (exec.c:1484)
==9495== by 0x427756: execlist (exec.c:1267)
==9495== by 0x42717C: execode (exec.c:1073)
==9495== by 0x431299: runshfunc (exec.c:5040)
==9495== by 0x430E76: doshfunc (exec.c:4920)
==9495== by 0x4302FB: execshfunc (exec.c:4557)
==9495== by 0x42D8C1: execcmd (exec.c:3373)
==9495==
==9495==
==9495== 2 errors in context 2 of 2:
==9495== Conditional jump or move depends on uninitialised value(s)
==9495== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9495== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9495== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9495== by 0x40EFC2: execbuiltin (builtin.c:450)
==9495== by 0x42D8E9: execcmd (exec.c:3378)
==9495== by 0x428CA0: execpline2 (exec.c:1697)
==9495== by 0x427FD2: execpline (exec.c:1484)
==9495== by 0x42779A: execlist (exec.c:1275)
==9495== by 0x42717C: execode (exec.c:1073)
==9495== by 0x431299: runshfunc (exec.c:5040)
==9495== by 0x430E76: doshfunc (exec.c:4920)
==9495== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9495==
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFE6C4C, len 4
client request: code 4d430005, addr 0xFFEFF975C, len 4
==9501== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9501-by-pythonnut-on-???
==9501== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9501-by-pythonnut-on-???
==9501== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9501-by-pythonnut-on-???
==9501==
==9501== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9501== don't want to do, unless you know exactly what you're doing,
==9501== or are doing some strange experiment):
==9501== /usr/lib/valgrind/../../bin/vgdb --pid=9501 ...command...
==9501==
==9501== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9501== /path/to/gdb ./zsh
==9501== and then give GDB the following command
==9501== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9501
==9501== --pid is optional if only one valgrind process is running
==9501==
client request: code 4d430005, addr 0xFFEFF975C, len 4
client request: code 4d430005, addr 0xFFEFF975C, len 4
--9501-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9501==
==9501== HEAP SUMMARY:
==9501== in use at exit: 3,160,739 bytes in 69,840 blocks
==9501== total heap usage: 1,047,357 allocs, 977,517 frees, 71,854,126 bytes allocated
==9501==
client request: code 4d430005, addr 0xFFEFEE74C, len 4
--9503-- Caught __NR_exit; running __libc_freeres()
==9501== Searching for pointers to 69,840 not-freed blocks
--9501-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9501-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9501-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9501-- Scanning root segment: 0x4037000..0x403afff (16384)
--9501-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9501-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9501-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9501-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9501-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9501-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9501-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9501-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9501-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9501-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9501-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9501-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9501-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9501-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9501-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9501-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9501-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9501-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9501-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9501-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9501-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9501-- Scanning root segment: 0x701a000..0x701afff (4096)
--9501-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9501-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9501-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9501-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9501-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9501-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9501-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9501-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9501-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9503-by-pythonnut-on-???
==9503== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9503-by-pythonnut-on-???
==9503== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9503-by-pythonnut-on-???
==9503==
==9503== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9503== don't want to do, unless you know exactly what you're doing,
==9503== or are doing some strange experiment):
==9503== /usr/lib/valgrind/../../bin/vgdb --pid=9503 ...command...
==9503==
==9503== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9503== /path/to/gdb ./zsh
==9503== and then give GDB the following command
==9503== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9503
==9503== --pid is optional if only one valgrind process is running
==9503==
==9393== Checked 4,780,024 bytes
==9393==
--9503-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9393== LEAK SUMMARY:
==9393== definitely lost: 1,533 bytes in 8 blocks
==9393== indirectly lost: 6,756 bytes in 7 blocks
==9393== possibly lost: 0 bytes in 0 blocks
==9393== still reachable: 3,108,490 bytes in 68,904 blocks
==9393== suppressed: 0 bytes in 0 blocks
==9393== Rerun with --leak-check=full to see details of leaked memory
==9393==
==9393== Use --track-origins=yes to see where uninitialised values come from
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393==
==9393== 1 errors in context 1 of 2:
==9393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9393== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9393== by 0x488CD0: stringsubst (subst.c:301)
==9393== by 0x48801B: prefork (subst.c:77)
==9393== by 0x42B318: execcmd (exec.c:2619)
==9393== by 0x428CA0: execpline2 (exec.c:1697)
==9393== by 0x427FD2: execpline (exec.c:1484)
==9393== by 0x427756: execlist (exec.c:1267)
==9393== by 0x42717C: execode (exec.c:1073)
==9393== by 0x431299: runshfunc (exec.c:5040)
==9393== by 0x430E76: doshfunc (exec.c:4920)
==9393== by 0x4302FB: execshfunc (exec.c:4557)
==9393== by 0x42D8C1: execcmd (exec.c:3373)
==9393==
==9393==
==9393== 2 errors in context 2 of 2:
==9393== Conditional jump or move depends on uninitialised value(s)
==9393== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9393== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9393== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9393== by 0x40EFC2: execbuiltin (builtin.c:450)
==9393== by 0x42D8E9: execcmd (exec.c:3378)
==9393== by 0x428CA0: execpline2 (exec.c:1697)
==9393== by 0x427FD2: execpline (exec.c:1484)
==9393== by 0x42779A: execlist (exec.c:1275)
==9393== by 0x42717C: execode (exec.c:1073)
==9393== by 0x431299: runshfunc (exec.c:5040)
==9393== by 0x430E76: doshfunc (exec.c:4920)
==9393== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9393==
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503==
==9503== HEAP SUMMARY:
==9503== in use at exit: 3,147,837 bytes in 69,302 blocks
==9503== total heap usage: 939,264 allocs, 869,962 frees, 68,127,152 bytes allocated
==9503==
==9503== Searching for pointers to 69,302 not-freed blocks
--9503-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9503-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9503-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9503-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9503-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9503-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9503-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9503-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9503-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9503-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9503-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9503-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9503-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9503-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9503-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9503-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9503-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9503-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9503-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9503-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9503-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9503-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9503-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9503-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9503-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9503-- Scanning root segment: 0x701a000..0x701afff (4096)
--9503-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9503-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9503-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9503-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9503-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9503-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9503-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9503-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9503-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9501== Checked 4,832,592 bytes
==9501==
==9501== LEAK SUMMARY:
==9501== definitely lost: 1,533 bytes in 8 blocks
==9501== indirectly lost: 6,756 bytes in 7 blocks
==9501== possibly lost: 0 bytes in 0 blocks
==9501== still reachable: 3,152,450 bytes in 69,825 blocks
==9501== suppressed: 0 bytes in 0 blocks
==9501== Rerun with --leak-check=full to see details of leaked memory
==9501==
==9501== Use --track-origins=yes to see where uninitialised values come from
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9501==
==9501== 1 errors in context 1 of 2:
==9501== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9501== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9501== by 0x488CD0: stringsubst (subst.c:301)
==9501== by 0x48801B: prefork (subst.c:77)
==9501== by 0x42B318: execcmd (exec.c:2619)
==9501== by 0x428CA0: execpline2 (exec.c:1697)
==9501== by 0x427FD2: execpline (exec.c:1484)
==9501== by 0x427756: execlist (exec.c:1267)
==9501== by 0x42717C: execode (exec.c:1073)
==9501== by 0x431299: runshfunc (exec.c:5040)
==9501== by 0x430E76: doshfunc (exec.c:4920)
==9501== by 0x4302FB: execshfunc (exec.c:4557)
==9501== by 0x42D8C1: execcmd (exec.c:3373)
==9501==
==9501==
==9501== 2 errors in context 2 of 2:
==9501== Conditional jump or move depends on uninitialised value(s)
==9501== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9501== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9501== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9501== by 0x40EFC2: execbuiltin (builtin.c:450)
==9501== by 0x42D8E9: execcmd (exec.c:3378)
==9501== by 0x428CA0: execpline2 (exec.c:1697)
==9501== by 0x427FD2: execpline (exec.c:1484)
==9501== by 0x42779A: execlist (exec.c:1275)
==9501== by 0x42717C: execode (exec.c:1073)
==9501== by 0x431299: runshfunc (exec.c:5040)
==9501== by 0x430E76: doshfunc (exec.c:4920)
==9501== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9501==
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9500-- Caught __NR_exit; running __libc_freeres()
--9500-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9500==
==9500== HEAP SUMMARY:
==9500== in use at exit: 3,160,675 bytes in 69,837 blocks
==9500== total heap usage: 1,047,355 allocs, 977,518 frees, 71,853,885 bytes allocated
==9500==
==9503== Checked 4,845,584 bytes
==9503==
==9500== Searching for pointers to 69,837 not-freed blocks
--9500-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9500-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9500-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9500-- Scanning root segment: 0x4037000..0x403afff (16384)
--9500-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9500-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9500-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9500-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9500-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9500-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9500-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9500-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9500-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9500-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9500-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9500-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9500-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9500-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9500-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9500-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9500-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9500-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9500-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9500-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9500-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9500-- Scanning root segment: 0x701a000..0x701afff (4096)
--9500-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9500-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9500-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9500-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9500-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9500-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9500-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9500-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9500-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== LEAK SUMMARY:
==9503== definitely lost: 1,533 bytes in 8 blocks
==9503== indirectly lost: 6,756 bytes in 7 blocks
==9503== possibly lost: 0 bytes in 0 blocks
==9503== still reachable: 3,139,548 bytes in 69,287 blocks
==9503== suppressed: 0 bytes in 0 blocks
==9503== Rerun with --leak-check=full to see details of leaked memory
==9503==
==9503== Use --track-origins=yes to see where uninitialised values come from
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503==
==9503== 1 errors in context 1 of 2:
==9503== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9503== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9503== by 0x488CD0: stringsubst (subst.c:301)
==9503== by 0x48801B: prefork (subst.c:77)
==9503== by 0x42B318: execcmd (exec.c:2619)
==9503== by 0x428CA0: execpline2 (exec.c:1697)
==9503== by 0x427FD2: execpline (exec.c:1484)
==9503== by 0x427756: execlist (exec.c:1267)
==9503== by 0x42717C: execode (exec.c:1073)
==9503== by 0x431299: runshfunc (exec.c:5040)
==9503== by 0x430E76: doshfunc (exec.c:4920)
==9503== by 0x4302FB: execshfunc (exec.c:4557)
==9503== by 0x42D8C1: execcmd (exec.c:3373)
==9503==
==9503==
==9503== 2 errors in context 2 of 2:
==9503== Conditional jump or move depends on uninitialised value(s)
==9503== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9503== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9503== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9503== by 0x40EFC2: execbuiltin (builtin.c:450)
==9503== by 0x42D8E9: execcmd (exec.c:3378)
==9503== by 0x428CA0: execpline2 (exec.c:1697)
==9503== by 0x427FD2: execpline (exec.c:1484)
==9503== by 0x42779A: execlist (exec.c:1275)
==9503== by 0x42717C: execode (exec.c:1073)
==9503== by 0x431299: runshfunc (exec.c:5040)
==9503== by 0x430E76: doshfunc (exec.c:4920)
==9503== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9503==
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9505-by-pythonnut-on-???
==9505== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9505-by-pythonnut-on-???
==9505== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9505-by-pythonnut-on-???
==9505==
==9505== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9505== don't want to do, unless you know exactly what you're doing,
==9505== or are doing some strange experiment):
==9505== /usr/lib/valgrind/../../bin/vgdb --pid=9505 ...command...
==9505==
==9505== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9505== /path/to/gdb ./zsh
==9505== and then give GDB the following command
==9505== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9505
==9505== --pid is optional if only one valgrind process is running
==9505==
--9505-- Caught __NR_exit; running __libc_freeres()
--9505-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9505==
==9505== HEAP SUMMARY:
==9505== in use at exit: 3,147,021 bytes in 69,258 blocks
==9505== total heap usage: 939,221 allocs, 869,963 frees, 68,126,634 bytes allocated
==9505==
==9505== Searching for pointers to 69,258 not-freed blocks
--9505-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9505-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9505-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9505-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9505-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9505-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9505-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9505-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9505-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9505-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9505-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9505-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9505-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9505-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9505-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9505-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9505-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9505-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9505-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9505-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9505-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9505-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9505-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9505-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9505-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9505-- Scanning root segment: 0x701a000..0x701afff (4096)
--9505-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9505-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9505-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9505-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9505-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9505-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9505-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9505-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9505-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9500== Checked 4,831,904 bytes
==9500==
==9500== LEAK SUMMARY:
==9500== definitely lost: 1,533 bytes in 8 blocks
==9500== indirectly lost: 6,756 bytes in 7 blocks
==9500== possibly lost: 0 bytes in 0 blocks
==9500== still reachable: 3,152,386 bytes in 69,822 blocks
==9500== suppressed: 0 bytes in 0 blocks
==9500== Rerun with --leak-check=full to see details of leaked memory
==9500==
==9500== Use --track-origins=yes to see where uninitialised values come from
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9500==
==9500== 1 errors in context 1 of 2:
==9500== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9500== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9500== by 0x488CD0: stringsubst (subst.c:301)
==9500== by 0x48801B: prefork (subst.c:77)
==9500== by 0x42B318: execcmd (exec.c:2619)
==9500== by 0x428CA0: execpline2 (exec.c:1697)
==9500== by 0x427FD2: execpline (exec.c:1484)
==9500== by 0x427756: execlist (exec.c:1267)
==9500== by 0x42717C: execode (exec.c:1073)
==9500== by 0x431299: runshfunc (exec.c:5040)
==9500== by 0x430E76: doshfunc (exec.c:4920)
==9500== by 0x4302FB: execshfunc (exec.c:4557)
==9500== by 0x42D8C1: execcmd (exec.c:3373)
==9500==
==9500==
==9500== 2 errors in context 2 of 2:
==9500== Conditional jump or move depends on uninitialised value(s)
==9500== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9500== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9500== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9500== by 0x40EFC2: execbuiltin (builtin.c:450)
==9500== by 0x42D8E9: execcmd (exec.c:3378)
==9500== by 0x428CA0: execpline2 (exec.c:1697)
==9500== by 0x427FD2: execpline (exec.c:1484)
==9500== by 0x42779A: execlist (exec.c:1275)
==9500== by 0x42717C: execode (exec.c:1073)
==9500== by 0x431299: runshfunc (exec.c:5040)
==9500== by 0x430E76: doshfunc (exec.c:4920)
==9500== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9500==
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9506-- Caught __NR_exit; running __libc_freeres()
==9506== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9506-by-pythonnut-on-???
==9506== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9506-by-pythonnut-on-???
==9506== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9506-by-pythonnut-on-???
==9506==
==9506== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9506== don't want to do, unless you know exactly what you're doing,
==9506== or are doing some strange experiment):
==9506== /usr/lib/valgrind/../../bin/vgdb --pid=9506 ...command...
==9506==
==9506== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9506== /path/to/gdb ./zsh
==9506== and then give GDB the following command
==9506== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9506
==9506== --pid is optional if only one valgrind process is running
==9506==
--9506-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9506==
==9506== HEAP SUMMARY:
==9506== in use at exit: 3,160,682 bytes in 69,837 blocks
==9506== total heap usage: 1,047,370 allocs, 977,533 frees, 71,858,883 bytes allocated
==9506==
==9505== Checked 4,844,264 bytes
==9505==
==9506== Searching for pointers to 69,837 not-freed blocks
--9506-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9506-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9506-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9506-- Scanning root segment: 0x4037000..0x403afff (16384)
--9506-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9506-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9506-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9506-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9506-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9506-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9506-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9506-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9506-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9506-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9506-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9506-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9506-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9506-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9506-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9506-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9506-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9506-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9506-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9506-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9506-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9506-- Scanning root segment: 0x701a000..0x701afff (4096)
--9506-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9506-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9506-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9506-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9506-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9506-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9506-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9506-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9506-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9505== LEAK SUMMARY:
==9505== definitely lost: 1,533 bytes in 8 blocks
==9505== indirectly lost: 6,756 bytes in 7 blocks
==9505== possibly lost: 0 bytes in 0 blocks
==9505== still reachable: 3,138,732 bytes in 69,243 blocks
==9505== suppressed: 0 bytes in 0 blocks
==9505== Rerun with --leak-check=full to see details of leaked memory
==9505==
==9505== Use --track-origins=yes to see where uninitialised values come from
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505==
==9505== 1 errors in context 1 of 2:
==9505== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9505== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9505== by 0x488CD0: stringsubst (subst.c:301)
==9505== by 0x48801B: prefork (subst.c:77)
==9505== by 0x42B318: execcmd (exec.c:2619)
==9505== by 0x428CA0: execpline2 (exec.c:1697)
==9505== by 0x427FD2: execpline (exec.c:1484)
==9505== by 0x427756: execlist (exec.c:1267)
==9505== by 0x42717C: execode (exec.c:1073)
==9505== by 0x431299: runshfunc (exec.c:5040)
==9505== by 0x430E76: doshfunc (exec.c:4920)
==9505== by 0x4302FB: execshfunc (exec.c:4557)
==9505== by 0x42D8C1: execcmd (exec.c:3373)
==9505==
==9505==
==9505== 2 errors in context 2 of 2:
==9505== Conditional jump or move depends on uninitialised value(s)
==9505== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9505== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9505== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9505== by 0x40EFC2: execbuiltin (builtin.c:450)
==9505== by 0x42D8E9: execcmd (exec.c:3378)
==9505== by 0x428CA0: execpline2 (exec.c:1697)
==9505== by 0x427FD2: execpline (exec.c:1484)
==9505== by 0x42779A: execlist (exec.c:1275)
==9505== by 0x42717C: execode (exec.c:1073)
==9505== by 0x431299: runshfunc (exec.c:5040)
==9505== by 0x430E76: doshfunc (exec.c:4920)
==9505== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9505==
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF2EC, len 4
==9508== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9508-by-pythonnut-on-???
==9508== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9508-by-pythonnut-on-???
==9508== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9508-by-pythonnut-on-???
==9508==
==9508== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9508== don't want to do, unless you know exactly what you're doing,
==9508== or are doing some strange experiment):
==9508== /usr/lib/valgrind/../../bin/vgdb --pid=9508 ...command...
==9508==
==9508== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9508== /path/to/gdb ./zsh
==9508== and then give GDB the following command
==9508== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9508
==9508== --pid is optional if only one valgrind process is running
==9508==
client request: code 4d430005, addr 0xFFEFF6CEC, len 4
==9509== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9509-by-pythonnut-on-???
==9509== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9509-by-pythonnut-on-???
==9509== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9509-by-pythonnut-on-???
==9509==
==9509== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9509== don't want to do, unless you know exactly what you're doing,
==9509== or are doing some strange experiment):
==9509== /usr/lib/valgrind/../../bin/vgdb --pid=9509 ...command...
==9509==
==9509== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9509== /path/to/gdb ./zsh
==9509== and then give GDB the following command
==9509== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9509
==9509== --pid is optional if only one valgrind process is running
==9509==
client request: code 4d430005, addr 0xFFEFF6CEC, len 4
--9509-- Caught __NR_exit; running __libc_freeres()
==9506== Checked 4,832,040 bytes
==9506==
--9509-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9509==
==9506== LEAK SUMMARY:
==9506== definitely lost: 1,533 bytes in 8 blocks
==9506== indirectly lost: 6,756 bytes in 7 blocks
==9506== possibly lost: 0 bytes in 0 blocks
==9506== still reachable: 3,152,393 bytes in 69,822 blocks
==9506== suppressed: 0 bytes in 0 blocks
==9506== Rerun with --leak-check=full to see details of leaked memory
==9506==
==9506== Use --track-origins=yes to see where uninitialised values come from
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9506==
==9506== 1 errors in context 1 of 2:
==9506== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9506== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9506== by 0x488CD0: stringsubst (subst.c:301)
==9506== by 0x48801B: prefork (subst.c:77)
==9506== by 0x42B318: execcmd (exec.c:2619)
==9506== by 0x428CA0: execpline2 (exec.c:1697)
==9506== by 0x427FD2: execpline (exec.c:1484)
==9506== by 0x427756: execlist (exec.c:1267)
==9506== by 0x42717C: execode (exec.c:1073)
==9506== by 0x431299: runshfunc (exec.c:5040)
==9506== by 0x430E76: doshfunc (exec.c:4920)
==9506== by 0x4302FB: execshfunc (exec.c:4557)
==9506== by 0x42D8C1: execcmd (exec.c:3373)
==9506==
==9506==
==9506== 2 errors in context 2 of 2:
==9506== Conditional jump or move depends on uninitialised value(s)
==9506== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9506== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9506== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9506== by 0x40EFC2: execbuiltin (builtin.c:450)
==9506== by 0x42D8E9: execcmd (exec.c:3378)
==9506== by 0x428CA0: execpline2 (exec.c:1697)
==9506== by 0x427FD2: execpline (exec.c:1484)
==9506== by 0x42779A: execlist (exec.c:1275)
==9506== by 0x42717C: execode (exec.c:1073)
==9506== by 0x431299: runshfunc (exec.c:5040)
==9506== by 0x430E76: doshfunc (exec.c:4920)
==9506== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9506==
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509== HEAP SUMMARY:
==9509== in use at exit: 3,154,825 bytes in 69,482 blocks
==9509== total heap usage: 939,997 allocs, 870,515 frees, 68,412,810 bytes allocated
==9509==
==9509== Searching for pointers to 69,482 not-freed blocks
--9509-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9509-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9509-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9509-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9509-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9509-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9509-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9509-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9509-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9509-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9509-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9509-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9509-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9509-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9509-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9509-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9509-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9509-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9509-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9509-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9509-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9509-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9509-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9509-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9509-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9509-- Scanning root segment: 0x701a000..0x701afff (4096)
--9509-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9509-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9509-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9509-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9509-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9509-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9509-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9509-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9509-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9510-- Caught __NR_exit; running __libc_freeres()
==9510== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9510-by-pythonnut-on-???
==9510== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9510-by-pythonnut-on-???
==9510== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9510-by-pythonnut-on-???
==9510==
==9510== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9510== don't want to do, unless you know exactly what you're doing,
==9510== or are doing some strange experiment):
==9510== /usr/lib/valgrind/../../bin/vgdb --pid=9510 ...command...
==9510==
==9510== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9510== /path/to/gdb ./zsh
==9510== and then give GDB the following command
==9510== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9510
==9510== --pid is optional if only one valgrind process is running
==9510==
--9510-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9510==
==9510== HEAP SUMMARY:
==9510== in use at exit: 3,160,778 bytes in 69,837 blocks
==9510== total heap usage: 1,047,386 allocs, 977,549 frees, 71,863,670 bytes allocated
==9510==
==9510== Searching for pointers to 69,837 not-freed blocks
--9510-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9510-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9510-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9510-- Scanning root segment: 0x4037000..0x403afff (16384)
--9510-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9510-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9510-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9510-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9510-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9510-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9510-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9510-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9510-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9510-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9510-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9510-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9510-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9510-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9510-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9510-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9510-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9510-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9510-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9510-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9510-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9510-- Scanning root segment: 0x701a000..0x701afff (4096)
--9510-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9510-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9510-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9510-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9510-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9510-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9510-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9510-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9510-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9509== Checked 4,852,952 bytes
==9509==
==9509== LEAK SUMMARY:
==9509== definitely lost: 1,533 bytes in 8 blocks
==9509== indirectly lost: 6,756 bytes in 7 blocks
==9509== possibly lost: 0 bytes in 0 blocks
==9509== still reachable: 3,146,536 bytes in 69,467 blocks
==9509== suppressed: 0 bytes in 0 blocks
==9509== Rerun with --leak-check=full to see details of leaked memory
==9509==
==9509== Use --track-origins=yes to see where uninitialised values come from
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509==
==9509== 1 errors in context 1 of 2:
==9509== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9509== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9509== by 0x488CD0: stringsubst (subst.c:301)
==9509== by 0x48801B: prefork (subst.c:77)
==9509== by 0x42B318: execcmd (exec.c:2619)
==9509== by 0x428CA0: execpline2 (exec.c:1697)
==9509== by 0x427FD2: execpline (exec.c:1484)
==9509== by 0x427756: execlist (exec.c:1267)
==9509== by 0x42717C: execode (exec.c:1073)
==9509== by 0x431299: runshfunc (exec.c:5040)
==9509== by 0x430E76: doshfunc (exec.c:4920)
==9509== by 0x4302FB: execshfunc (exec.c:4557)
==9509== by 0x42D8C1: execcmd (exec.c:3373)
==9509==
==9509==
==9509== 2 errors in context 2 of 2:
==9509== Conditional jump or move depends on uninitialised value(s)
==9509== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9509== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9509== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9509== by 0x40EFC2: execbuiltin (builtin.c:450)
==9509== by 0x42D8E9: execcmd (exec.c:3378)
==9509== by 0x428CA0: execpline2 (exec.c:1697)
==9509== by 0x427FD2: execpline (exec.c:1484)
==9509== by 0x42779A: execlist (exec.c:1275)
==9509== by 0x42717C: execode (exec.c:1073)
==9509== by 0x431299: runshfunc (exec.c:5040)
==9509== by 0x430E76: doshfunc (exec.c:4920)
==9509== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9509==
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9508-- Caught __NR_exit; running __libc_freeres()
==9510== Checked 4,831,320 bytes
==9510==
--9508-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9508==
==9508== HEAP SUMMARY:
==9508== in use at exit: 3,152,473 bytes in 69,402 blocks
==9508== total heap usage: 939,903 allocs, 870,501 frees, 68,213,615 bytes allocated
==9508==
==9510== LEAK SUMMARY:
==9510== definitely lost: 1,533 bytes in 8 blocks
==9510== indirectly lost: 6,756 bytes in 7 blocks
==9510== possibly lost: 0 bytes in 0 blocks
==9510== still reachable: 3,152,489 bytes in 69,822 blocks
==9510== suppressed: 0 bytes in 0 blocks
==9510== Rerun with --leak-check=full to see details of leaked memory
==9510==
==9510== Use --track-origins=yes to see where uninitialised values come from
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9510==
==9510== 1 errors in context 1 of 2:
==9510== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9510== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9510== by 0x488CD0: stringsubst (subst.c:301)
==9510== by 0x48801B: prefork (subst.c:77)
==9510== by 0x42B318: execcmd (exec.c:2619)
==9510== by 0x428CA0: execpline2 (exec.c:1697)
==9510== by 0x427FD2: execpline (exec.c:1484)
==9510== by 0x427756: execlist (exec.c:1267)
==9510== by 0x42717C: execode (exec.c:1073)
==9510== by 0x431299: runshfunc (exec.c:5040)
==9510== by 0x430E76: doshfunc (exec.c:4920)
==9510== by 0x4302FB: execshfunc (exec.c:4557)
==9510== by 0x42D8C1: execcmd (exec.c:3373)
==9510==
==9510==
==9510== 2 errors in context 2 of 2:
==9510== Conditional jump or move depends on uninitialised value(s)
==9510== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9510== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9510== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9510== by 0x40EFC2: execbuiltin (builtin.c:450)
==9510== by 0x42D8E9: execcmd (exec.c:3378)
==9510== by 0x428CA0: execpline2 (exec.c:1697)
==9510== by 0x427FD2: execpline (exec.c:1484)
==9510== by 0x42779A: execlist (exec.c:1275)
==9510== by 0x42717C: execode (exec.c:1073)
==9510== by 0x431299: runshfunc (exec.c:5040)
==9510== by 0x430E76: doshfunc (exec.c:4920)
==9510== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9510==
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508== Searching for pointers to 69,402 not-freed blocks
--9508-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9508-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9508-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9508-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9508-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9508-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9508-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9508-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9508-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9508-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9508-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9508-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9508-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9508-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9508-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9508-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9508-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9508-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9508-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9508-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9508-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9508-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9508-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9508-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9508-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9508-- Scanning root segment: 0x701a000..0x701afff (4096)
--9508-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9508-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9508-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9508-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9508-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9508-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9508-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9508-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9508-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9511== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9511-by-pythonnut-on-???
==9511== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9511-by-pythonnut-on-???
==9511== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9511-by-pythonnut-on-???
==9511==
==9511== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9511== don't want to do, unless you know exactly what you're doing,
==9511== or are doing some strange experiment):
==9511== /usr/lib/valgrind/../../bin/vgdb --pid=9511 ...command...
==9511==
==9511== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9511== /path/to/gdb ./zsh
==9511== and then give GDB the following command
==9511== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9511
==9511== --pid is optional if only one valgrind process is running
==9511==
--9511-- Caught __NR_exit; running __libc_freeres()
--9511-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511==
==9511== HEAP SUMMARY:
==9511== in use at exit: 3,161,020 bytes in 69,843 blocks
==9511== total heap usage: 1,047,434 allocs, 977,591 frees, 71,872,686 bytes allocated
==9511==
==9511== Searching for pointers to 69,843 not-freed blocks
--9511-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9511-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9511-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9511-- Scanning root segment: 0x4037000..0x403afff (16384)
--9511-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9511-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9511-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9511-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9511-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9511-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9511-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9511-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9511-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9511-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9511-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9511-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9511-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9511-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9511-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9511-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9511-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9511-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9511-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9511-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9511-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9511-- Scanning root segment: 0x701a000..0x701afff (4096)
--9511-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9511-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9511-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9511-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9511-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9511-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9511-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9511-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9511-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9508== Checked 4,848,904 bytes
==9508==
==9508== LEAK SUMMARY:
==9508== definitely lost: 1,533 bytes in 8 blocks
==9508== indirectly lost: 6,756 bytes in 7 blocks
==9508== possibly lost: 0 bytes in 0 blocks
==9508== still reachable: 3,144,184 bytes in 69,387 blocks
==9508== suppressed: 0 bytes in 0 blocks
==9508== Rerun with --leak-check=full to see details of leaked memory
==9508==
==9508== Use --track-origins=yes to see where uninitialised values come from
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508==
==9508== 1 errors in context 1 of 2:
==9508== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9508== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9508== by 0x488CD0: stringsubst (subst.c:301)
==9508== by 0x48801B: prefork (subst.c:77)
==9508== by 0x42B318: execcmd (exec.c:2619)
==9508== by 0x428CA0: execpline2 (exec.c:1697)
==9508== by 0x427FD2: execpline (exec.c:1484)
==9508== by 0x427756: execlist (exec.c:1267)
==9508== by 0x42717C: execode (exec.c:1073)
==9508== by 0x431299: runshfunc (exec.c:5040)
==9508== by 0x430E76: doshfunc (exec.c:4920)
==9508== by 0x4302FB: execshfunc (exec.c:4557)
==9508== by 0x42D8C1: execcmd (exec.c:3373)
==9508==
==9508==
==9508== 2 errors in context 2 of 2:
==9508== Conditional jump or move depends on uninitialised value(s)
==9508== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9508== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9508== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9508== by 0x40EFC2: execbuiltin (builtin.c:450)
==9508== by 0x42D8E9: execcmd (exec.c:3378)
==9508== by 0x428CA0: execpline2 (exec.c:1697)
==9508== by 0x427FD2: execpline (exec.c:1484)
==9508== by 0x42779A: execlist (exec.c:1275)
==9508== by 0x42717C: execode (exec.c:1073)
==9508== by 0x431299: runshfunc (exec.c:5040)
==9508== by 0x430E76: doshfunc (exec.c:4920)
==9508== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9508==
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF810C, len 4
client request: code 4d430005, addr 0xFFEFF810C, len 4
client request: code 4d430005, addr 0xFFEFF810C, len 4
==9512== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9512-by-pythonnut-on-???
==9512== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9512-by-pythonnut-on-???
==9512== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9512-by-pythonnut-on-???
==9512==
==9512== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9512== don't want to do, unless you know exactly what you're doing,
==9512== or are doing some strange experiment):
==9512== /usr/lib/valgrind/../../bin/vgdb --pid=9512 ...command...
==9512==
==9512== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9512== /path/to/gdb ./zsh
==9512== and then give GDB the following command
==9512== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9512
==9512== --pid is optional if only one valgrind process is running
==9512==
==9513== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9513-by-pythonnut-on-???
==9513== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9513-by-pythonnut-on-???
==9513== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9513-by-pythonnut-on-???
==9513==
==9513== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9513== don't want to do, unless you know exactly what you're doing,
==9513== or are doing some strange experiment):
==9513== /usr/lib/valgrind/../../bin/vgdb --pid=9513 ...command...
==9513==
==9513== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9513== /path/to/gdb ./zsh
==9513== and then give GDB the following command
==9513== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9513
==9513== --pid is optional if only one valgrind process is running
==9513==
--9513-- Caught __NR_exit; running __libc_freeres()
==9511== Checked 4,831,488 bytes
==9511==
--9513-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511== LEAK SUMMARY:
==9511== definitely lost: 1,533 bytes in 8 blocks
==9511== indirectly lost: 6,756 bytes in 7 blocks
==9511== possibly lost: 0 bytes in 0 blocks
==9511== still reachable: 3,152,731 bytes in 69,828 blocks
==9511== suppressed: 0 bytes in 0 blocks
==9511== Rerun with --leak-check=full to see details of leaked memory
==9511==
==9511== Use --track-origins=yes to see where uninitialised values come from
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9511==
==9511== 1 errors in context 1 of 2:
==9511== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9511== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9511== by 0x488CD0: stringsubst (subst.c:301)
==9511== by 0x48801B: prefork (subst.c:77)
==9511== by 0x42B318: execcmd (exec.c:2619)
==9511== by 0x428CA0: execpline2 (exec.c:1697)
==9511== by 0x427FD2: execpline (exec.c:1484)
==9511== by 0x427756: execlist (exec.c:1267)
==9511== by 0x42717C: execode (exec.c:1073)
==9511== by 0x431299: runshfunc (exec.c:5040)
==9511== by 0x430E76: doshfunc (exec.c:4920)
==9511== by 0x4302FB: execshfunc (exec.c:4557)
==9511== by 0x42D8C1: execcmd (exec.c:3373)
==9511==
==9511==
==9511== 2 errors in context 2 of 2:
==9511== Conditional jump or move depends on uninitialised value(s)
==9511== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9511== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9511== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9511== by 0x40EFC2: execbuiltin (builtin.c:450)
==9511== by 0x42D8E9: execcmd (exec.c:3378)
==9511== by 0x428CA0: execpline2 (exec.c:1697)
==9511== by 0x427FD2: execpline (exec.c:1484)
==9511== by 0x42779A: execlist (exec.c:1275)
==9511== by 0x42717C: execode (exec.c:1073)
==9511== by 0x431299: runshfunc (exec.c:5040)
==9511== by 0x430E76: doshfunc (exec.c:4920)
==9511== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9511==
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513==
==9513== HEAP SUMMARY:
==9513== in use at exit: 3,160,984 bytes in 69,570 blocks
==9513== total heap usage: 940,215 allocs, 870,645 frees, 68,474,381 bytes allocated
==9513==
--9516-- Caught __NR_exit; running __libc_freeres()
==9513== Searching for pointers to 69,570 not-freed blocks
--9513-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9513-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9513-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9513-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9513-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9513-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9513-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9513-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9513-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9513-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9513-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9513-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9513-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9513-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9513-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9513-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9513-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9513-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9513-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9513-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9513-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9513-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9513-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9513-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9513-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9513-- Scanning root segment: 0x701a000..0x701afff (4096)
--9513-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9513-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9513-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9513-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9513-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9513-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9513-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9513-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9513-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9516== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9516-by-pythonnut-on-???
==9516== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9516-by-pythonnut-on-???
==9516== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9516-by-pythonnut-on-???
==9516==
==9516== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9516== don't want to do, unless you know exactly what you're doing,
==9516== or are doing some strange experiment):
==9516== /usr/lib/valgrind/../../bin/vgdb --pid=9516 ...command...
==9516==
==9516== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9516== /path/to/gdb ./zsh
==9516== and then give GDB the following command
==9516== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9516
==9516== --pid is optional if only one valgrind process is running
==9516==
--9516-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9516==
==9516== HEAP SUMMARY:
==9516== in use at exit: 3,160,956 bytes in 69,843 blocks
==9516== total heap usage: 1,047,414 allocs, 977,571 frees, 71,870,456 bytes allocated
==9516==
==9516== Searching for pointers to 69,843 not-freed blocks
--9516-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9516-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9516-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9516-- Scanning root segment: 0x4037000..0x403afff (16384)
--9516-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9516-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9516-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9516-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9516-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9516-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9516-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9516-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9516-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9516-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9516-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9516-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9516-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9516-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9516-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9516-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9516-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9516-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9516-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9516-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9516-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9516-- Scanning root segment: 0x701a000..0x701afff (4096)
--9516-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9516-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9516-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9516-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9516-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9516-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9516-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9516-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9516-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9513== Checked 4,876,600 bytes
==9513==
==9513== LEAK SUMMARY:
==9513== definitely lost: 1,533 bytes in 8 blocks
==9513== indirectly lost: 6,756 bytes in 7 blocks
==9513== possibly lost: 0 bytes in 0 blocks
==9513== still reachable: 3,152,695 bytes in 69,555 blocks
==9513== suppressed: 0 bytes in 0 blocks
==9513== Rerun with --leak-check=full to see details of leaked memory
==9513==
==9513== Use --track-origins=yes to see where uninitialised values come from
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513==
==9513== 1 errors in context 1 of 2:
==9513== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9513== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9513== by 0x488CD0: stringsubst (subst.c:301)
==9513== by 0x48801B: prefork (subst.c:77)
==9513== by 0x42B318: execcmd (exec.c:2619)
==9513== by 0x428CA0: execpline2 (exec.c:1697)
==9513== by 0x427FD2: execpline (exec.c:1484)
==9513== by 0x427756: execlist (exec.c:1267)
==9513== by 0x42717C: execode (exec.c:1073)
==9513== by 0x431299: runshfunc (exec.c:5040)
==9513== by 0x430E76: doshfunc (exec.c:4920)
==9513== by 0x4302FB: execshfunc (exec.c:4557)
==9513== by 0x42D8C1: execcmd (exec.c:3373)
==9513==
==9513==
==9513== 2 errors in context 2 of 2:
==9513== Conditional jump or move depends on uninitialised value(s)
==9513== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9513== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9513== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9513== by 0x40EFC2: execbuiltin (builtin.c:450)
==9513== by 0x42D8E9: execcmd (exec.c:3378)
==9513== by 0x428CA0: execpline2 (exec.c:1697)
==9513== by 0x427FD2: execpline (exec.c:1484)
==9513== by 0x42779A: execlist (exec.c:1275)
==9513== by 0x42717C: execode (exec.c:1073)
==9513== by 0x431299: runshfunc (exec.c:5040)
==9513== by 0x430E76: doshfunc (exec.c:4920)
==9513== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9513==
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9512-- Caught __NR_exit; running __libc_freeres()
--9512-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9512==
==9516== Checked 4,831,416 bytes
==9512== HEAP SUMMARY:
==9512== in use at exit: 3,158,633 bytes in 69,490 blocks
==9512== total heap usage: 940,155 allocs, 870,665 frees, 68,244,483 bytes allocated
==9512==
==9516==
==9516== LEAK SUMMARY:
==9516== definitely lost: 1,533 bytes in 8 blocks
==9516== indirectly lost: 6,756 bytes in 7 blocks
==9516== possibly lost: 0 bytes in 0 blocks
==9516== still reachable: 3,152,667 bytes in 69,828 blocks
==9516== suppressed: 0 bytes in 0 blocks
==9516== Rerun with --leak-check=full to see details of leaked memory
==9516==
==9516== Use --track-origins=yes to see where uninitialised values come from
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9516==
==9516== 1 errors in context 1 of 2:
==9516== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9516== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9516== by 0x488CD0: stringsubst (subst.c:301)
==9516== by 0x48801B: prefork (subst.c:77)
==9516== by 0x42B318: execcmd (exec.c:2619)
==9516== by 0x428CA0: execpline2 (exec.c:1697)
==9516== by 0x427FD2: execpline (exec.c:1484)
==9516== by 0x427756: execlist (exec.c:1267)
==9516== by 0x42717C: execode (exec.c:1073)
==9516== by 0x431299: runshfunc (exec.c:5040)
==9516== by 0x430E76: doshfunc (exec.c:4920)
==9516== by 0x4302FB: execshfunc (exec.c:4557)
==9516== by 0x42D8C1: execcmd (exec.c:3373)
==9516==
==9516==
==9516== 2 errors in context 2 of 2:
==9516== Conditional jump or move depends on uninitialised value(s)
==9516== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9516== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9516== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9516== by 0x40EFC2: execbuiltin (builtin.c:450)
==9516== by 0x42D8E9: execcmd (exec.c:3378)
==9516== by 0x428CA0: execpline2 (exec.c:1697)
==9516== by 0x427FD2: execpline (exec.c:1484)
==9516== by 0x42779A: execlist (exec.c:1275)
==9516== by 0x42717C: execode (exec.c:1073)
==9516== by 0x431299: runshfunc (exec.c:5040)
==9516== by 0x430E76: doshfunc (exec.c:4920)
==9516== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9516==
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512== Searching for pointers to 69,490 not-freed blocks
--9512-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9512-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9512-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9512-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9512-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9512-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9512-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9512-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9512-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9512-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9512-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9512-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9512-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9512-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9512-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9512-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9512-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9512-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9512-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9512-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9512-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9512-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9512-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9512-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9512-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9512-- Scanning root segment: 0x701a000..0x701afff (4096)
--9512-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9512-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9512-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9512-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9512-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9512-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9512-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9512-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9512-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9517== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9517-by-pythonnut-on-???
==9517== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9517-by-pythonnut-on-???
==9517== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9517-by-pythonnut-on-???
==9517==
==9517== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9517== don't want to do, unless you know exactly what you're doing,
==9517== or are doing some strange experiment):
==9517== /usr/lib/valgrind/../../bin/vgdb --pid=9517 ...command...
==9517==
==9517== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9517== /path/to/gdb ./zsh
==9517== and then give GDB the following command
==9517== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9517
==9517== --pid is optional if only one valgrind process is running
==9517==
--9517-- Caught __NR_exit; running __libc_freeres()
--9517-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9517==
==9517== HEAP SUMMARY:
==9517== in use at exit: 3,160,994 bytes in 69,844 blocks
==9517== total heap usage: 1,047,427 allocs, 977,583 frees, 71,873,153 bytes allocated
==9517==
==9517== Searching for pointers to 69,844 not-freed blocks
--9517-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9517-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9517-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9517-- Scanning root segment: 0x4037000..0x403afff (16384)
--9517-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9517-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9517-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9517-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9517-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9517-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9517-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9517-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9517-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9517-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9517-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9517-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9517-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9517-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9517-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9517-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9517-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9517-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9517-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9512== Checked 4,856,296 bytes
==9512==
--9517-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9517-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9517-- Scanning root segment: 0x701a000..0x701afff (4096)
--9517-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9517-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9517-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9517-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9517-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9517-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9517-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9517-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9517-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9512== LEAK SUMMARY:
==9512== definitely lost: 1,533 bytes in 8 blocks
==9512== indirectly lost: 6,756 bytes in 7 blocks
==9512== possibly lost: 0 bytes in 0 blocks
==9512== still reachable: 3,150,344 bytes in 69,475 blocks
==9512== suppressed: 0 bytes in 0 blocks
==9512== Rerun with --leak-check=full to see details of leaked memory
==9512==
==9512== Use --track-origins=yes to see where uninitialised values come from
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512==
==9512== 1 errors in context 1 of 2:
==9512== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9512== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9512== by 0x488CD0: stringsubst (subst.c:301)
==9512== by 0x48801B: prefork (subst.c:77)
==9512== by 0x42B318: execcmd (exec.c:2619)
==9512== by 0x428CA0: execpline2 (exec.c:1697)
==9512== by 0x427FD2: execpline (exec.c:1484)
==9512== by 0x427756: execlist (exec.c:1267)
==9512== by 0x42717C: execode (exec.c:1073)
==9512== by 0x431299: runshfunc (exec.c:5040)
==9512== by 0x430E76: doshfunc (exec.c:4920)
==9512== by 0x4302FB: execshfunc (exec.c:4557)
==9512== by 0x42D8C1: execcmd (exec.c:3373)
==9512==
==9512==
==9512== 2 errors in context 2 of 2:
==9512== Conditional jump or move depends on uninitialised value(s)
==9512== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9512== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9512== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9512== by 0x40EFC2: execbuiltin (builtin.c:450)
==9512== by 0x42D8E9: execcmd (exec.c:3378)
==9512== by 0x428CA0: execpline2 (exec.c:1697)
==9512== by 0x427FD2: execpline (exec.c:1484)
==9512== by 0x42779A: execlist (exec.c:1275)
==9512== by 0x42717C: execode (exec.c:1073)
==9512== by 0x431299: runshfunc (exec.c:5040)
==9512== by 0x430E76: doshfunc (exec.c:4920)
==9512== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9512==
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF616C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFEBCDC, len 4
==9517== Checked 4,830,936 bytes
==9517==
client request: code 4d430005, addr 0xFFEFEAB9C, len 4
==9517== LEAK SUMMARY:
==9517== definitely lost: 1,533 bytes in 8 blocks
==9517== indirectly lost: 6,756 bytes in 7 blocks
==9517== possibly lost: 0 bytes in 0 blocks
==9517== still reachable: 3,152,705 bytes in 69,829 blocks
==9517== suppressed: 0 bytes in 0 blocks
==9517== Rerun with --leak-check=full to see details of leaked memory
==9517==
==9517== Use --track-origins=yes to see where uninitialised values come from
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9517==
==9517== 1 errors in context 1 of 2:
==9517== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9517== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9517== by 0x488CD0: stringsubst (subst.c:301)
==9517== by 0x48801B: prefork (subst.c:77)
==9517== by 0x42B318: execcmd (exec.c:2619)
==9517== by 0x428CA0: execpline2 (exec.c:1697)
==9517== by 0x427FD2: execpline (exec.c:1484)
==9517== by 0x427756: execlist (exec.c:1267)
==9517== by 0x42717C: execode (exec.c:1073)
==9517== by 0x431299: runshfunc (exec.c:5040)
==9517== by 0x430E76: doshfunc (exec.c:4920)
==9517== by 0x4302FB: execshfunc (exec.c:4557)
==9517== by 0x42D8C1: execcmd (exec.c:3373)
==9517==
==9517==
==9517== 2 errors in context 2 of 2:
==9517== Conditional jump or move depends on uninitialised value(s)
==9517== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9517== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9517== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9517== by 0x40EFC2: execbuiltin (builtin.c:450)
==9517== by 0x42D8E9: execcmd (exec.c:3378)
==9517== by 0x428CA0: execpline2 (exec.c:1697)
==9517== by 0x427FD2: execpline (exec.c:1484)
==9517== by 0x42779A: execlist (exec.c:1275)
==9517== by 0x42717C: execode (exec.c:1073)
==9517== by 0x431299: runshfunc (exec.c:5040)
==9517== by 0x430E76: doshfunc (exec.c:4920)
==9517== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9517==
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9519-- Caught __NR_exit; running __libc_freeres()
==9519== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9519-by-pythonnut-on-???
==9519== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9519-by-pythonnut-on-???
==9519== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9519-by-pythonnut-on-???
==9519==
==9519== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9519== don't want to do, unless you know exactly what you're doing,
==9519== or are doing some strange experiment):
==9519== /usr/lib/valgrind/../../bin/vgdb --pid=9519 ...command...
==9519==
==9519== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9519== /path/to/gdb ./zsh
==9519== and then give GDB the following command
==9519== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9519
==9519== --pid is optional if only one valgrind process is running
==9519==
==9521== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9521-by-pythonnut-on-???
==9521== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9521-by-pythonnut-on-???
==9521== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9521-by-pythonnut-on-???
==9521==
==9521== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9521== don't want to do, unless you know exactly what you're doing,
==9521== or are doing some strange experiment):
==9521== /usr/lib/valgrind/../../bin/vgdb --pid=9521 ...command...
==9521==
==9521== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9521== /path/to/gdb ./zsh
==9521== and then give GDB the following command
==9521== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9521
==9521== --pid is optional if only one valgrind process is running
==9521==
--9521-- Caught __NR_exit; running __libc_freeres()
--9519-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9519==
==9519== HEAP SUMMARY:
==9519== in use at exit: 3,167,384 bytes in 69,579 blocks
==9519== total heap usage: 940,481 allocs, 870,902 frees, 68,290,480 bytes allocated
==9519==
--9521-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9521==
==9521== HEAP SUMMARY:
==9521== in use at exit: 3,160,698 bytes in 69,835 blocks
==9521== total heap usage: 1,047,550 allocs, 977,715 frees, 71,886,214 bytes allocated
==9521==
==9519== Searching for pointers to 69,579 not-freed blocks
--9519-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9519-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9519-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9519-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9519-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9519-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9519-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9519-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9519-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9519-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9519-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9519-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9519-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9519-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9519-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9519-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9519-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9519-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9519-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9519-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9519-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9519-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9519-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9519-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9519-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9519-- Scanning root segment: 0x701a000..0x701afff (4096)
--9519-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9519-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9519-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9519-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9519-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9519-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9519-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9519-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9519-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9521== Searching for pointers to 69,835 not-freed blocks
--9521-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9521-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9521-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9521-- Scanning root segment: 0x4037000..0x403afff (16384)
--9521-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9521-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9521-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9521-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9521-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9521-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9521-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9521-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9521-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9521-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9521-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9521-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9521-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9521-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9521-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9521-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9521-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9521-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9521-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9521-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9521-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9521-- Scanning root segment: 0x701a000..0x701afff (4096)
--9521-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9521-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9521-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9521-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9521-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9521-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9521-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9521-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9521-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9519== Checked 4,885,760 bytes
==9519==
==9521== Checked 4,831,384 bytes
==9521==
==9519== LEAK SUMMARY:
==9519== definitely lost: 1,533 bytes in 8 blocks
==9519== indirectly lost: 6,756 bytes in 7 blocks
==9519== possibly lost: 0 bytes in 0 blocks
==9519== still reachable: 3,159,095 bytes in 69,564 blocks
==9519== suppressed: 0 bytes in 0 blocks
==9519== Rerun with --leak-check=full to see details of leaked memory
==9519==
==9519== Use --track-origins=yes to see where uninitialised values come from
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9519==
==9519== 1 errors in context 1 of 2:
==9519== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9519== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9519== by 0x488CD0: stringsubst (subst.c:301)
==9519== by 0x48801B: prefork (subst.c:77)
==9519== by 0x42B318: execcmd (exec.c:2619)
==9519== by 0x428CA0: execpline2 (exec.c:1697)
==9519== by 0x427FD2: execpline (exec.c:1484)
==9519== by 0x427756: execlist (exec.c:1267)
==9519== by 0x42717C: execode (exec.c:1073)
==9519== by 0x431299: runshfunc (exec.c:5040)
==9519== by 0x430E76: doshfunc (exec.c:4920)
==9519== by 0x4302FB: execshfunc (exec.c:4557)
==9519== by 0x42D8C1: execcmd (exec.c:3373)
==9519==
==9519==
==9519== 2 errors in context 2 of 2:
==9519== Conditional jump or move depends on uninitialised value(s)
==9519== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9519== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9519== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9519== by 0x40EFC2: execbuiltin (builtin.c:450)
==9519== by 0x42D8E9: execcmd (exec.c:3378)
==9519== by 0x428CA0: execpline2 (exec.c:1697)
==9519== by 0x427FD2: execpline (exec.c:1484)
==9519== by 0x42779A: execlist (exec.c:1275)
==9519== by 0x42717C: execode (exec.c:1073)
==9519== by 0x431299: runshfunc (exec.c:5040)
==9519== by 0x430E76: doshfunc (exec.c:4920)
==9519== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9519==
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521== LEAK SUMMARY:
==9521== definitely lost: 1,533 bytes in 8 blocks
==9521== indirectly lost: 6,756 bytes in 7 blocks
==9521== possibly lost: 0 bytes in 0 blocks
==9521== still reachable: 3,152,409 bytes in 69,820 blocks
==9521== suppressed: 0 bytes in 0 blocks
==9521== Rerun with --leak-check=full to see details of leaked memory
==9521==
==9521== Use --track-origins=yes to see where uninitialised values come from
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521==
==9521== 1 errors in context 1 of 2:
==9521== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9521== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9521== by 0x488CD0: stringsubst (subst.c:301)
==9521== by 0x48801B: prefork (subst.c:77)
==9521== by 0x42B318: execcmd (exec.c:2619)
==9521== by 0x428CA0: execpline2 (exec.c:1697)
==9521== by 0x427FD2: execpline (exec.c:1484)
==9521== by 0x427756: execlist (exec.c:1267)
==9521== by 0x42717C: execode (exec.c:1073)
==9521== by 0x431299: runshfunc (exec.c:5040)
==9521== by 0x430E76: doshfunc (exec.c:4920)
==9521== by 0x4302FB: execshfunc (exec.c:4557)
==9521== by 0x42D8C1: execcmd (exec.c:3373)
==9521==
==9521==
==9521== 2 errors in context 2 of 2:
==9521== Conditional jump or move depends on uninitialised value(s)
==9521== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9521== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9521== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9521== by 0x40EFC2: execbuiltin (builtin.c:450)
==9521== by 0x42D8E9: execcmd (exec.c:3378)
==9521== by 0x428CA0: execpline2 (exec.c:1697)
==9521== by 0x427FD2: execpline (exec.c:1484)
==9521== by 0x42779A: execlist (exec.c:1275)
==9521== by 0x42717C: execode (exec.c:1073)
==9521== by 0x431299: runshfunc (exec.c:5040)
==9521== by 0x430E76: doshfunc (exec.c:4920)
==9521== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9521==
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9523-- Caught __NR_exit; running __libc_freeres()
==9523== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9523-by-pythonnut-on-???
==9523== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9523-by-pythonnut-on-???
==9523== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9523-by-pythonnut-on-???
==9523==
==9523== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9523== don't want to do, unless you know exactly what you're doing,
==9523== or are doing some strange experiment):
==9523== /usr/lib/valgrind/../../bin/vgdb --pid=9523 ...command...
==9523==
==9523== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9523== /path/to/gdb ./zsh
==9523== and then give GDB the following command
==9523== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9523
==9523== --pid is optional if only one valgrind process is running
==9523==
client request: code 4d430005, addr 0xFFEFEA33C, len 4
--9523-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9523==
==9523== HEAP SUMMARY:
==9523== in use at exit: 3,167,540 bytes in 69,585 blocks
==9523== total heap usage: 940,490 allocs, 870,905 frees, 68,292,476 bytes allocated
==9523==
==9523== Searching for pointers to 69,585 not-freed blocks
--9523-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9523-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9523-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9523-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9523-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9523-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9523-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9523-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9523-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9523-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9523-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9523-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9523-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9523-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9523-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9523-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9523-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9523-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9523-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9523-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9523-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9523-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9523-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9523-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9523-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9523-- Scanning root segment: 0x701a000..0x701afff (4096)
--9523-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9523-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9523-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9523-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9523-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9523-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9523-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9523-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9523-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9523== Checked 4,887,040 bytes
==9523==
==9523== LEAK SUMMARY:
==9523== definitely lost: 1,533 bytes in 8 blocks
==9523== indirectly lost: 6,756 bytes in 7 blocks
==9523== possibly lost: 0 bytes in 0 blocks
==9523== still reachable: 3,159,251 bytes in 69,570 blocks
==9523== suppressed: 0 bytes in 0 blocks
==9523== Rerun with --leak-check=full to see details of leaked memory
==9523==
==9523== Use --track-origins=yes to see where uninitialised values come from
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9523==
==9523== 1 errors in context 1 of 2:
==9523== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9523== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9523== by 0x488CD0: stringsubst (subst.c:301)
==9523== by 0x48801B: prefork (subst.c:77)
==9523== by 0x42B318: execcmd (exec.c:2619)
==9523== by 0x428CA0: execpline2 (exec.c:1697)
==9523== by 0x427FD2: execpline (exec.c:1484)
==9523== by 0x427756: execlist (exec.c:1267)
==9523== by 0x42717C: execode (exec.c:1073)
==9523== by 0x431299: runshfunc (exec.c:5040)
==9523== by 0x430E76: doshfunc (exec.c:4920)
==9523== by 0x4302FB: execshfunc (exec.c:4557)
==9523== by 0x42D8C1: execcmd (exec.c:3373)
==9523==
==9523==
==9523== 2 errors in context 2 of 2:
==9523== Conditional jump or move depends on uninitialised value(s)
==9523== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9523== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9523== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9523== by 0x40EFC2: execbuiltin (builtin.c:450)
==9523== by 0x42D8E9: execcmd (exec.c:3378)
==9523== by 0x428CA0: execpline2 (exec.c:1697)
==9523== by 0x427FD2: execpline (exec.c:1484)
==9523== by 0x42779A: execlist (exec.c:1275)
==9523== by 0x42717C: execode (exec.c:1073)
==9523== by 0x431299: runshfunc (exec.c:5040)
==9523== by 0x430E76: doshfunc (exec.c:4920)
==9523== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9523==
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9522-- Caught __NR_exit; running __libc_freeres()
==9522== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9522-by-pythonnut-on-???
==9522== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9522-by-pythonnut-on-???
==9522== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9522-by-pythonnut-on-???
==9522==
==9522== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9522== don't want to do, unless you know exactly what you're doing,
==9522== or are doing some strange experiment):
==9522== /usr/lib/valgrind/../../bin/vgdb --pid=9522 ...command...
==9522==
==9522== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9522== /path/to/gdb ./zsh
==9522== and then give GDB the following command
==9522== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9522
==9522== --pid is optional if only one valgrind process is running
==9522==
--9522-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9522==
==9522== HEAP SUMMARY:
==9522== in use at exit: 3,167,476 bytes in 69,582 blocks
==9522== total heap usage: 940,492 allocs, 870,910 frees, 68,293,020 bytes allocated
==9522==
==9522== Searching for pointers to 69,582 not-freed blocks
--9522-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9522-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9522-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9522-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9522-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9522-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9522-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9522-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9522-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9522-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9522-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9522-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9522-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9522-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9522-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9522-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9522-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9522-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9522-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9522-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9522-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9522-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9522-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9522-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9522-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9522-- Scanning root segment: 0x701a000..0x701afff (4096)
--9522-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9522-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9522-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9522-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9522-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9522-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9522-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9522-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9522-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9522== Checked 4,886,352 bytes
==9522==
==9522== LEAK SUMMARY:
==9522== definitely lost: 1,533 bytes in 8 blocks
==9522== indirectly lost: 6,756 bytes in 7 blocks
==9522== possibly lost: 0 bytes in 0 blocks
==9522== still reachable: 3,159,187 bytes in 69,567 blocks
==9522== suppressed: 0 bytes in 0 blocks
==9522== Rerun with --leak-check=full to see details of leaked memory
==9522==
==9522== Use --track-origins=yes to see where uninitialised values come from
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9522==
==9522== 1 errors in context 1 of 2:
==9522== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9522== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9522== by 0x488CD0: stringsubst (subst.c:301)
==9522== by 0x48801B: prefork (subst.c:77)
==9522== by 0x42B318: execcmd (exec.c:2619)
==9522== by 0x428CA0: execpline2 (exec.c:1697)
==9522== by 0x427FD2: execpline (exec.c:1484)
==9522== by 0x427756: execlist (exec.c:1267)
==9522== by 0x42717C: execode (exec.c:1073)
==9522== by 0x431299: runshfunc (exec.c:5040)
==9522== by 0x430E76: doshfunc (exec.c:4920)
==9522== by 0x4302FB: execshfunc (exec.c:4557)
==9522== by 0x42D8C1: execcmd (exec.c:3373)
==9522==
==9522==
==9522== 2 errors in context 2 of 2:
==9522== Conditional jump or move depends on uninitialised value(s)
==9522== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9522== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9522== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9522== by 0x40EFC2: execbuiltin (builtin.c:450)
==9522== by 0x42D8E9: execcmd (exec.c:3378)
==9522== by 0x428CA0: execpline2 (exec.c:1697)
==9522== by 0x427FD2: execpline (exec.c:1484)
==9522== by 0x42779A: execlist (exec.c:1275)
==9522== by 0x42717C: execode (exec.c:1073)
==9522== by 0x431299: runshfunc (exec.c:5040)
==9522== by 0x430E76: doshfunc (exec.c:4920)
==9522== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9522==
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9526-- Caught __NR_exit; running __libc_freeres()
==9526== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9526-by-pythonnut-on-???
==9526== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9526-by-pythonnut-on-???
==9526== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9526-by-pythonnut-on-???
==9526==
==9526== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9526== don't want to do, unless you know exactly what you're doing,
==9526== or are doing some strange experiment):
==9526== /usr/lib/valgrind/../../bin/vgdb --pid=9526 ...command...
==9526==
==9526== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9526== /path/to/gdb ./zsh
==9526== and then give GDB the following command
==9526== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9526
==9526== --pid is optional if only one valgrind process is running
==9526==
client request: code 4d430005, addr 0xFFEFE9B7C, len 4
--9526-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9526==
==9526== HEAP SUMMARY:
==9526== in use at exit: 3,167,637 bytes in 69,588 blocks
==9526== total heap usage: 940,497 allocs, 870,909 frees, 68,294,685 bytes allocated
==9526==
==9526== Searching for pointers to 69,588 not-freed blocks
--9526-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9526-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9526-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9526-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9526-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9526-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9526-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9526-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9526-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9526-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9526-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9526-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9526-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9526-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9526-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9526-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9526-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9526-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9526-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9526-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9526-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9526-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9526-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9526-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9526-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9526-- Scanning root segment: 0x701a000..0x701afff (4096)
--9526-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9526-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9526-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9526-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9526-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9526-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9526-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9526-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9526-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9526== Checked 4,887,640 bytes
==9526==
==9526== LEAK SUMMARY:
==9526== definitely lost: 1,533 bytes in 8 blocks
==9526== indirectly lost: 6,756 bytes in 7 blocks
==9526== possibly lost: 0 bytes in 0 blocks
==9526== still reachable: 3,159,348 bytes in 69,573 blocks
==9526== suppressed: 0 bytes in 0 blocks
==9526== Rerun with --leak-check=full to see details of leaked memory
==9526==
==9526== Use --track-origins=yes to see where uninitialised values come from
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9526==
==9526== 1 errors in context 1 of 2:
==9526== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9526== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9526== by 0x488CD0: stringsubst (subst.c:301)
==9526== by 0x48801B: prefork (subst.c:77)
==9526== by 0x42B318: execcmd (exec.c:2619)
==9526== by 0x428CA0: execpline2 (exec.c:1697)
==9526== by 0x427FD2: execpline (exec.c:1484)
==9526== by 0x427756: execlist (exec.c:1267)
==9526== by 0x42717C: execode (exec.c:1073)
==9526== by 0x431299: runshfunc (exec.c:5040)
==9526== by 0x430E76: doshfunc (exec.c:4920)
==9526== by 0x4302FB: execshfunc (exec.c:4557)
==9526== by 0x42D8C1: execcmd (exec.c:3373)
==9526==
==9526==
==9526== 2 errors in context 2 of 2:
==9526== Conditional jump or move depends on uninitialised value(s)
==9526== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9526== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9526== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9526== by 0x40EFC2: execbuiltin (builtin.c:450)
==9526== by 0x42D8E9: execcmd (exec.c:3378)
==9526== by 0x428CA0: execpline2 (exec.c:1697)
==9526== by 0x427FD2: execpline (exec.c:1484)
==9526== by 0x42779A: execlist (exec.c:1275)
==9526== by 0x42717C: execode (exec.c:1073)
==9526== by 0x431299: runshfunc (exec.c:5040)
==9526== by 0x430E76: doshfunc (exec.c:4920)
==9526== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9526==
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9525-- Caught __NR_exit; running __libc_freeres()
==9525== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9525-by-pythonnut-on-???
==9525== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9525-by-pythonnut-on-???
==9525== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9525-by-pythonnut-on-???
==9525==
==9525== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9525== don't want to do, unless you know exactly what you're doing,
==9525== or are doing some strange experiment):
==9525== /usr/lib/valgrind/../../bin/vgdb --pid=9525 ...command...
==9525==
==9525== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9525== /path/to/gdb ./zsh
==9525== and then give GDB the following command
==9525== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9525
==9525== --pid is optional if only one valgrind process is running
==9525==
--9525-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9525==
==9525== HEAP SUMMARY:
==9525== in use at exit: 3,167,573 bytes in 69,585 blocks
==9525== total heap usage: 940,499 allocs, 870,914 frees, 68,295,229 bytes allocated
==9525==
==9525== Searching for pointers to 69,585 not-freed blocks
--9525-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9525-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9525-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9525-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9525-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9525-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9525-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9525-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9525-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9525-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9525-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9525-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9525-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9525-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9525-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9525-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9525-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9525-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9525-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9525-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9525-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9525-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9525-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9525-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9525-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9525-- Scanning root segment: 0x701a000..0x701afff (4096)
--9525-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9525-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9525-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9525-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9525-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9525-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9525-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9525-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9525-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9525== Checked 4,886,960 bytes
==9525==
==9525== LEAK SUMMARY:
==9525== definitely lost: 1,533 bytes in 8 blocks
==9525== indirectly lost: 6,756 bytes in 7 blocks
==9525== possibly lost: 0 bytes in 0 blocks
==9525== still reachable: 3,159,284 bytes in 69,570 blocks
==9525== suppressed: 0 bytes in 0 blocks
==9525== Rerun with --leak-check=full to see details of leaked memory
==9525==
==9525== Use --track-origins=yes to see where uninitialised values come from
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9525==
==9525== 1 errors in context 1 of 2:
==9525== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9525== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9525== by 0x488CD0: stringsubst (subst.c:301)
==9525== by 0x48801B: prefork (subst.c:77)
==9525== by 0x42B318: execcmd (exec.c:2619)
==9525== by 0x428CA0: execpline2 (exec.c:1697)
==9525== by 0x427FD2: execpline (exec.c:1484)
==9525== by 0x427756: execlist (exec.c:1267)
==9525== by 0x42717C: execode (exec.c:1073)
==9525== by 0x431299: runshfunc (exec.c:5040)
==9525== by 0x430E76: doshfunc (exec.c:4920)
==9525== by 0x4302FB: execshfunc (exec.c:4557)
==9525== by 0x42D8C1: execcmd (exec.c:3373)
==9525==
==9525==
==9525== 2 errors in context 2 of 2:
==9525== Conditional jump or move depends on uninitialised value(s)
==9525== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9525== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9525== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9525== by 0x40EFC2: execbuiltin (builtin.c:450)
==9525== by 0x42D8E9: execcmd (exec.c:3378)
==9525== by 0x428CA0: execpline2 (exec.c:1697)
==9525== by 0x427FD2: execpline (exec.c:1484)
==9525== by 0x42779A: execlist (exec.c:1275)
==9525== by 0x42717C: execode (exec.c:1073)
==9525== by 0x431299: runshfunc (exec.c:5040)
==9525== by 0x430E76: doshfunc (exec.c:4920)
==9525== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9525==
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF992C, len 4
client request: code 4d430005, addr 0xFFEFF87DC, len 4
client request: code 4d430005, addr 0xFFEFFB6EC, len 4
--9490-- Caught __NR_exit; running __libc_freeres()
--9490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9490==
==9490== HEAP SUMMARY:
==9490== in use at exit: 3,145,894 bytes in 69,103 blocks
==9490== total heap usage: 940,587 allocs, 871,484 frees, 68,311,928 bytes allocated
==9490==
==9490== Searching for pointers to 69,103 not-freed blocks
--9490-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9490-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9490-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9490-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9490-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9490-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9490-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9490-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9490-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9490-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9490-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9490-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9490-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9490-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9490-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9490-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9490-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9490-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9490-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9490-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9490-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9490-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9490-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9490-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9490-- Scanning root segment: 0x701a000..0x701afff (4096)
--9490-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9490-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9490-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9490-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9490-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9490-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9490-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9490-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9490-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9490== Checked 4,789,136 bytes
==9490==
==9490== LEAK SUMMARY:
==9490== definitely lost: 1,533 bytes in 8 blocks
==9490== indirectly lost: 6,756 bytes in 7 blocks
==9490== possibly lost: 0 bytes in 0 blocks
==9490== still reachable: 3,137,605 bytes in 69,088 blocks
==9490== suppressed: 0 bytes in 0 blocks
==9490== Rerun with --leak-check=full to see details of leaked memory
==9490==
==9490== Use --track-origins=yes to see where uninitialised values come from
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9490==
==9490== 1 errors in context 1 of 2:
==9490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9490== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9490== by 0x488CD0: stringsubst (subst.c:301)
==9490== by 0x48801B: prefork (subst.c:77)
==9490== by 0x42B318: execcmd (exec.c:2619)
==9490== by 0x428CA0: execpline2 (exec.c:1697)
==9490== by 0x427FD2: execpline (exec.c:1484)
==9490== by 0x427756: execlist (exec.c:1267)
==9490== by 0x42717C: execode (exec.c:1073)
==9490== by 0x431299: runshfunc (exec.c:5040)
==9490== by 0x430E76: doshfunc (exec.c:4920)
==9490== by 0x4302FB: execshfunc (exec.c:4557)
==9490== by 0x42D8C1: execcmd (exec.c:3373)
==9490==
==9490==
==9490== 2 errors in context 2 of 2:
==9490== Conditional jump or move depends on uninitialised value(s)
==9490== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9490== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9490== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9490== by 0x40EFC2: execbuiltin (builtin.c:450)
==9490== by 0x42D8E9: execcmd (exec.c:3378)
==9490== by 0x428CA0: execpline2 (exec.c:1697)
==9490== by 0x427FD2: execpline (exec.c:1484)
==9490== by 0x42779A: execlist (exec.c:1275)
==9490== by 0x42717C: execode (exec.c:1073)
==9490== by 0x431299: runshfunc (exec.c:5040)
==9490== by 0x430E76: doshfunc (exec.c:4920)
==9490== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9490==
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9485-- Caught __NR_exit; running __libc_freeres()
--9485-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9485==
==9485== HEAP SUMMARY:
==9485== in use at exit: 3,115,806 bytes in 68,874 blocks
==9485== total heap usage: 935,481 allocs, 866,607 frees, 66,578,929 bytes allocated
==9485==
==9485== Searching for pointers to 68,874 not-freed blocks
--9485-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9485-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9485-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9485-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9485-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9485-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9485-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9485-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9485-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9485-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9485-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9485-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9485-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9485-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9485-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9485-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9485-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9485-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9485-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9485-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9485-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9485-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9485-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9485-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9485-- Scanning root segment: 0x701a000..0x701afff (4096)
--9485-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9485-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9485-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9485-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9485-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9485-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9485-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9485-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9485-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9485== Checked 4,757,928 bytes
==9485==
==9485== LEAK SUMMARY:
==9485== definitely lost: 1,533 bytes in 8 blocks
==9485== indirectly lost: 6,756 bytes in 7 blocks
==9485== possibly lost: 0 bytes in 0 blocks
==9485== still reachable: 3,107,517 bytes in 68,859 blocks
==9485== suppressed: 0 bytes in 0 blocks
==9485== Rerun with --leak-check=full to see details of leaked memory
==9485==
==9485== Use --track-origins=yes to see where uninitialised values come from
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485==
==9485== 1 errors in context 1 of 2:
==9485== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9485== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9485== by 0x488CD0: stringsubst (subst.c:301)
==9485== by 0x48801B: prefork (subst.c:77)
==9485== by 0x42B318: execcmd (exec.c:2619)
==9485== by 0x428CA0: execpline2 (exec.c:1697)
==9485== by 0x427FD2: execpline (exec.c:1484)
==9485== by 0x427756: execlist (exec.c:1267)
==9485== by 0x42717C: execode (exec.c:1073)
==9485== by 0x431299: runshfunc (exec.c:5040)
==9485== by 0x430E76: doshfunc (exec.c:4920)
==9485== by 0x4302FB: execshfunc (exec.c:4557)
==9485== by 0x42D8C1: execcmd (exec.c:3373)
==9485==
==9485==
==9485== 2 errors in context 2 of 2:
==9485== Conditional jump or move depends on uninitialised value(s)
==9485== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9485== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9485== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9485== by 0x40EFC2: execbuiltin (builtin.c:450)
==9485== by 0x42D8E9: execcmd (exec.c:3378)
==9485== by 0x428CA0: execpline2 (exec.c:1697)
==9485== by 0x427FD2: execpline (exec.c:1484)
==9485== by 0x42779A: execlist (exec.c:1275)
==9485== by 0x42717C: execode (exec.c:1073)
==9485== by 0x431299: runshfunc (exec.c:5040)
==9485== by 0x430E76: doshfunc (exec.c:4920)
==9485== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9485==
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9395-- Caught __NR_exit; running __libc_freeres()
--9395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9395==
==9395== HEAP SUMMARY:
==9395== in use at exit: 3,115,144 bytes in 68,861 blocks
==9395== total heap usage: 935,521 allocs, 866,660 frees, 66,574,314 bytes allocated
==9395==
client request: code 4d430005, addr 0xFFEFE4DAC, len 4
==9395== Searching for pointers to 68,861 not-freed blocks
--9395-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9395-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9395-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9395-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9395-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9395-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9395-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9395-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9395-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9395-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9395-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9395-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9395-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9395-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9395-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9395-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9395-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9395-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9395-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9395-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9395-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9395-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9395-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9395-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9395-- Scanning root segment: 0x701a000..0x701afff (4096)
--9395-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9395-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9395-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9395-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9395-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9395-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9395-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9395-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9395-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9531== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9531-by-pythonnut-on-???
==9531== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9531-by-pythonnut-on-???
==9531== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9531-by-pythonnut-on-???
==9531==
==9531== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9531== don't want to do, unless you know exactly what you're doing,
==9531== or are doing some strange experiment):
==9531== /usr/lib/valgrind/../../bin/vgdb --pid=9531 ...command...
==9531==
==9531== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9531== /path/to/gdb ./zsh
==9531== and then give GDB the following command
==9531== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9531
==9531== --pid is optional if only one valgrind process is running
==9531==
--9531-- Caught __NR_exit; running __libc_freeres()
==9532== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9532-by-pythonnut-on-???
==9532== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9532-by-pythonnut-on-???
==9532== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9532-by-pythonnut-on-???
==9532==
==9532== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9532== don't want to do, unless you know exactly what you're doing,
==9532== or are doing some strange experiment):
==9532== /usr/lib/valgrind/../../bin/vgdb --pid=9532 ...command...
==9532==
==9532== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9532== /path/to/gdb ./zsh
==9532== and then give GDB the following command
==9532== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9532
==9532== --pid is optional if only one valgrind process is running
==9532==
==9533== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9533-by-pythonnut-on-???
==9533== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9533-by-pythonnut-on-???
==9533== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9533-by-pythonnut-on-???
==9533==
==9533== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9533== don't want to do, unless you know exactly what you're doing,
==9533== or are doing some strange experiment):
==9533== /usr/lib/valgrind/../../bin/vgdb --pid=9533 ...command...
==9533==
==9533== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9533== /path/to/gdb ./zsh
==9533== and then give GDB the following command
==9533== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9533
==9533== --pid is optional if only one valgrind process is running
==9533==
--9531-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9531==
client request: code 4d430005, addr 0xFFEFE56BC, len 4
==9531== HEAP SUMMARY:
==9531== in use at exit: 3,169,673 bytes in 70,004 blocks
==9531== total heap usage: 1,078,773 allocs, 1,008,769 frees, 73,660,110 bytes allocated
==9531==
==9531== Searching for pointers to 70,004 not-freed blocks
--9531-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9531-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9531-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9531-- Scanning root segment: 0x4037000..0x403afff (16384)
--9531-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9531-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9531-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9531-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9531-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9531-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9531-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9531-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9531-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9531-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9531-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9531-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9531-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9531-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9531-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9531-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9531-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9531-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9531-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9531-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9531-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9531-- Scanning root segment: 0x701a000..0x701afff (4096)
--9531-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9531-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9531-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9531-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9531-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9531-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9531-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9531-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9531-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9395== Checked 4,756,624 bytes
==9395==
==9395== LEAK SUMMARY:
==9395== definitely lost: 1,533 bytes in 8 blocks
==9395== indirectly lost: 6,756 bytes in 7 blocks
==9395== possibly lost: 0 bytes in 0 blocks
==9395== still reachable: 3,106,855 bytes in 68,846 blocks
==9395== suppressed: 0 bytes in 0 blocks
==9395== Rerun with --leak-check=full to see details of leaked memory
==9395==
==9395== Use --track-origins=yes to see where uninitialised values come from
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9395==
==9395== 1 errors in context 1 of 2:
==9395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9395== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9395== by 0x488CD0: stringsubst (subst.c:301)
==9395== by 0x48801B: prefork (subst.c:77)
==9395== by 0x42B318: execcmd (exec.c:2619)
==9395== by 0x428CA0: execpline2 (exec.c:1697)
==9395== by 0x427FD2: execpline (exec.c:1484)
==9395== by 0x427756: execlist (exec.c:1267)
==9395== by 0x42717C: execode (exec.c:1073)
==9395== by 0x431299: runshfunc (exec.c:5040)
==9395== by 0x430E76: doshfunc (exec.c:4920)
==9395== by 0x4302FB: execshfunc (exec.c:4557)
==9395== by 0x42D8C1: execcmd (exec.c:3373)
==9395==
==9395==
==9395== 2 errors in context 2 of 2:
==9395== Conditional jump or move depends on uninitialised value(s)
==9395== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9395== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9395== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9395== by 0x40EFC2: execbuiltin (builtin.c:450)
==9395== by 0x42D8E9: execcmd (exec.c:3378)
==9395== by 0x428CA0: execpline2 (exec.c:1697)
==9395== by 0x427FD2: execpline (exec.c:1484)
==9395== by 0x42779A: execlist (exec.c:1275)
==9395== by 0x42717C: execode (exec.c:1073)
==9395== by 0x431299: runshfunc (exec.c:5040)
==9395== by 0x430E76: doshfunc (exec.c:4920)
==9395== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9395==
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531== Checked 4,840,544 bytes
==9531==
==9531== LEAK SUMMARY:
==9531== definitely lost: 1,533 bytes in 8 blocks
==9531== indirectly lost: 6,756 bytes in 7 blocks
==9531== possibly lost: 0 bytes in 0 blocks
==9531== still reachable: 3,161,384 bytes in 69,989 blocks
==9531== suppressed: 0 bytes in 0 blocks
==9531== Rerun with --leak-check=full to see details of leaked memory
==9531==
==9531== Use --track-origins=yes to see where uninitialised values come from
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531==
==9531== 1 errors in context 1 of 2:
==9531== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9531== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9531== by 0x488CD0: stringsubst (subst.c:301)
==9531== by 0x48801B: prefork (subst.c:77)
==9531== by 0x42B318: execcmd (exec.c:2619)
==9531== by 0x428CA0: execpline2 (exec.c:1697)
==9531== by 0x427FD2: execpline (exec.c:1484)
==9531== by 0x427756: execlist (exec.c:1267)
==9531== by 0x42717C: execode (exec.c:1073)
==9531== by 0x431299: runshfunc (exec.c:5040)
==9531== by 0x430E76: doshfunc (exec.c:4920)
==9531== by 0x4302FB: execshfunc (exec.c:4557)
==9531== by 0x42D8C1: execcmd (exec.c:3373)
==9531==
==9531==
==9531== 2 errors in context 2 of 2:
==9531== Conditional jump or move depends on uninitialised value(s)
==9531== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9531== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9531== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9531== by 0x40EFC2: execbuiltin (builtin.c:450)
==9531== by 0x42D8E9: execcmd (exec.c:3378)
==9531== by 0x428CA0: execpline2 (exec.c:1697)
==9531== by 0x427FD2: execpline (exec.c:1484)
==9531== by 0x42779A: execlist (exec.c:1275)
==9531== by 0x42717C: execode (exec.c:1073)
==9531== by 0x431299: runshfunc (exec.c:5040)
==9531== by 0x430E76: doshfunc (exec.c:4920)
==9531== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9531==
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9562-by-pythonnut-on-???
==9562== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9562-by-pythonnut-on-???
==9562== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9562-by-pythonnut-on-???
==9562==
==9562== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9562== don't want to do, unless you know exactly what you're doing,
==9562== or are doing some strange experiment):
==9562== /usr/lib/valgrind/../../bin/vgdb --pid=9562 ...command...
==9562==
==9562== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9562== /path/to/gdb ./zsh
==9562== and then give GDB the following command
==9562== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9562
==9562== --pid is optional if only one valgrind process is running
==9562==
--9562-- Caught __NR_exit; running __libc_freeres()
--9562-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9562==
==9562== HEAP SUMMARY:
==9562== in use at exit: 3,265,454 bytes in 70,332 blocks
==9562== total heap usage: 1,421,328 allocs, 1,350,996 frees, 111,871,987 bytes allocated
==9562==
==9562== Searching for pointers to 70,332 not-freed blocks
--9562-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9562-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9562-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9562-- Scanning root segment: 0x4037000..0x403afff (16384)
--9562-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9562-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9562-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9562-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9562-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9562-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9562-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9562-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9562-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9562-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9562-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9562-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9562-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9562-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9562-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9562-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9562-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9562-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9562-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9562-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9562-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9562-- Scanning root segment: 0x701a000..0x701afff (4096)
--9562-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9562-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9562-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9562-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9562-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9562-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9562-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9562-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9562-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9562== Checked 4,929,784 bytes
==9562==
==9562== LEAK SUMMARY:
==9562== definitely lost: 1,533 bytes in 8 blocks
==9562== indirectly lost: 6,756 bytes in 7 blocks
==9562== possibly lost: 0 bytes in 0 blocks
==9562== still reachable: 3,257,165 bytes in 70,317 blocks
==9562== suppressed: 0 bytes in 0 blocks
==9562== Rerun with --leak-check=full to see details of leaked memory
==9562==
==9562== Use --track-origins=yes to see where uninitialised values come from
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562==
==9562== 1 errors in context 1 of 2:
==9562== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9562== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9562== by 0x488CD0: stringsubst (subst.c:301)
==9562== by 0x48801B: prefork (subst.c:77)
==9562== by 0x42B318: execcmd (exec.c:2619)
==9562== by 0x428CA0: execpline2 (exec.c:1697)
==9562== by 0x427FD2: execpline (exec.c:1484)
==9562== by 0x427756: execlist (exec.c:1267)
==9562== by 0x42717C: execode (exec.c:1073)
==9562== by 0x431299: runshfunc (exec.c:5040)
==9562== by 0x430E76: doshfunc (exec.c:4920)
==9562== by 0x4302FB: execshfunc (exec.c:4557)
==9562== by 0x42D8C1: execcmd (exec.c:3373)
==9562==
==9562==
==9562== 2 errors in context 2 of 2:
==9562== Conditional jump or move depends on uninitialised value(s)
==9562== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9562== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9562== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9562== by 0x40EFC2: execbuiltin (builtin.c:450)
==9562== by 0x42D8E9: execcmd (exec.c:3378)
==9562== by 0x428CA0: execpline2 (exec.c:1697)
==9562== by 0x427FD2: execpline (exec.c:1484)
==9562== by 0x42779A: execlist (exec.c:1275)
==9562== by 0x42717C: execode (exec.c:1073)
==9562== by 0x431299: runshfunc (exec.c:5040)
==9562== by 0x430E76: doshfunc (exec.c:4920)
==9562== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9562==
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9587-by-pythonnut-on-???
==9587== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9587-by-pythonnut-on-???
==9587== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9587-by-pythonnut-on-???
==9587==
==9587== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9587== don't want to do, unless you know exactly what you're doing,
==9587== or are doing some strange experiment):
==9587== /usr/lib/valgrind/../../bin/vgdb --pid=9587 ...command...
==9587==
==9587== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9587== /path/to/gdb ./zsh
==9587== and then give GDB the following command
==9587== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9587
==9587== --pid is optional if only one valgrind process is running
==9587==
--9587-- Caught __NR_exit; running __libc_freeres()
--9587-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9587==
==9587== HEAP SUMMARY:
==9587== in use at exit: 3,163,879 bytes in 69,874 blocks
==9587== total heap usage: 1,459,574 allocs, 1,389,700 frees, 117,370,069 bytes allocated
==9587==
==9587== Searching for pointers to 69,874 not-freed blocks
--9587-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9587-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9587-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9587-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9587-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9587-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9587-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9587-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9587-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9587-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9587-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9587-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9587-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9587-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9587-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9587-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9587-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9587-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9587-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9587-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9587-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9587-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9587-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9587-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9587-- Scanning root segment: 0x701a000..0x701afff (4096)
--9587-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9587-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9587-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9587-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9587-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9587-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9587-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9587-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9587-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9587== Checked 4,804,040 bytes
==9587==
==9587== LEAK SUMMARY:
==9587== definitely lost: 2,181 bytes in 11 blocks
==9587== indirectly lost: 6,756 bytes in 7 blocks
==9587== possibly lost: 0 bytes in 0 blocks
==9587== still reachable: 3,154,942 bytes in 69,856 blocks
==9587== suppressed: 0 bytes in 0 blocks
==9587== Rerun with --leak-check=full to see details of leaked memory
==9587==
==9587== Use --track-origins=yes to see where uninitialised values come from
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587==
==9587== 1 errors in context 1 of 2:
==9587== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9587== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9587== by 0x488CD0: stringsubst (subst.c:301)
==9587== by 0x48801B: prefork (subst.c:77)
==9587== by 0x42B318: execcmd (exec.c:2619)
==9587== by 0x428CA0: execpline2 (exec.c:1697)
==9587== by 0x427FD2: execpline (exec.c:1484)
==9587== by 0x427756: execlist (exec.c:1267)
==9587== by 0x42717C: execode (exec.c:1073)
==9587== by 0x431299: runshfunc (exec.c:5040)
==9587== by 0x430E76: doshfunc (exec.c:4920)
==9587== by 0x4302FB: execshfunc (exec.c:4557)
==9587== by 0x42D8C1: execcmd (exec.c:3373)
==9587==
==9587==
==9587== 2 errors in context 2 of 2:
==9587== Conditional jump or move depends on uninitialised value(s)
==9587== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9587== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9587== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9587== by 0x40EFC2: execbuiltin (builtin.c:450)
==9587== by 0x42D8E9: execcmd (exec.c:3378)
==9587== by 0x428CA0: execpline2 (exec.c:1697)
==9587== by 0x427FD2: execpline (exec.c:1484)
==9587== by 0x42779A: execlist (exec.c:1275)
==9587== by 0x42717C: execode (exec.c:1073)
==9587== by 0x431299: runshfunc (exec.c:5040)
==9587== by 0x430E76: doshfunc (exec.c:4920)
==9587== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9587==
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9588-by-pythonnut-on-???
==9588== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9588-by-pythonnut-on-???
==9588== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9588-by-pythonnut-on-???
==9588==
==9588== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9588== don't want to do, unless you know exactly what you're doing,
==9588== or are doing some strange experiment):
==9588== /usr/lib/valgrind/../../bin/vgdb --pid=9588 ...command...
==9588==
==9588== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9588== /path/to/gdb ./zsh
==9588== and then give GDB the following command
==9588== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9588
==9588== --pid is optional if only one valgrind process is running
==9588==
--9588-- Caught __NR_exit; running __libc_freeres()
--9588-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9588==
==9588== HEAP SUMMARY:
==9588== in use at exit: 3,163,686 bytes in 69,874 blocks
==9588== total heap usage: 1,459,581 allocs, 1,389,707 frees, 117,373,093 bytes allocated
==9588==
==9588== Searching for pointers to 69,874 not-freed blocks
--9588-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9588-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9588-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9588-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9588-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9588-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9588-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9588-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9588-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9588-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9588-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9588-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9588-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9588-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9588-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9588-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9588-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9588-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9588-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9588-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9588-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9588-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9588-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9588-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9588-- Scanning root segment: 0x701a000..0x701afff (4096)
--9588-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9588-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9588-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9588-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9588-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9588-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9588-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9588-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9588-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9588== Checked 4,805,200 bytes
==9588==
==9588== LEAK SUMMARY:
==9588== definitely lost: 2,181 bytes in 11 blocks
==9588== indirectly lost: 6,756 bytes in 7 blocks
==9588== possibly lost: 0 bytes in 0 blocks
==9588== still reachable: 3,154,749 bytes in 69,856 blocks
==9588== suppressed: 0 bytes in 0 blocks
==9588== Rerun with --leak-check=full to see details of leaked memory
==9588==
==9588== Use --track-origins=yes to see where uninitialised values come from
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588==
==9588== 1 errors in context 1 of 2:
==9588== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9588== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9588== by 0x488CD0: stringsubst (subst.c:301)
==9588== by 0x48801B: prefork (subst.c:77)
==9588== by 0x42B318: execcmd (exec.c:2619)
==9588== by 0x428CA0: execpline2 (exec.c:1697)
==9588== by 0x427FD2: execpline (exec.c:1484)
==9588== by 0x427756: execlist (exec.c:1267)
==9588== by 0x42717C: execode (exec.c:1073)
==9588== by 0x431299: runshfunc (exec.c:5040)
==9588== by 0x430E76: doshfunc (exec.c:4920)
==9588== by 0x4302FB: execshfunc (exec.c:4557)
==9588== by 0x42D8C1: execcmd (exec.c:3373)
==9588==
==9588==
==9588== 2 errors in context 2 of 2:
==9588== Conditional jump or move depends on uninitialised value(s)
==9588== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9588== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9588== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9588== by 0x40EFC2: execbuiltin (builtin.c:450)
==9588== by 0x42D8E9: execcmd (exec.c:3378)
==9588== by 0x428CA0: execpline2 (exec.c:1697)
==9588== by 0x427FD2: execpline (exec.c:1484)
==9588== by 0x42779A: execlist (exec.c:1275)
==9588== by 0x42717C: execode (exec.c:1073)
==9588== by 0x431299: runshfunc (exec.c:5040)
==9588== by 0x430E76: doshfunc (exec.c:4920)
==9588== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9588==
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9589-by-pythonnut-on-???
==9589== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9589-by-pythonnut-on-???
==9589== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9589-by-pythonnut-on-???
==9589==
==9589== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9589== don't want to do, unless you know exactly what you're doing,
==9589== or are doing some strange experiment):
==9589== /usr/lib/valgrind/../../bin/vgdb --pid=9589 ...command...
==9589==
==9589== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9589== /path/to/gdb ./zsh
==9589== and then give GDB the following command
==9589== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9589
==9589== --pid is optional if only one valgrind process is running
==9589==
--9590-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==9590== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9590-by-pythonnut-on-???
==9590== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9590-by-pythonnut-on-???
==9590== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9590-by-pythonnut-on-???
==9590==
==9590== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9590== don't want to do, unless you know exactly what you're doing,
==9590== or are doing some strange experiment):
==9590== /usr/lib/valgrind/../../bin/vgdb --pid=9590 ...command...
==9590==
==9590== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9590== /path/to/gdb ./zsh
==9590== and then give GDB the following command
==9590== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9590
==9590== --pid is optional if only one valgrind process is running
==9590==
--9590-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9590==
==9590== HEAP SUMMARY:
==9590== in use at exit: 3,160,885 bytes in 69,804 blocks
==9590== total heap usage: 1,459,798 allocs, 1,389,994 frees, 117,397,470 bytes allocated
==9590==
==9590== Searching for pointers to 69,804 not-freed blocks
--9590-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9590-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9590-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9590-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9590-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9590-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9590-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9590-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9590-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9590-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9590-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9590-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9590-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9590-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9590-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9590-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9590-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9590-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9590-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9590-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9590-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9590-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9590-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9590-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9590-- Scanning root segment: 0x701a000..0x701afff (4096)
--9590-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9590-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9590-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9590-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9590-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9590-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9590-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9590-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9590-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9590== Checked 4,798,464 bytes
==9590==
==9590== LEAK SUMMARY:
==9590== definitely lost: 2,181 bytes in 11 blocks
==9590== indirectly lost: 6,756 bytes in 7 blocks
==9590== possibly lost: 0 bytes in 0 blocks
==9590== still reachable: 3,151,948 bytes in 69,786 blocks
==9590== suppressed: 0 bytes in 0 blocks
==9590== Rerun with --leak-check=full to see details of leaked memory
==9590==
==9590== Use --track-origins=yes to see where uninitialised values come from
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9590==
==9590== 1 errors in context 1 of 2:
==9590== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9590== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9590== by 0x488CD0: stringsubst (subst.c:301)
==9590== by 0x48801B: prefork (subst.c:77)
==9590== by 0x42B318: execcmd (exec.c:2619)
==9590== by 0x428CA0: execpline2 (exec.c:1697)
==9590== by 0x427FD2: execpline (exec.c:1484)
==9590== by 0x427756: execlist (exec.c:1267)
==9590== by 0x42717C: execode (exec.c:1073)
==9590== by 0x431299: runshfunc (exec.c:5040)
==9590== by 0x430E76: doshfunc (exec.c:4920)
==9590== by 0x4302FB: execshfunc (exec.c:4557)
==9590== by 0x42D8C1: execcmd (exec.c:3373)
==9590==
==9590==
==9590== 2 errors in context 2 of 2:
==9590== Conditional jump or move depends on uninitialised value(s)
==9590== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9590== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9590== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9590== by 0x40EFC2: execbuiltin (builtin.c:450)
==9590== by 0x42D8E9: execcmd (exec.c:3378)
==9590== by 0x428CA0: execpline2 (exec.c:1697)
==9590== by 0x427FD2: execpline (exec.c:1484)
==9590== by 0x42779A: execlist (exec.c:1275)
==9590== by 0x42717C: execode (exec.c:1073)
==9590== by 0x431299: runshfunc (exec.c:5040)
==9590== by 0x430E76: doshfunc (exec.c:4920)
==9590== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9590==
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9589-- Caught __NR_exit; running __libc_freeres()
--9589-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9589==
==9589== HEAP SUMMARY:
==9589== in use at exit: 3,160,821 bytes in 69,801 blocks
==9589== total heap usage: 1,459,796 allocs, 1,389,995 frees, 117,397,229 bytes allocated
==9589==
==9589== Searching for pointers to 69,801 not-freed blocks
--9589-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9589-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9589-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9589-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9589-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9589-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9589-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9589-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9589-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9589-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9589-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9589-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9589-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9589-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9589-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9589-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9589-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9589-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9589-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9589-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9589-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9589-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9589-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9589-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9589-- Scanning root segment: 0x701a000..0x701afff (4096)
--9589-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9589-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9589-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9589-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9589-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9589-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9589-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9589-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9589-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9589== Checked 4,797,776 bytes
==9589==
==9589== LEAK SUMMARY:
==9589== definitely lost: 2,181 bytes in 11 blocks
==9589== indirectly lost: 6,756 bytes in 7 blocks
==9589== possibly lost: 0 bytes in 0 blocks
==9589== still reachable: 3,151,884 bytes in 69,783 blocks
==9589== suppressed: 0 bytes in 0 blocks
==9589== Rerun with --leak-check=full to see details of leaked memory
==9589==
==9589== Use --track-origins=yes to see where uninitialised values come from
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589==
==9589== 1 errors in context 1 of 2:
==9589== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9589== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9589== by 0x488CD0: stringsubst (subst.c:301)
==9589== by 0x48801B: prefork (subst.c:77)
==9589== by 0x42B318: execcmd (exec.c:2619)
==9589== by 0x428CA0: execpline2 (exec.c:1697)
==9589== by 0x427FD2: execpline (exec.c:1484)
==9589== by 0x427756: execlist (exec.c:1267)
==9589== by 0x42717C: execode (exec.c:1073)
==9589== by 0x431299: runshfunc (exec.c:5040)
==9589== by 0x430E76: doshfunc (exec.c:4920)
==9589== by 0x4302FB: execshfunc (exec.c:4557)
==9589== by 0x42D8C1: execcmd (exec.c:3373)
==9589==
==9589==
==9589== 2 errors in context 2 of 2:
==9589== Conditional jump or move depends on uninitialised value(s)
==9589== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9589== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9589== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9589== by 0x40EFC2: execbuiltin (builtin.c:450)
==9589== by 0x42D8E9: execcmd (exec.c:3378)
==9589== by 0x428CA0: execpline2 (exec.c:1697)
==9589== by 0x427FD2: execpline (exec.c:1484)
==9589== by 0x42779A: execlist (exec.c:1275)
==9589== by 0x42717C: execode (exec.c:1073)
==9589== by 0x431299: runshfunc (exec.c:5040)
==9589== by 0x430E76: doshfunc (exec.c:4920)
==9589== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9589==
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9594-- Caught __NR_exit; running __libc_freeres()
==9594== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9594-by-pythonnut-on-???
==9594== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9594-by-pythonnut-on-???
==9594== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9594-by-pythonnut-on-???
==9594==
==9594== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9594== don't want to do, unless you know exactly what you're doing,
==9594== or are doing some strange experiment):
==9594== /usr/lib/valgrind/../../bin/vgdb --pid=9594 ...command...
==9594==
==9594== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9594== /path/to/gdb ./zsh
==9594== and then give GDB the following command
==9594== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9594
==9594== --pid is optional if only one valgrind process is running
==9594==
--9594-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9594==
==9594== HEAP SUMMARY:
==9594== in use at exit: 3,160,828 bytes in 69,801 blocks
==9594== total heap usage: 1,459,811 allocs, 1,390,010 frees, 117,402,227 bytes allocated
==9594==
==9594== Searching for pointers to 69,801 not-freed blocks
--9594-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9594-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9594-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9594-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9594-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9594-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9594-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9594-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9594-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9594-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9594-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9594-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9594-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9594-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9594-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9594-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9594-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9594-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9594-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9594-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9594-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9594-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9594-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9594-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9594-- Scanning root segment: 0x701a000..0x701afff (4096)
--9594-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9594-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9594-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9594-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9594-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9594-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9594-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9594-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9594-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9594== Checked 4,797,912 bytes
==9594==
==9594== LEAK SUMMARY:
==9594== definitely lost: 2,181 bytes in 11 blocks
==9594== indirectly lost: 6,756 bytes in 7 blocks
==9594== possibly lost: 0 bytes in 0 blocks
==9594== still reachable: 3,151,891 bytes in 69,783 blocks
==9594== suppressed: 0 bytes in 0 blocks
==9594== Rerun with --leak-check=full to see details of leaked memory
==9594==
==9594== Use --track-origins=yes to see where uninitialised values come from
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9594==
==9594== 1 errors in context 1 of 2:
==9594== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9594== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9594== by 0x488CD0: stringsubst (subst.c:301)
==9594== by 0x48801B: prefork (subst.c:77)
==9594== by 0x42B318: execcmd (exec.c:2619)
==9594== by 0x428CA0: execpline2 (exec.c:1697)
==9594== by 0x427FD2: execpline (exec.c:1484)
==9594== by 0x427756: execlist (exec.c:1267)
==9594== by 0x42717C: execode (exec.c:1073)
==9594== by 0x431299: runshfunc (exec.c:5040)
==9594== by 0x430E76: doshfunc (exec.c:4920)
==9594== by 0x4302FB: execshfunc (exec.c:4557)
==9594== by 0x42D8C1: execcmd (exec.c:3373)
==9594==
==9594==
==9594== 2 errors in context 2 of 2:
==9594== Conditional jump or move depends on uninitialised value(s)
==9594== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9594== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9594== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9594== by 0x40EFC2: execbuiltin (builtin.c:450)
==9594== by 0x42D8E9: execcmd (exec.c:3378)
==9594== by 0x428CA0: execpline2 (exec.c:1697)
==9594== by 0x427FD2: execpline (exec.c:1484)
==9594== by 0x42779A: execlist (exec.c:1275)
==9594== by 0x42717C: execode (exec.c:1073)
==9594== by 0x431299: runshfunc (exec.c:5040)
==9594== by 0x430E76: doshfunc (exec.c:4920)
==9594== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9594==
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9595-- Caught __NR_exit; running __libc_freeres()
==9595== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9595-by-pythonnut-on-???
==9595== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9595-by-pythonnut-on-???
==9595== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9595-by-pythonnut-on-???
==9595==
==9595== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9595== don't want to do, unless you know exactly what you're doing,
==9595== or are doing some strange experiment):
==9595== /usr/lib/valgrind/../../bin/vgdb --pid=9595 ...command...
==9595==
==9595== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9595== /path/to/gdb ./zsh
==9595== and then give GDB the following command
==9595== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9595
==9595== --pid is optional if only one valgrind process is running
==9595==
--9595-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9595==
==9595== HEAP SUMMARY:
==9595== in use at exit: 3,160,924 bytes in 69,801 blocks
==9595== total heap usage: 1,459,827 allocs, 1,390,026 frees, 117,407,014 bytes allocated
==9595==
==9595== Searching for pointers to 69,801 not-freed blocks
--9595-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9595-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9595-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9595-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9595-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9595-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9595-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9595-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9595-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9595-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9595-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9595-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9595-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9595-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9595-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9595-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9595-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9595-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9595-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9595-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9595-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9595-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9595-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9595-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9595-- Scanning root segment: 0x701a000..0x701afff (4096)
--9595-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9595-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9595-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9595-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9595-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9595-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9595-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9595-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9595-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9595== Checked 4,797,192 bytes
==9595==
==9595== LEAK SUMMARY:
==9595== definitely lost: 2,181 bytes in 11 blocks
==9595== indirectly lost: 6,756 bytes in 7 blocks
==9595== possibly lost: 0 bytes in 0 blocks
==9595== still reachable: 3,151,987 bytes in 69,783 blocks
==9595== suppressed: 0 bytes in 0 blocks
==9595== Rerun with --leak-check=full to see details of leaked memory
==9595==
==9595== Use --track-origins=yes to see where uninitialised values come from
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9595==
==9595== 1 errors in context 1 of 2:
==9595== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9595== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9595== by 0x488CD0: stringsubst (subst.c:301)
==9595== by 0x48801B: prefork (subst.c:77)
==9595== by 0x42B318: execcmd (exec.c:2619)
==9595== by 0x428CA0: execpline2 (exec.c:1697)
==9595== by 0x427FD2: execpline (exec.c:1484)
==9595== by 0x427756: execlist (exec.c:1267)
==9595== by 0x42717C: execode (exec.c:1073)
==9595== by 0x431299: runshfunc (exec.c:5040)
==9595== by 0x430E76: doshfunc (exec.c:4920)
==9595== by 0x4302FB: execshfunc (exec.c:4557)
==9595== by 0x42D8C1: execcmd (exec.c:3373)
==9595==
==9595==
==9595== 2 errors in context 2 of 2:
==9595== Conditional jump or move depends on uninitialised value(s)
==9595== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9595== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9595== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9595== by 0x40EFC2: execbuiltin (builtin.c:450)
==9595== by 0x42D8E9: execcmd (exec.c:3378)
==9595== by 0x428CA0: execpline2 (exec.c:1697)
==9595== by 0x427FD2: execpline (exec.c:1484)
==9595== by 0x42779A: execlist (exec.c:1275)
==9595== by 0x42717C: execode (exec.c:1073)
==9595== by 0x431299: runshfunc (exec.c:5040)
==9595== by 0x430E76: doshfunc (exec.c:4920)
==9595== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9595==
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9596-by-pythonnut-on-???
==9596== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9596-by-pythonnut-on-???
==9596== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9596-by-pythonnut-on-???
==9596==
==9596== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9596== don't want to do, unless you know exactly what you're doing,
==9596== or are doing some strange experiment):
==9596== /usr/lib/valgrind/../../bin/vgdb --pid=9596 ...command...
==9596==
==9596== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9596== /path/to/gdb ./zsh
==9596== and then give GDB the following command
==9596== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9596
==9596== --pid is optional if only one valgrind process is running
==9596==
--9596-- Caught __NR_exit; running __libc_freeres()
--9596-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9596==
==9596== HEAP SUMMARY:
==9596== in use at exit: 3,161,170 bytes in 69,807 blocks
==9596== total heap usage: 1,459,875 allocs, 1,390,068 frees, 117,416,038 bytes allocated
==9596==
==9596== Searching for pointers to 69,807 not-freed blocks
--9596-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9596-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9596-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9596-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9596-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9596-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9596-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9596-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9596-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9596-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9596-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9596-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9596-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9596-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9596-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9596-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9596-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9596-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9596-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9596-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9596-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9596-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9596-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9596-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9596-- Scanning root segment: 0x701a000..0x701afff (4096)
--9596-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9596-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9596-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9596-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9596-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9596-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9596-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9596-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9596-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9596== Checked 4,797,368 bytes
==9596==
==9596== LEAK SUMMARY:
==9596== definitely lost: 2,181 bytes in 11 blocks
==9596== indirectly lost: 6,756 bytes in 7 blocks
==9596== possibly lost: 0 bytes in 0 blocks
==9596== still reachable: 3,152,233 bytes in 69,789 blocks
==9596== suppressed: 0 bytes in 0 blocks
==9596== Rerun with --leak-check=full to see details of leaked memory
==9596==
==9596== Use --track-origins=yes to see where uninitialised values come from
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596==
==9596== 1 errors in context 1 of 2:
==9596== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9596== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9596== by 0x488CD0: stringsubst (subst.c:301)
==9596== by 0x48801B: prefork (subst.c:77)
==9596== by 0x42B318: execcmd (exec.c:2619)
==9596== by 0x428CA0: execpline2 (exec.c:1697)
==9596== by 0x427FD2: execpline (exec.c:1484)
==9596== by 0x427756: execlist (exec.c:1267)
==9596== by 0x42717C: execode (exec.c:1073)
==9596== by 0x431299: runshfunc (exec.c:5040)
==9596== by 0x430E76: doshfunc (exec.c:4920)
==9596== by 0x4302FB: execshfunc (exec.c:4557)
==9596== by 0x42D8C1: execcmd (exec.c:3373)
==9596==
==9596==
==9596== 2 errors in context 2 of 2:
==9596== Conditional jump or move depends on uninitialised value(s)
==9596== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9596== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9596== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9596== by 0x40EFC2: execbuiltin (builtin.c:450)
==9596== by 0x42D8E9: execcmd (exec.c:3378)
==9596== by 0x428CA0: execpline2 (exec.c:1697)
==9596== by 0x427FD2: execpline (exec.c:1484)
==9596== by 0x42779A: execlist (exec.c:1275)
==9596== by 0x42717C: execode (exec.c:1073)
==9596== by 0x431299: runshfunc (exec.c:5040)
==9596== by 0x430E76: doshfunc (exec.c:4920)
==9596== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9596==
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9597-- Caught __NR_exit; running __libc_freeres()
==9597== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9597-by-pythonnut-on-???
==9597== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9597-by-pythonnut-on-???
==9597== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9597-by-pythonnut-on-???
==9597==
==9597== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9597== don't want to do, unless you know exactly what you're doing,
==9597== or are doing some strange experiment):
==9597== /usr/lib/valgrind/../../bin/vgdb --pid=9597 ...command...
==9597==
==9597== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9597== /path/to/gdb ./zsh
==9597== and then give GDB the following command
==9597== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9597
==9597== --pid is optional if only one valgrind process is running
==9597==
--9597-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9597==
==9597== HEAP SUMMARY:
==9597== in use at exit: 3,161,106 bytes in 69,807 blocks
==9597== total heap usage: 1,459,855 allocs, 1,390,048 frees, 117,413,808 bytes allocated
==9597==
==9597== Searching for pointers to 69,807 not-freed blocks
--9597-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9597-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9597-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9597-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9597-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9597-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9597-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9597-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9597-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9597-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9597-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9597-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9597-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9597-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9597-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9597-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9597-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9597-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9597-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9597-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9597-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9597-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9597-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9597-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9597-- Scanning root segment: 0x701a000..0x701afff (4096)
--9597-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9597-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9597-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9597-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9597-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9597-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9597-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9597-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9597-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9597== Checked 4,797,288 bytes
==9597==
==9597== LEAK SUMMARY:
==9597== definitely lost: 2,181 bytes in 11 blocks
==9597== indirectly lost: 6,756 bytes in 7 blocks
==9597== possibly lost: 0 bytes in 0 blocks
==9597== still reachable: 3,152,169 bytes in 69,789 blocks
==9597== suppressed: 0 bytes in 0 blocks
==9597== Rerun with --leak-check=full to see details of leaked memory
==9597==
==9597== Use --track-origins=yes to see where uninitialised values come from
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9597==
==9597== 1 errors in context 1 of 2:
==9597== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9597== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9597== by 0x488CD0: stringsubst (subst.c:301)
==9597== by 0x48801B: prefork (subst.c:77)
==9597== by 0x42B318: execcmd (exec.c:2619)
==9597== by 0x428CA0: execpline2 (exec.c:1697)
==9597== by 0x427FD2: execpline (exec.c:1484)
==9597== by 0x427756: execlist (exec.c:1267)
==9597== by 0x42717C: execode (exec.c:1073)
==9597== by 0x431299: runshfunc (exec.c:5040)
==9597== by 0x430E76: doshfunc (exec.c:4920)
==9597== by 0x4302FB: execshfunc (exec.c:4557)
==9597== by 0x42D8C1: execcmd (exec.c:3373)
==9597==
==9597==
==9597== 2 errors in context 2 of 2:
==9597== Conditional jump or move depends on uninitialised value(s)
==9597== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9597== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9597== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9597== by 0x40EFC2: execbuiltin (builtin.c:450)
==9597== by 0x42D8E9: execcmd (exec.c:3378)
==9597== by 0x428CA0: execpline2 (exec.c:1697)
==9597== by 0x427FD2: execpline (exec.c:1484)
==9597== by 0x42779A: execlist (exec.c:1275)
==9597== by 0x42717C: execode (exec.c:1073)
==9597== by 0x431299: runshfunc (exec.c:5040)
==9597== by 0x430E76: doshfunc (exec.c:4920)
==9597== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9597==
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9598-by-pythonnut-on-???
==9598== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9598-by-pythonnut-on-???
==9598== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9598-by-pythonnut-on-???
==9598==
==9598== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9598== don't want to do, unless you know exactly what you're doing,
==9598== or are doing some strange experiment):
==9598== /usr/lib/valgrind/../../bin/vgdb --pid=9598 ...command...
==9598==
==9598== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9598== /path/to/gdb ./zsh
==9598== and then give GDB the following command
==9598== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9598
==9598== --pid is optional if only one valgrind process is running
==9598==
--9598-- Caught __NR_exit; running __libc_freeres()
--9598-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9598==
==9598== HEAP SUMMARY:
==9598== in use at exit: 3,161,144 bytes in 69,808 blocks
==9598== total heap usage: 1,459,868 allocs, 1,390,060 frees, 117,416,505 bytes allocated
==9598==
==9598== Searching for pointers to 69,808 not-freed blocks
--9598-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9598-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9598-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9598-- Scanning root segment: 0x4037000..0x403afff (16384)
--9598-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9598-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9598-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9598-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9598-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9598-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9598-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9598-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9598-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9598-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9598-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9598-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9598-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9598-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9598-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9598-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9598-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9598-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9598-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9598-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9598-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9598-- Scanning root segment: 0x701a000..0x701afff (4096)
--9598-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9598-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9598-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9598-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9598-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9598-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9598-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9598-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9598-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9598== Checked 4,813,192 bytes
==9598==
==9598== LEAK SUMMARY:
==9598== definitely lost: 2,181 bytes in 11 blocks
==9598== indirectly lost: 6,756 bytes in 7 blocks
==9598== possibly lost: 0 bytes in 0 blocks
==9598== still reachable: 3,152,207 bytes in 69,790 blocks
==9598== suppressed: 0 bytes in 0 blocks
==9598== Rerun with --leak-check=full to see details of leaked memory
==9598==
==9598== Use --track-origins=yes to see where uninitialised values come from
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598==
==9598== 1 errors in context 1 of 2:
==9598== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9598== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9598== by 0x488CD0: stringsubst (subst.c:301)
==9598== by 0x48801B: prefork (subst.c:77)
==9598== by 0x42B318: execcmd (exec.c:2619)
==9598== by 0x428CA0: execpline2 (exec.c:1697)
==9598== by 0x427FD2: execpline (exec.c:1484)
==9598== by 0x427756: execlist (exec.c:1267)
==9598== by 0x42717C: execode (exec.c:1073)
==9598== by 0x431299: runshfunc (exec.c:5040)
==9598== by 0x430E76: doshfunc (exec.c:4920)
==9598== by 0x4302FB: execshfunc (exec.c:4557)
==9598== by 0x42D8C1: execcmd (exec.c:3373)
==9598==
==9598==
==9598== 2 errors in context 2 of 2:
==9598== Conditional jump or move depends on uninitialised value(s)
==9598== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9598== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9598== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9598== by 0x40EFC2: execbuiltin (builtin.c:450)
==9598== by 0x42D8E9: execcmd (exec.c:3378)
==9598== by 0x428CA0: execpline2 (exec.c:1697)
==9598== by 0x427FD2: execpline (exec.c:1484)
==9598== by 0x42779A: execlist (exec.c:1275)
==9598== by 0x42717C: execode (exec.c:1073)
==9598== by 0x431299: runshfunc (exec.c:5040)
==9598== by 0x430E76: doshfunc (exec.c:4920)
==9598== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9598==
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9601-by-pythonnut-on-???
==9601== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9601-by-pythonnut-on-???
==9601== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9601-by-pythonnut-on-???
==9601==
==9601== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9601== don't want to do, unless you know exactly what you're doing,
==9601== or are doing some strange experiment):
==9601== /usr/lib/valgrind/../../bin/vgdb --pid=9601 ...command...
==9601==
==9601== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9601== /path/to/gdb ./zsh
==9601== and then give GDB the following command
==9601== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9601
==9601== --pid is optional if only one valgrind process is running
==9601==
--9601-- Caught __NR_exit; running __libc_freeres()
--9601-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9601==
==9601== HEAP SUMMARY:
==9601== in use at exit: 3,164,305 bytes in 69,925 blocks
==9601== total heap usage: 1,462,141 allocs, 1,392,216 frees, 117,544,731 bytes allocated
==9601==
==9601== Searching for pointers to 69,925 not-freed blocks
--9601-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9601-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9601-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9601-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9601-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9601-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9601-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9601-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9601-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9601-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9601-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9601-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9601-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9601-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9601-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9601-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9601-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9601-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9601-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9601-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9601-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9601-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9601-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9601-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9601-- Scanning root segment: 0x701a000..0x701afff (4096)
--9601-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9601-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9601-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9601-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9601-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9601-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9601-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9601-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9601-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9601== Checked 4,807,224 bytes
==9601==
==9601== LEAK SUMMARY:
==9601== definitely lost: 2,181 bytes in 11 blocks
==9601== indirectly lost: 6,756 bytes in 7 blocks
==9601== possibly lost: 0 bytes in 0 blocks
==9601== still reachable: 3,155,368 bytes in 69,907 blocks
==9601== suppressed: 0 bytes in 0 blocks
==9601== Rerun with --leak-check=full to see details of leaked memory
==9601==
==9601== Use --track-origins=yes to see where uninitialised values come from
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601==
==9601== 1 errors in context 1 of 2:
==9601== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9601== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9601== by 0x488CD0: stringsubst (subst.c:301)
==9601== by 0x48801B: prefork (subst.c:77)
==9601== by 0x42B318: execcmd (exec.c:2619)
==9601== by 0x428CA0: execpline2 (exec.c:1697)
==9601== by 0x427FD2: execpline (exec.c:1484)
==9601== by 0x427756: execlist (exec.c:1267)
==9601== by 0x42717C: execode (exec.c:1073)
==9601== by 0x431299: runshfunc (exec.c:5040)
==9601== by 0x430E76: doshfunc (exec.c:4920)
==9601== by 0x4302FB: execshfunc (exec.c:4557)
==9601== by 0x42D8C1: execcmd (exec.c:3373)
==9601==
==9601==
==9601== 2 errors in context 2 of 2:
==9601== Conditional jump or move depends on uninitialised value(s)
==9601== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9601== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9601== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9601== by 0x40EFC2: execbuiltin (builtin.c:450)
==9601== by 0x42D8E9: execcmd (exec.c:3378)
==9601== by 0x428CA0: execpline2 (exec.c:1697)
==9601== by 0x427FD2: execpline (exec.c:1484)
==9601== by 0x42779A: execlist (exec.c:1275)
==9601== by 0x42717C: execode (exec.c:1073)
==9601== by 0x431299: runshfunc (exec.c:5040)
==9601== by 0x430E76: doshfunc (exec.c:4920)
==9601== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9601==
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9602-by-pythonnut-on-???
==9602== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9602-by-pythonnut-on-???
==9602== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9602-by-pythonnut-on-???
==9602==
==9602== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9602== don't want to do, unless you know exactly what you're doing,
==9602== or are doing some strange experiment):
==9602== /usr/lib/valgrind/../../bin/vgdb --pid=9602 ...command...
==9602==
==9602== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9602== /path/to/gdb ./zsh
==9602== and then give GDB the following command
==9602== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9602
==9602== --pid is optional if only one valgrind process is running
==9602==
--9602-- Caught __NR_exit; running __libc_freeres()
--9602-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9602==
==9602== HEAP SUMMARY:
==9602== in use at exit: 3,164,449 bytes in 69,925 blocks
==9602== total heap usage: 1,462,148 allocs, 1,392,223 frees, 117,547,759 bytes allocated
==9602==
==9602== Searching for pointers to 69,925 not-freed blocks
--9602-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9602-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9602-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9602-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9602-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9602-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9602-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9602-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9602-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9602-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9602-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9602-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9602-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9602-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9602-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9602-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9602-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9602-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9602-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9602-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9602-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9602-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9602-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9602-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9602-- Scanning root segment: 0x701a000..0x701afff (4096)
--9602-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9602-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9602-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9602-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9602-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9602-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9602-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9602-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9602-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9602== Checked 4,808,728 bytes
==9602==
==9602== LEAK SUMMARY:
==9602== definitely lost: 2,181 bytes in 11 blocks
==9602== indirectly lost: 6,756 bytes in 7 blocks
==9602== possibly lost: 0 bytes in 0 blocks
==9602== still reachable: 3,155,512 bytes in 69,907 blocks
==9602== suppressed: 0 bytes in 0 blocks
==9602== Rerun with --leak-check=full to see details of leaked memory
==9602==
==9602== Use --track-origins=yes to see where uninitialised values come from
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602==
==9602== 1 errors in context 1 of 2:
==9602== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9602== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9602== by 0x488CD0: stringsubst (subst.c:301)
==9602== by 0x48801B: prefork (subst.c:77)
==9602== by 0x42B318: execcmd (exec.c:2619)
==9602== by 0x428CA0: execpline2 (exec.c:1697)
==9602== by 0x427FD2: execpline (exec.c:1484)
==9602== by 0x427756: execlist (exec.c:1267)
==9602== by 0x42717C: execode (exec.c:1073)
==9602== by 0x431299: runshfunc (exec.c:5040)
==9602== by 0x430E76: doshfunc (exec.c:4920)
==9602== by 0x4302FB: execshfunc (exec.c:4557)
==9602== by 0x42D8C1: execcmd (exec.c:3373)
==9602==
==9602==
==9602== 2 errors in context 2 of 2:
==9602== Conditional jump or move depends on uninitialised value(s)
==9602== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9602== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9602== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9602== by 0x40EFC2: execbuiltin (builtin.c:450)
==9602== by 0x42D8E9: execcmd (exec.c:3378)
==9602== by 0x428CA0: execpline2 (exec.c:1697)
==9602== by 0x427FD2: execpline (exec.c:1484)
==9602== by 0x42779A: execlist (exec.c:1275)
==9602== by 0x42717C: execode (exec.c:1073)
==9602== by 0x431299: runshfunc (exec.c:5040)
==9602== by 0x430E76: doshfunc (exec.c:4920)
==9602== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9602==
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9603-by-pythonnut-on-???
==9603== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9603-by-pythonnut-on-???
==9603== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9603-by-pythonnut-on-???
==9603==
==9603== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9603== don't want to do, unless you know exactly what you're doing,
==9603== or are doing some strange experiment):
==9603== /usr/lib/valgrind/../../bin/vgdb --pid=9603 ...command...
==9603==
==9603== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9603== /path/to/gdb ./zsh
==9603== and then give GDB the following command
==9603== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9603
==9603== --pid is optional if only one valgrind process is running
==9603==
--9603-- Caught __NR_exit; running __libc_freeres()
--9603-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9603==
==9603== HEAP SUMMARY:
==9603== in use at exit: 3,161,165 bytes in 69,837 blocks
==9603== total heap usage: 1,462,376 allocs, 1,392,539 frees, 117,577,503 bytes allocated
==9603==
==9603== Searching for pointers to 69,837 not-freed blocks
--9603-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9603-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9603-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9603-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9603-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9603-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9603-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9603-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9603-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9603-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9603-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9603-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9603-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9603-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9603-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9603-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9603-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9603-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9603-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9603-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9603-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9603-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9603-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9603-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9603-- Scanning root segment: 0x701a000..0x701afff (4096)
--9603-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9603-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9603-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9603-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9603-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9603-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9603-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9603-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9603-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9603== Checked 4,799,480 bytes
==9603==
==9603== LEAK SUMMARY:
==9603== definitely lost: 2,181 bytes in 11 blocks
==9603== indirectly lost: 6,756 bytes in 7 blocks
==9603== possibly lost: 0 bytes in 0 blocks
==9603== still reachable: 3,152,228 bytes in 69,819 blocks
==9603== suppressed: 0 bytes in 0 blocks
==9603== Rerun with --leak-check=full to see details of leaked memory
==9603==
==9603== Use --track-origins=yes to see where uninitialised values come from
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603==
==9603== 1 errors in context 1 of 2:
==9603== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9603== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9603== by 0x488CD0: stringsubst (subst.c:301)
==9603== by 0x48801B: prefork (subst.c:77)
==9603== by 0x42B318: execcmd (exec.c:2619)
==9603== by 0x428CA0: execpline2 (exec.c:1697)
==9603== by 0x427FD2: execpline (exec.c:1484)
==9603== by 0x427756: execlist (exec.c:1267)
==9603== by 0x42717C: execode (exec.c:1073)
==9603== by 0x431299: runshfunc (exec.c:5040)
==9603== by 0x430E76: doshfunc (exec.c:4920)
==9603== by 0x4302FB: execshfunc (exec.c:4557)
==9603== by 0x42D8C1: execcmd (exec.c:3373)
==9603==
==9603==
==9603== 2 errors in context 2 of 2:
==9603== Conditional jump or move depends on uninitialised value(s)
==9603== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9603== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9603== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9603== by 0x40EFC2: execbuiltin (builtin.c:450)
==9603== by 0x42D8E9: execcmd (exec.c:3378)
==9603== by 0x428CA0: execpline2 (exec.c:1697)
==9603== by 0x427FD2: execpline (exec.c:1484)
==9603== by 0x42779A: execlist (exec.c:1275)
==9603== by 0x42717C: execode (exec.c:1073)
==9603== by 0x431299: runshfunc (exec.c:5040)
==9603== by 0x430E76: doshfunc (exec.c:4920)
==9603== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9603==
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9604-- Caught __NR_exit; running __libc_freeres()
==9604== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9604-by-pythonnut-on-???
==9604== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9604-by-pythonnut-on-???
==9604== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9604-by-pythonnut-on-???
==9604==
==9604== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9604== don't want to do, unless you know exactly what you're doing,
==9604== or are doing some strange experiment):
==9604== /usr/lib/valgrind/../../bin/vgdb --pid=9604 ...command...
==9604==
==9604== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9604== /path/to/gdb ./zsh
==9604== and then give GDB the following command
==9604== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9604
==9604== --pid is optional if only one valgrind process is running
==9604==
--9604-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9604==
==9604== HEAP SUMMARY:
==9604== in use at exit: 3,161,229 bytes in 69,837 blocks
==9604== total heap usage: 1,462,382 allocs, 1,392,545 frees, 117,586,079 bytes allocated
==9604==
==9604== Searching for pointers to 69,837 not-freed blocks
--9604-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9604-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9604-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9604-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9604-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9604-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9604-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9604-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9604-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9604-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9604-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9604-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9604-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9604-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9604-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9604-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9604-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9604-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9604-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9604-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9604-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9604-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9604-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9604-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9604-- Scanning root segment: 0x701a000..0x701afff (4096)
--9604-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9604-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9604-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9604-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9604-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9604-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9604-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9604-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9604-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9604== Checked 4,801,568 bytes
==9604==
==9604== LEAK SUMMARY:
==9604== definitely lost: 2,181 bytes in 11 blocks
==9604== indirectly lost: 6,756 bytes in 7 blocks
==9604== possibly lost: 0 bytes in 0 blocks
==9604== still reachable: 3,152,292 bytes in 69,819 blocks
==9604== suppressed: 0 bytes in 0 blocks
==9604== Rerun with --leak-check=full to see details of leaked memory
==9604==
==9604== Use --track-origins=yes to see where uninitialised values come from
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9604==
==9604== 1 errors in context 1 of 2:
==9604== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9604== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9604== by 0x488CD0: stringsubst (subst.c:301)
==9604== by 0x48801B: prefork (subst.c:77)
==9604== by 0x42B318: execcmd (exec.c:2619)
==9604== by 0x428CA0: execpline2 (exec.c:1697)
==9604== by 0x427FD2: execpline (exec.c:1484)
==9604== by 0x427756: execlist (exec.c:1267)
==9604== by 0x42717C: execode (exec.c:1073)
==9604== by 0x431299: runshfunc (exec.c:5040)
==9604== by 0x430E76: doshfunc (exec.c:4920)
==9604== by 0x4302FB: execshfunc (exec.c:4557)
==9604== by 0x42D8C1: execcmd (exec.c:3373)
==9604==
==9604==
==9604== 2 errors in context 2 of 2:
==9604== Conditional jump or move depends on uninitialised value(s)
==9604== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9604== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9604== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9604== by 0x40EFC2: execbuiltin (builtin.c:450)
==9604== by 0x42D8E9: execcmd (exec.c:3378)
==9604== by 0x428CA0: execpline2 (exec.c:1697)
==9604== by 0x427FD2: execpline (exec.c:1484)
==9604== by 0x42779A: execlist (exec.c:1275)
==9604== by 0x42717C: execode (exec.c:1073)
==9604== by 0x431299: runshfunc (exec.c:5040)
==9604== by 0x430E76: doshfunc (exec.c:4920)
==9604== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9604==
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9605-by-pythonnut-on-???
==9605== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9605-by-pythonnut-on-???
==9605== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9605-by-pythonnut-on-???
==9605==
==9605== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9605== don't want to do, unless you know exactly what you're doing,
==9605== or are doing some strange experiment):
==9605== /usr/lib/valgrind/../../bin/vgdb --pid=9605 ...command...
==9605==
==9605== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9605== /path/to/gdb ./zsh
==9605== and then give GDB the following command
==9605== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9605
==9605== --pid is optional if only one valgrind process is running
==9605==
==9606== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9606-by-pythonnut-on-???
==9606== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9606-by-pythonnut-on-???
==9606== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9606-by-pythonnut-on-???
==9606==
==9606== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9606== don't want to do, unless you know exactly what you're doing,
==9606== or are doing some strange experiment):
==9606== /usr/lib/valgrind/../../bin/vgdb --pid=9606 ...command...
==9606==
==9606== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9606== /path/to/gdb ./zsh
==9606== and then give GDB the following command
==9606== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9606
==9606== --pid is optional if only one valgrind process is running
==9606==
==9607== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9607-by-pythonnut-on-???
==9607== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9607-by-pythonnut-on-???
==9607== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9607-by-pythonnut-on-???
==9607==
==9607== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9607== don't want to do, unless you know exactly what you're doing,
==9607== or are doing some strange experiment):
==9607== /usr/lib/valgrind/../../bin/vgdb --pid=9607 ...command...
==9607==
==9607== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9607== /path/to/gdb ./zsh
==9607== and then give GDB the following command
==9607== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9607
==9607== --pid is optional if only one valgrind process is running
==9607==
client request: code 4d430005, addr 0xFFEFE9C1C, len 4
--9607-- Caught __NR_exit; running __libc_freeres()
--9607-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9607==
==9607== HEAP SUMMARY:
==9607== in use at exit: 3,165,048 bytes in 69,904 blocks
==9607== total heap usage: 1,462,543 allocs, 1,392,639 frees, 117,615,403 bytes allocated
==9607==
==9607== Searching for pointers to 69,904 not-freed blocks
--9607-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9607-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9607-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9607-- Scanning root segment: 0x4037000..0x403afff (16384)
--9607-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9607-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9607-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9607-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9607-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9607-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9607-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9607-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9607-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9607-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9607-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9607-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9607-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9607-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9607-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9607-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9607-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9607-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9607-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9607-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9607-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9607-- Scanning root segment: 0x701a000..0x701afff (4096)
--9607-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9607-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9607-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9607-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9607-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9607-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9607-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9607-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9607-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9607== Checked 4,823,920 bytes
==9607==
==9607== LEAK SUMMARY:
==9607== definitely lost: 2,181 bytes in 11 blocks
==9607== indirectly lost: 6,756 bytes in 7 blocks
==9607== possibly lost: 0 bytes in 0 blocks
==9607== still reachable: 3,156,111 bytes in 69,886 blocks
==9607== suppressed: 0 bytes in 0 blocks
==9607== Rerun with --leak-check=full to see details of leaked memory
==9607==
==9607== Use --track-origins=yes to see where uninitialised values come from
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9607==
==9607== 1 errors in context 1 of 2:
==9607== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9607== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9607== by 0x488CD0: stringsubst (subst.c:301)
==9607== by 0x48801B: prefork (subst.c:77)
==9607== by 0x42B318: execcmd (exec.c:2619)
==9607== by 0x428CA0: execpline2 (exec.c:1697)
==9607== by 0x427FD2: execpline (exec.c:1484)
==9607== by 0x427756: execlist (exec.c:1267)
==9607== by 0x42717C: execode (exec.c:1073)
==9607== by 0x431299: runshfunc (exec.c:5040)
==9607== by 0x430E76: doshfunc (exec.c:4920)
==9607== by 0x4302FB: execshfunc (exec.c:4557)
==9607== by 0x42D8C1: execcmd (exec.c:3373)
==9607==
==9607==
==9607== 2 errors in context 2 of 2:
==9607== Conditional jump or move depends on uninitialised value(s)
==9607== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9607== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9607== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9607== by 0x40EFC2: execbuiltin (builtin.c:450)
==9607== by 0x42D8E9: execcmd (exec.c:3378)
==9607== by 0x428CA0: execpline2 (exec.c:1697)
==9607== by 0x427FD2: execpline (exec.c:1484)
==9607== by 0x42779A: execlist (exec.c:1275)
==9607== by 0x42717C: execode (exec.c:1073)
==9607== by 0x431299: runshfunc (exec.c:5040)
==9607== by 0x430E76: doshfunc (exec.c:4920)
==9607== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9607==
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9610-by-pythonnut-on-???
==9610== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9610-by-pythonnut-on-???
==9610== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9610-by-pythonnut-on-???
==9610==
==9610== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9610== don't want to do, unless you know exactly what you're doing,
==9610== or are doing some strange experiment):
==9610== /usr/lib/valgrind/../../bin/vgdb --pid=9610 ...command...
==9610==
==9610== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9610== /path/to/gdb ./zsh
==9610== and then give GDB the following command
==9610== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9610
==9610== --pid is optional if only one valgrind process is running
==9610==
--9610-- Caught __NR_exit; running __libc_freeres()
==9611== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9611-by-pythonnut-on-???
==9611== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9611-by-pythonnut-on-???
==9611== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9611-by-pythonnut-on-???
==9611==
==9611== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9611== don't want to do, unless you know exactly what you're doing,
==9611== or are doing some strange experiment):
==9611== /usr/lib/valgrind/../../bin/vgdb --pid=9611 ...command...
==9611==
==9611== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9611== /path/to/gdb ./zsh
==9611== and then give GDB the following command
==9611== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9611
==9611== --pid is optional if only one valgrind process is running
==9611==
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9610-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9610==
==9610== HEAP SUMMARY:
==9610== in use at exit: 3,201,915 bytes in 69,911 blocks
==9610== total heap usage: 1,462,550 allocs, 1,392,639 frees, 117,655,326 bytes allocated
==9610==
==9610== Searching for pointers to 69,911 not-freed blocks
--9610-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9610-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9610-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9610-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9610-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9610-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9610-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9610-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9610-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9610-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9610-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9610-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9610-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9610-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9610-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9610-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9610-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9610-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9610-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9610-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9610-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9610-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9610-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9610-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9610-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9610-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9610-- Scanning root segment: 0x701a000..0x701afff (4096)
--9610-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9610-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9610-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9610-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9610-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9610-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9610-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9610-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9610-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9610== Checked 4,935,720 bytes
==9610==
==9610== LEAK SUMMARY:
==9610== definitely lost: 2,181 bytes in 11 blocks
==9610== indirectly lost: 6,756 bytes in 7 blocks
==9610== possibly lost: 0 bytes in 0 blocks
==9610== still reachable: 3,192,978 bytes in 69,893 blocks
==9610== suppressed: 0 bytes in 0 blocks
==9610== Rerun with --leak-check=full to see details of leaked memory
==9610==
==9610== Use --track-origins=yes to see where uninitialised values come from
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610==
==9610== 1 errors in context 1 of 2:
==9610== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9610== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9610== by 0x488CD0: stringsubst (subst.c:301)
==9610== by 0x48801B: prefork (subst.c:77)
==9610== by 0x42B318: execcmd (exec.c:2619)
==9610== by 0x428CA0: execpline2 (exec.c:1697)
==9610== by 0x427FD2: execpline (exec.c:1484)
==9610== by 0x427756: execlist (exec.c:1267)
==9610== by 0x42717C: execode (exec.c:1073)
==9610== by 0x431299: runshfunc (exec.c:5040)
==9610== by 0x430E76: doshfunc (exec.c:4920)
==9610== by 0x4302FB: execshfunc (exec.c:4557)
==9610== by 0x42D8C1: execcmd (exec.c:3373)
==9610==
==9610==
==9610== 2 errors in context 2 of 2:
==9610== Conditional jump or move depends on uninitialised value(s)
==9610== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9610== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9610== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9610== by 0x40EFC2: execbuiltin (builtin.c:450)
==9610== by 0x42D8E9: execcmd (exec.c:3378)
==9610== by 0x428CA0: execpline2 (exec.c:1697)
==9610== by 0x427FD2: execpline (exec.c:1484)
==9610== by 0x42779A: execlist (exec.c:1275)
==9610== by 0x42717C: execode (exec.c:1073)
==9610== by 0x431299: runshfunc (exec.c:5040)
==9610== by 0x430E76: doshfunc (exec.c:4920)
==9610== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9610==
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9609-by-pythonnut-on-???
==9609== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9609-by-pythonnut-on-???
==9609== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9609-by-pythonnut-on-???
==9609==
==9609== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9609== don't want to do, unless you know exactly what you're doing,
==9609== or are doing some strange experiment):
==9609== /usr/lib/valgrind/../../bin/vgdb --pid=9609 ...command...
==9609==
==9609== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9609== /path/to/gdb ./zsh
==9609== and then give GDB the following command
==9609== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9609
==9609== --pid is optional if only one valgrind process is running
==9609==
--9609-- Caught __NR_exit; running __libc_freeres()
--9609-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9609==
==9609== HEAP SUMMARY:
==9609== in use at exit: 3,201,851 bytes in 69,908 blocks
==9609== total heap usage: 1,462,552 allocs, 1,392,644 frees, 117,655,870 bytes allocated
==9609==
==9609== Searching for pointers to 69,908 not-freed blocks
--9609-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9609-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9609-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9609-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9609-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9609-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9609-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9609-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9609-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9609-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9609-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9609-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9609-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9609-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9609-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9609-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9609-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9609-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9609-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9609-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9609-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9609-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9609-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9609-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9609-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9609-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9609-- Scanning root segment: 0x701a000..0x701afff (4096)
--9609-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9609-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9609-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9609-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9609-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9609-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9609-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9609-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9609-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9609== Checked 4,935,032 bytes
==9609==
==9609== LEAK SUMMARY:
==9609== definitely lost: 2,181 bytes in 11 blocks
==9609== indirectly lost: 6,756 bytes in 7 blocks
==9609== possibly lost: 0 bytes in 0 blocks
==9609== still reachable: 3,192,914 bytes in 69,890 blocks
==9609== suppressed: 0 bytes in 0 blocks
==9609== Rerun with --leak-check=full to see details of leaked memory
==9609==
==9609== Use --track-origins=yes to see where uninitialised values come from
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609==
==9609== 1 errors in context 1 of 2:
==9609== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9609== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9609== by 0x488CD0: stringsubst (subst.c:301)
==9609== by 0x48801B: prefork (subst.c:77)
==9609== by 0x42B318: execcmd (exec.c:2619)
==9609== by 0x428CA0: execpline2 (exec.c:1697)
==9609== by 0x427FD2: execpline (exec.c:1484)
==9609== by 0x427756: execlist (exec.c:1267)
==9609== by 0x42717C: execode (exec.c:1073)
==9609== by 0x431299: runshfunc (exec.c:5040)
==9609== by 0x430E76: doshfunc (exec.c:4920)
==9609== by 0x4302FB: execshfunc (exec.c:4557)
==9609== by 0x42D8C1: execcmd (exec.c:3373)
==9609==
==9609==
==9609== 2 errors in context 2 of 2:
==9609== Conditional jump or move depends on uninitialised value(s)
==9609== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9609== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9609== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9609== by 0x40EFC2: execbuiltin (builtin.c:450)
==9609== by 0x42D8E9: execcmd (exec.c:3378)
==9609== by 0x428CA0: execpline2 (exec.c:1697)
==9609== by 0x427FD2: execpline (exec.c:1484)
==9609== by 0x42779A: execlist (exec.c:1275)
==9609== by 0x42717C: execode (exec.c:1073)
==9609== by 0x431299: runshfunc (exec.c:5040)
==9609== by 0x430E76: doshfunc (exec.c:4920)
==9609== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9609==
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9614-by-pythonnut-on-???
==9614== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9614-by-pythonnut-on-???
==9614== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9614-by-pythonnut-on-???
==9614==
==9614== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9614== don't want to do, unless you know exactly what you're doing,
==9614== or are doing some strange experiment):
==9614== /usr/lib/valgrind/../../bin/vgdb --pid=9614 ...command...
==9614==
==9614== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9614== /path/to/gdb ./zsh
==9614== and then give GDB the following command
==9614== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9614
==9614== --pid is optional if only one valgrind process is running
==9614==
==9615== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9615-by-pythonnut-on-???
==9615== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9615-by-pythonnut-on-???
==9615== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9615-by-pythonnut-on-???
==9615==
==9615== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9615== don't want to do, unless you know exactly what you're doing,
==9615== or are doing some strange experiment):
==9615== /usr/lib/valgrind/../../bin/vgdb --pid=9615 ...command...
==9615==
==9615== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9615== /path/to/gdb ./zsh
==9615== and then give GDB the following command
==9615== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9615
==9615== --pid is optional if only one valgrind process is running
==9615==
--9615-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9615-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9615==
==9615== HEAP SUMMARY:
==9615== in use at exit: 3,238,537 bytes in 69,914 blocks
==9615== total heap usage: 1,462,559 allocs, 1,392,645 frees, 117,694,169 bytes allocated
==9615==
==9615== Searching for pointers to 69,914 not-freed blocks
--9615-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9615-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9615-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9615-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9615-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9615-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9615-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9615-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9615-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9615-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9615-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9615-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9615-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9615-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9615-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9615-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9615-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9615-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9615-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9615-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9615-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9615-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9615-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9615-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9615-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9615-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9615-- Scanning root segment: 0x701a000..0x701afff (4096)
--9615-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9615-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9615-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9615-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9615-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9615-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9615-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9615-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9615-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9615== Checked 5,009,184 bytes
==9615==
==9615== LEAK SUMMARY:
==9615== definitely lost: 2,181 bytes in 11 blocks
==9615== indirectly lost: 6,756 bytes in 7 blocks
==9615== possibly lost: 0 bytes in 0 blocks
==9615== still reachable: 3,229,600 bytes in 69,896 blocks
==9615== suppressed: 0 bytes in 0 blocks
==9615== Rerun with --leak-check=full to see details of leaked memory
==9615==
==9615== Use --track-origins=yes to see where uninitialised values come from
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9615==
==9615== 1 errors in context 1 of 2:
==9615== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9615== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9615== by 0x488CD0: stringsubst (subst.c:301)
==9615== by 0x48801B: prefork (subst.c:77)
==9615== by 0x42B318: execcmd (exec.c:2619)
==9615== by 0x428CA0: execpline2 (exec.c:1697)
==9615== by 0x427FD2: execpline (exec.c:1484)
==9615== by 0x427756: execlist (exec.c:1267)
==9615== by 0x42717C: execode (exec.c:1073)
==9615== by 0x431299: runshfunc (exec.c:5040)
==9615== by 0x430E76: doshfunc (exec.c:4920)
==9615== by 0x4302FB: execshfunc (exec.c:4557)
==9615== by 0x42D8C1: execcmd (exec.c:3373)
==9615==
==9615==
==9615== 2 errors in context 2 of 2:
==9615== Conditional jump or move depends on uninitialised value(s)
==9615== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9615== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9615== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9615== by 0x40EFC2: execbuiltin (builtin.c:450)
==9615== by 0x42D8E9: execcmd (exec.c:3378)
==9615== by 0x428CA0: execpline2 (exec.c:1697)
==9615== by 0x427FD2: execpline (exec.c:1484)
==9615== by 0x42779A: execlist (exec.c:1275)
==9615== by 0x42717C: execode (exec.c:1073)
==9615== by 0x431299: runshfunc (exec.c:5040)
==9615== by 0x430E76: doshfunc (exec.c:4920)
==9615== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9615==
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9614-- Caught __NR_exit; running __libc_freeres()
--9614-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9614==
==9614== HEAP SUMMARY:
==9614== in use at exit: 3,201,897 bytes in 69,911 blocks
==9614== total heap usage: 1,462,562 allocs, 1,392,651 frees, 117,694,745 bytes allocated
==9614==
==9614== Searching for pointers to 69,911 not-freed blocks
--9614-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9614-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9614-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9614-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9614-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9614-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9614-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9614-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9614-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9614-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9614-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9614-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9614-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9614-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9614-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9614-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9614-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9614-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9614-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9614-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9614-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9614-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9614-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9614-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9614-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9614-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9614-- Scanning root segment: 0x701a000..0x701afff (4096)
--9614-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9614-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9614-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9614-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9614-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9614-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9614-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9614-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9614-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9614== Checked 4,971,928 bytes
==9614==
==9614== LEAK SUMMARY:
==9614== definitely lost: 2,181 bytes in 11 blocks
==9614== indirectly lost: 6,756 bytes in 7 blocks
==9614== possibly lost: 0 bytes in 0 blocks
==9614== still reachable: 3,192,960 bytes in 69,893 blocks
==9614== suppressed: 0 bytes in 0 blocks
==9614== Rerun with --leak-check=full to see details of leaked memory
==9614==
==9614== Use --track-origins=yes to see where uninitialised values come from
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614==
==9614== 1 errors in context 1 of 2:
==9614== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9614== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9614== by 0x488CD0: stringsubst (subst.c:301)
==9614== by 0x48801B: prefork (subst.c:77)
==9614== by 0x42B318: execcmd (exec.c:2619)
==9614== by 0x428CA0: execpline2 (exec.c:1697)
==9614== by 0x427FD2: execpline (exec.c:1484)
==9614== by 0x427756: execlist (exec.c:1267)
==9614== by 0x42717C: execode (exec.c:1073)
==9614== by 0x431299: runshfunc (exec.c:5040)
==9614== by 0x430E76: doshfunc (exec.c:4920)
==9614== by 0x4302FB: execshfunc (exec.c:4557)
==9614== by 0x42D8C1: execcmd (exec.c:3373)
==9614==
==9614==
==9614== 2 errors in context 2 of 2:
==9614== Conditional jump or move depends on uninitialised value(s)
==9614== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9614== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9614== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9614== by 0x40EFC2: execbuiltin (builtin.c:450)
==9614== by 0x42D8E9: execcmd (exec.c:3378)
==9614== by 0x428CA0: execpline2 (exec.c:1697)
==9614== by 0x427FD2: execpline (exec.c:1484)
==9614== by 0x42779A: execlist (exec.c:1275)
==9614== by 0x42717C: execode (exec.c:1073)
==9614== by 0x431299: runshfunc (exec.c:5040)
==9614== by 0x430E76: doshfunc (exec.c:4920)
==9614== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9614==
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9617-by-pythonnut-on-???
==9617== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9617-by-pythonnut-on-???
==9617== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9617-by-pythonnut-on-???
==9617==
==9617== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9617== don't want to do, unless you know exactly what you're doing,
==9617== or are doing some strange experiment):
==9617== /usr/lib/valgrind/../../bin/vgdb --pid=9617 ...command...
==9617==
==9617== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9617== /path/to/gdb ./zsh
==9617== and then give GDB the following command
==9617== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9617
==9617== --pid is optional if only one valgrind process is running
==9617==
==9618== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9618-by-pythonnut-on-???
==9618== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9618-by-pythonnut-on-???
==9618== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9618-by-pythonnut-on-???
==9618==
==9618== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9618== don't want to do, unless you know exactly what you're doing,
==9618== or are doing some strange experiment):
==9618== /usr/lib/valgrind/../../bin/vgdb --pid=9618 ...command...
==9618==
==9618== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9618== /path/to/gdb ./zsh
==9618== and then give GDB the following command
==9618== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9618
==9618== --pid is optional if only one valgrind process is running
==9618==
--9618-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA64C, len 4
--9618-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9618==
==9618== HEAP SUMMARY:
==9618== in use at exit: 3,238,623 bytes in 69,917 blocks
==9618== total heap usage: 1,462,572 allocs, 1,392,655 frees, 117,699,455 bytes allocated
==9618==
==9618== Searching for pointers to 69,917 not-freed blocks
--9618-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9618-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9618-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9618-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9618-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9618-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9618-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9618-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9618-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9618-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9618-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9618-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9618-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9618-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9618-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9618-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9618-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9618-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9618-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9618-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9618-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9618-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9618-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9618-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9618-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9618-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9618-- Scanning root segment: 0x701a000..0x701afff (4096)
--9618-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9618-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9618-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9618-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9618-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9618-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9618-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9618-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9618-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9618== Checked 5,009,536 bytes
==9618==
==9618== LEAK SUMMARY:
==9618== definitely lost: 2,181 bytes in 11 blocks
==9618== indirectly lost: 6,756 bytes in 7 blocks
==9618== possibly lost: 0 bytes in 0 blocks
==9618== still reachable: 3,229,686 bytes in 69,899 blocks
==9618== suppressed: 0 bytes in 0 blocks
==9618== Rerun with --leak-check=full to see details of leaked memory
==9618==
==9618== Use --track-origins=yes to see where uninitialised values come from
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9618==
==9618== 1 errors in context 1 of 2:
==9618== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9618== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9618== by 0x488CD0: stringsubst (subst.c:301)
==9618== by 0x48801B: prefork (subst.c:77)
==9618== by 0x42B318: execcmd (exec.c:2619)
==9618== by 0x428CA0: execpline2 (exec.c:1697)
==9618== by 0x427FD2: execpline (exec.c:1484)
==9618== by 0x427756: execlist (exec.c:1267)
==9618== by 0x42717C: execode (exec.c:1073)
==9618== by 0x431299: runshfunc (exec.c:5040)
==9618== by 0x430E76: doshfunc (exec.c:4920)
==9618== by 0x4302FB: execshfunc (exec.c:4557)
==9618== by 0x42D8C1: execcmd (exec.c:3373)
==9618==
==9618==
==9618== 2 errors in context 2 of 2:
==9618== Conditional jump or move depends on uninitialised value(s)
==9618== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9618== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9618== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9618== by 0x40EFC2: execbuiltin (builtin.c:450)
==9618== by 0x42D8E9: execcmd (exec.c:3378)
==9618== by 0x428CA0: execpline2 (exec.c:1697)
==9618== by 0x427FD2: execpline (exec.c:1484)
==9618== by 0x42779A: execlist (exec.c:1275)
==9618== by 0x42717C: execode (exec.c:1073)
==9618== by 0x431299: runshfunc (exec.c:5040)
==9618== by 0x430E76: doshfunc (exec.c:4920)
==9618== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9618==
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9617-- Caught __NR_exit; running __libc_freeres()
--9617-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9617==
==9617== HEAP SUMMARY:
==9617== in use at exit: 3,201,983 bytes in 69,914 blocks
==9617== total heap usage: 1,462,575 allocs, 1,392,661 frees, 117,700,031 bytes allocated
==9617==
==9617== Searching for pointers to 69,914 not-freed blocks
--9617-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9617-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9617-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9617-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9617-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9617-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9617-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9617-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9617-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9617-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9617-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9617-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9617-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9617-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9617-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9617-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9617-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9617-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9617-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9617-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9617-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9617-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9617-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9617-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9617-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9617-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9617-- Scanning root segment: 0x701a000..0x701afff (4096)
--9617-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9617-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9617-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9617-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9617-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9617-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9617-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9617-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9617-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9617== Checked 4,972,280 bytes
==9617==
==9617== LEAK SUMMARY:
==9617== definitely lost: 2,181 bytes in 11 blocks
==9617== indirectly lost: 6,756 bytes in 7 blocks
==9617== possibly lost: 0 bytes in 0 blocks
==9617== still reachable: 3,193,046 bytes in 69,896 blocks
==9617== suppressed: 0 bytes in 0 blocks
==9617== Rerun with --leak-check=full to see details of leaked memory
==9617==
==9617== Use --track-origins=yes to see where uninitialised values come from
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617==
==9617== 1 errors in context 1 of 2:
==9617== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9617== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9617== by 0x488CD0: stringsubst (subst.c:301)
==9617== by 0x48801B: prefork (subst.c:77)
==9617== by 0x42B318: execcmd (exec.c:2619)
==9617== by 0x428CA0: execpline2 (exec.c:1697)
==9617== by 0x427FD2: execpline (exec.c:1484)
==9617== by 0x427756: execlist (exec.c:1267)
==9617== by 0x42717C: execode (exec.c:1073)
==9617== by 0x431299: runshfunc (exec.c:5040)
==9617== by 0x430E76: doshfunc (exec.c:4920)
==9617== by 0x4302FB: execshfunc (exec.c:4557)
==9617== by 0x42D8C1: execcmd (exec.c:3373)
==9617==
==9617==
==9617== 2 errors in context 2 of 2:
==9617== Conditional jump or move depends on uninitialised value(s)
==9617== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9617== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9617== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9617== by 0x40EFC2: execbuiltin (builtin.c:450)
==9617== by 0x42D8E9: execcmd (exec.c:3378)
==9617== by 0x428CA0: execpline2 (exec.c:1697)
==9617== by 0x427FD2: execpline (exec.c:1484)
==9617== by 0x42779A: execlist (exec.c:1275)
==9617== by 0x42717C: execode (exec.c:1073)
==9617== by 0x431299: runshfunc (exec.c:5040)
==9617== by 0x430E76: doshfunc (exec.c:4920)
==9617== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9617==
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9620-by-pythonnut-on-???
==9620== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9620-by-pythonnut-on-???
==9620== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9620-by-pythonnut-on-???
==9620==
==9620== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9620== don't want to do, unless you know exactly what you're doing,
==9620== or are doing some strange experiment):
==9620== /usr/lib/valgrind/../../bin/vgdb --pid=9620 ...command...
==9620==
==9620== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9620== /path/to/gdb ./zsh
==9620== and then give GDB the following command
==9620== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9620
==9620== --pid is optional if only one valgrind process is running
==9620==
--9621-- Caught __NR_exit; running __libc_freeres()
==9621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9621-by-pythonnut-on-???
==9621== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9621-by-pythonnut-on-???
==9621== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9621-by-pythonnut-on-???
==9621==
==9621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9621== don't want to do, unless you know exactly what you're doing,
==9621== or are doing some strange experiment):
==9621== /usr/lib/valgrind/../../bin/vgdb --pid=9621 ...command...
==9621==
==9621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9621== /path/to/gdb ./zsh
==9621== and then give GDB the following command
==9621== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9621
==9621== --pid is optional if only one valgrind process is running
==9621==
client request: code 4d430005, addr 0xFFEFE9B1C, len 4
--9621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9621==
==9621== HEAP SUMMARY:
==9621== in use at exit: 3,202,111 bytes in 69,917 blocks
==9621== total heap usage: 1,462,585 allocs, 1,392,668 frees, 117,669,592 bytes allocated
==9621==
==9621== Searching for pointers to 69,917 not-freed blocks
--9621-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9621-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9621-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9621-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9621-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9621-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9621-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9621-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9621-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9621-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9621-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9621-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9621-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9621-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9621-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9621-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9621-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9621-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9621-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9621-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9621-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9621-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9621-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9621-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9621-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9621-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9621-- Scanning root segment: 0x701a000..0x701afff (4096)
--9621-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9621-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9621-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9621-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9621-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9621-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9621-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9621-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9621-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9621== Checked 4,936,992 bytes
==9621==
==9621== LEAK SUMMARY:
==9621== definitely lost: 2,181 bytes in 11 blocks
==9621== indirectly lost: 6,756 bytes in 7 blocks
==9621== possibly lost: 0 bytes in 0 blocks
==9621== still reachable: 3,193,174 bytes in 69,899 blocks
==9621== suppressed: 0 bytes in 0 blocks
==9621== Rerun with --leak-check=full to see details of leaked memory
==9621==
==9621== Use --track-origins=yes to see where uninitialised values come from
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9621==
==9621== 1 errors in context 1 of 2:
==9621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9621== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9621== by 0x488CD0: stringsubst (subst.c:301)
==9621== by 0x48801B: prefork (subst.c:77)
==9621== by 0x42B318: execcmd (exec.c:2619)
==9621== by 0x428CA0: execpline2 (exec.c:1697)
==9621== by 0x427FD2: execpline (exec.c:1484)
==9621== by 0x427756: execlist (exec.c:1267)
==9621== by 0x42717C: execode (exec.c:1073)
==9621== by 0x431299: runshfunc (exec.c:5040)
==9621== by 0x430E76: doshfunc (exec.c:4920)
==9621== by 0x4302FB: execshfunc (exec.c:4557)
==9621== by 0x42D8C1: execcmd (exec.c:3373)
==9621==
==9621==
==9621== 2 errors in context 2 of 2:
==9621== Conditional jump or move depends on uninitialised value(s)
==9621== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9621== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9621== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9621== by 0x40EFC2: execbuiltin (builtin.c:450)
==9621== by 0x42D8E9: execcmd (exec.c:3378)
==9621== by 0x428CA0: execpline2 (exec.c:1697)
==9621== by 0x427FD2: execpline (exec.c:1484)
==9621== by 0x42779A: execlist (exec.c:1275)
==9621== by 0x42717C: execode (exec.c:1073)
==9621== by 0x431299: runshfunc (exec.c:5040)
==9621== by 0x430E76: doshfunc (exec.c:4920)
==9621== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9621==
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9620-- Caught __NR_exit; running __libc_freeres()
--9620-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9620==
==9620== HEAP SUMMARY:
==9620== in use at exit: 3,202,079 bytes in 69,914 blocks
==9620== total heap usage: 1,462,588 allocs, 1,392,674 frees, 117,670,264 bytes allocated
==9620==
==9620== Searching for pointers to 69,914 not-freed blocks
--9620-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9620-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9620-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9620-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9620-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9620-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9620-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9620-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9620-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9620-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9620-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9620-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9620-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9620-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9620-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9620-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9620-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9620-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9620-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9620-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9620-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9620-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9620-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9620-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9620-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9620-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9620-- Scanning root segment: 0x701a000..0x701afff (4096)
--9620-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9620-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9620-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9620-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9620-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9620-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9620-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9620-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9620-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9620== Checked 4,936,312 bytes
==9620==
==9620== LEAK SUMMARY:
==9620== definitely lost: 2,181 bytes in 11 blocks
==9620== indirectly lost: 6,756 bytes in 7 blocks
==9620== possibly lost: 0 bytes in 0 blocks
==9620== still reachable: 3,193,142 bytes in 69,896 blocks
==9620== suppressed: 0 bytes in 0 blocks
==9620== Rerun with --leak-check=full to see details of leaked memory
==9620==
==9620== Use --track-origins=yes to see where uninitialised values come from
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620==
==9620== 1 errors in context 1 of 2:
==9620== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9620== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9620== by 0x488CD0: stringsubst (subst.c:301)
==9620== by 0x48801B: prefork (subst.c:77)
==9620== by 0x42B318: execcmd (exec.c:2619)
==9620== by 0x428CA0: execpline2 (exec.c:1697)
==9620== by 0x427FD2: execpline (exec.c:1484)
==9620== by 0x427756: execlist (exec.c:1267)
==9620== by 0x42717C: execode (exec.c:1073)
==9620== by 0x431299: runshfunc (exec.c:5040)
==9620== by 0x430E76: doshfunc (exec.c:4920)
==9620== by 0x4302FB: execshfunc (exec.c:4557)
==9620== by 0x42D8C1: execcmd (exec.c:3373)
==9620==
==9620==
==9620== 2 errors in context 2 of 2:
==9620== Conditional jump or move depends on uninitialised value(s)
==9620== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9620== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9620== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9620== by 0x40EFC2: execbuiltin (builtin.c:450)
==9620== by 0x42D8E9: execcmd (exec.c:3378)
==9620== by 0x428CA0: execpline2 (exec.c:1697)
==9620== by 0x427FD2: execpline (exec.c:1484)
==9620== by 0x42779A: execlist (exec.c:1275)
==9620== by 0x42717C: execode (exec.c:1073)
==9620== by 0x431299: runshfunc (exec.c:5040)
==9620== by 0x430E76: doshfunc (exec.c:4920)
==9620== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9620==
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9625-by-pythonnut-on-???
==9625== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9625-by-pythonnut-on-???
==9625== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9625-by-pythonnut-on-???
==9625==
==9625== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9625== don't want to do, unless you know exactly what you're doing,
==9625== or are doing some strange experiment):
==9625== /usr/lib/valgrind/../../bin/vgdb --pid=9625 ...command...
==9625==
==9625== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9625== /path/to/gdb ./zsh
==9625== and then give GDB the following command
==9625== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9625
==9625== --pid is optional if only one valgrind process is running
==9625==
==9626== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9626-by-pythonnut-on-???
==9626== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9626-by-pythonnut-on-???
==9626== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9626-by-pythonnut-on-???
==9626==
==9626== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9626== don't want to do, unless you know exactly what you're doing,
==9626== or are doing some strange experiment):
==9626== /usr/lib/valgrind/../../bin/vgdb --pid=9626 ...command...
==9626==
==9626== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9626== /path/to/gdb ./zsh
==9626== and then give GDB the following command
==9626== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9626
==9626== --pid is optional if only one valgrind process is running
==9626==
--9626-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFE9FCC, len 4
--9626-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9626==
==9626== HEAP SUMMARY:
==9626== in use at exit: 3,238,823 bytes in 69,920 blocks
==9626== total heap usage: 1,462,595 allocs, 1,392,675 frees, 117,708,737 bytes allocated
==9626==
==9626== Searching for pointers to 69,920 not-freed blocks
--9626-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9626-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9626-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9626-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9626-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9626-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9626-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9626-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9626-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9626-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9626-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9626-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9626-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9626-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9626-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9626-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9626-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9626-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9626-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9626-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9626-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9626-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9626-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9626-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9626-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9626-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9626-- Scanning root segment: 0x701a000..0x701afff (4096)
--9626-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9626-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9626-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9626-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9626-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9626-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9626-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9626-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9626-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9626== Checked 5,010,272 bytes
==9626==
==9626== LEAK SUMMARY:
==9626== definitely lost: 2,181 bytes in 11 blocks
==9626== indirectly lost: 6,756 bytes in 7 blocks
==9626== possibly lost: 0 bytes in 0 blocks
==9626== still reachable: 3,229,886 bytes in 69,902 blocks
==9626== suppressed: 0 bytes in 0 blocks
==9626== Rerun with --leak-check=full to see details of leaked memory
==9626==
==9626== Use --track-origins=yes to see where uninitialised values come from
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9626==
==9626== 1 errors in context 1 of 2:
==9626== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9626== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9626== by 0x488CD0: stringsubst (subst.c:301)
==9626== by 0x48801B: prefork (subst.c:77)
==9626== by 0x42B318: execcmd (exec.c:2619)
==9626== by 0x428CA0: execpline2 (exec.c:1697)
==9626== by 0x427FD2: execpline (exec.c:1484)
==9626== by 0x427756: execlist (exec.c:1267)
==9626== by 0x42717C: execode (exec.c:1073)
==9626== by 0x431299: runshfunc (exec.c:5040)
==9626== by 0x430E76: doshfunc (exec.c:4920)
==9626== by 0x4302FB: execshfunc (exec.c:4557)
==9626== by 0x42D8C1: execcmd (exec.c:3373)
==9626==
==9626==
==9626== 2 errors in context 2 of 2:
==9626== Conditional jump or move depends on uninitialised value(s)
==9626== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9626== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9626== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9626== by 0x40EFC2: execbuiltin (builtin.c:450)
==9626== by 0x42D8E9: execcmd (exec.c:3378)
==9626== by 0x428CA0: execpline2 (exec.c:1697)
==9626== by 0x427FD2: execpline (exec.c:1484)
==9626== by 0x42779A: execlist (exec.c:1275)
==9626== by 0x42717C: execode (exec.c:1073)
==9626== by 0x431299: runshfunc (exec.c:5040)
==9626== by 0x430E76: doshfunc (exec.c:4920)
==9626== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9626==
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9625-- Caught __NR_exit; running __libc_freeres()
--9625-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9625==
==9625== HEAP SUMMARY:
==9625== in use at exit: 3,202,279 bytes in 69,917 blocks
==9625== total heap usage: 1,462,598 allocs, 1,392,681 frees, 117,709,409 bytes allocated
==9625==
==9625== Searching for pointers to 69,917 not-freed blocks
--9625-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9625-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9625-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9625-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9625-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9625-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9625-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9625-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9625-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9625-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9625-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9625-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9625-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9625-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9625-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9625-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9625-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9625-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9625-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9625-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9625-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9625-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9625-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9625-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9625-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9625-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9625-- Scanning root segment: 0x701a000..0x701afff (4096)
--9625-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9625-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9625-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9625-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9625-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9625-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9625-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9625-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9625-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9625== Checked 4,973,096 bytes
==9625==
==9625== LEAK SUMMARY:
==9625== definitely lost: 2,181 bytes in 11 blocks
==9625== indirectly lost: 6,756 bytes in 7 blocks
==9625== possibly lost: 0 bytes in 0 blocks
==9625== still reachable: 3,193,342 bytes in 69,899 blocks
==9625== suppressed: 0 bytes in 0 blocks
==9625== Rerun with --leak-check=full to see details of leaked memory
==9625==
==9625== Use --track-origins=yes to see where uninitialised values come from
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625==
==9625== 1 errors in context 1 of 2:
==9625== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9625== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9625== by 0x488CD0: stringsubst (subst.c:301)
==9625== by 0x48801B: prefork (subst.c:77)
==9625== by 0x42B318: execcmd (exec.c:2619)
==9625== by 0x428CA0: execpline2 (exec.c:1697)
==9625== by 0x427FD2: execpline (exec.c:1484)
==9625== by 0x427756: execlist (exec.c:1267)
==9625== by 0x42717C: execode (exec.c:1073)
==9625== by 0x431299: runshfunc (exec.c:5040)
==9625== by 0x430E76: doshfunc (exec.c:4920)
==9625== by 0x4302FB: execshfunc (exec.c:4557)
==9625== by 0x42D8C1: execcmd (exec.c:3373)
==9625==
==9625==
==9625== 2 errors in context 2 of 2:
==9625== Conditional jump or move depends on uninitialised value(s)
==9625== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9625== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9625== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9625== by 0x40EFC2: execbuiltin (builtin.c:450)
==9625== by 0x42D8E9: execcmd (exec.c:3378)
==9625== by 0x428CA0: execpline2 (exec.c:1697)
==9625== by 0x427FD2: execpline (exec.c:1484)
==9625== by 0x42779A: execlist (exec.c:1275)
==9625== by 0x42717C: execode (exec.c:1073)
==9625== by 0x431299: runshfunc (exec.c:5040)
==9625== by 0x430E76: doshfunc (exec.c:4920)
==9625== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9625==
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9606-- Caught __NR_exit; running __libc_freeres()
--9606-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9606==
==9606== HEAP SUMMARY:
==9606== in use at exit: 3,164,585 bytes in 69,894 blocks
==9606== total heap usage: 1,462,604 allocs, 1,392,710 frees, 117,677,299 bytes allocated
==9606==
==9606== Searching for pointers to 69,894 not-freed blocks
--9606-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9606-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9606-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9606-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9606-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9606-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9606-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9606-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9606-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9606-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9606-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9606-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9606-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9606-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9606-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9606-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9606-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9606-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9606-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9606-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9606-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9606-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9606-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9606-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9606-- Scanning root segment: 0x701a000..0x701afff (4096)
--9606-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9606-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9606-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9606-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9606-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9606-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9606-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9606-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9606-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9606== Checked 4,805,000 bytes
==9606==
==9606== LEAK SUMMARY:
==9606== definitely lost: 2,181 bytes in 11 blocks
==9606== indirectly lost: 6,756 bytes in 7 blocks
==9606== possibly lost: 0 bytes in 0 blocks
==9606== still reachable: 3,155,648 bytes in 69,876 blocks
==9606== suppressed: 0 bytes in 0 blocks
==9606== Rerun with --leak-check=full to see details of leaked memory
==9606==
==9606== Use --track-origins=yes to see where uninitialised values come from
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9606==
==9606== 1 errors in context 1 of 2:
==9606== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9606== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9606== by 0x488CD0: stringsubst (subst.c:301)
==9606== by 0x48801B: prefork (subst.c:77)
==9606== by 0x42B318: execcmd (exec.c:2619)
==9606== by 0x428CA0: execpline2 (exec.c:1697)
==9606== by 0x427FD2: execpline (exec.c:1484)
==9606== by 0x427756: execlist (exec.c:1267)
==9606== by 0x42717C: execode (exec.c:1073)
==9606== by 0x431299: runshfunc (exec.c:5040)
==9606== by 0x430E76: doshfunc (exec.c:4920)
==9606== by 0x4302FB: execshfunc (exec.c:4557)
==9606== by 0x42D8C1: execcmd (exec.c:3373)
==9606==
==9606==
==9606== 2 errors in context 2 of 2:
==9606== Conditional jump or move depends on uninitialised value(s)
==9606== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9606== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9606== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9606== by 0x40EFC2: execbuiltin (builtin.c:450)
==9606== by 0x42D8E9: execcmd (exec.c:3378)
==9606== by 0x428CA0: execpline2 (exec.c:1697)
==9606== by 0x427FD2: execpline (exec.c:1484)
==9606== by 0x42779A: execlist (exec.c:1275)
==9606== by 0x42717C: execode (exec.c:1073)
==9606== by 0x431299: runshfunc (exec.c:5040)
==9606== by 0x430E76: doshfunc (exec.c:4920)
==9606== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9606==
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9605-- Caught __NR_exit; running __libc_freeres()
--9605-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9605==
==9605== HEAP SUMMARY:
==9605== in use at exit: 3,163,233 bytes in 69,856 blocks
==9605== total heap usage: 1,462,503 allocs, 1,392,647 frees, 117,605,421 bytes allocated
==9605==
==9605== Searching for pointers to 69,856 not-freed blocks
--9605-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9605-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9605-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9605-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9605-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9605-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9605-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9605-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9605-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9605-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9605-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9605-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9605-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9605-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9605-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9605-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9605-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9605-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9605-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9605-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9605-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9605-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9605-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9605-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9605-- Scanning root segment: 0x701a000..0x701afff (4096)
--9605-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9605-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9605-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9605-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9605-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9605-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9605-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9605-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9605-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9605== Checked 4,801,920 bytes
==9605==
==9605== LEAK SUMMARY:
==9605== definitely lost: 2,181 bytes in 11 blocks
==9605== indirectly lost: 6,756 bytes in 7 blocks
==9605== possibly lost: 0 bytes in 0 blocks
==9605== still reachable: 3,154,296 bytes in 69,838 blocks
==9605== suppressed: 0 bytes in 0 blocks
==9605== Rerun with --leak-check=full to see details of leaked memory
==9605==
==9605== Use --track-origins=yes to see where uninitialised values come from
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605==
==9605== 1 errors in context 1 of 2:
==9605== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9605== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9605== by 0x488CD0: stringsubst (subst.c:301)
==9605== by 0x48801B: prefork (subst.c:77)
==9605== by 0x42B318: execcmd (exec.c:2619)
==9605== by 0x428CA0: execpline2 (exec.c:1697)
==9605== by 0x427FD2: execpline (exec.c:1484)
==9605== by 0x427756: execlist (exec.c:1267)
==9605== by 0x42717C: execode (exec.c:1073)
==9605== by 0x431299: runshfunc (exec.c:5040)
==9605== by 0x430E76: doshfunc (exec.c:4920)
==9605== by 0x4302FB: execshfunc (exec.c:4557)
==9605== by 0x42D8C1: execcmd (exec.c:3373)
==9605==
==9605==
==9605== 2 errors in context 2 of 2:
==9605== Conditional jump or move depends on uninitialised value(s)
==9605== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9605== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9605== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9605== by 0x40EFC2: execbuiltin (builtin.c:450)
==9605== by 0x42D8E9: execcmd (exec.c:3378)
==9605== by 0x428CA0: execpline2 (exec.c:1697)
==9605== by 0x427FD2: execpline (exec.c:1484)
==9605== by 0x42779A: execlist (exec.c:1275)
==9605== by 0x42717C: execode (exec.c:1073)
==9605== by 0x431299: runshfunc (exec.c:5040)
==9605== by 0x430E76: doshfunc (exec.c:4920)
==9605== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9605==
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9628-by-pythonnut-on-???
==9628== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9628-by-pythonnut-on-???
==9628== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9628-by-pythonnut-on-???
==9628==
==9628== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9628== don't want to do, unless you know exactly what you're doing,
==9628== or are doing some strange experiment):
==9628== /usr/lib/valgrind/../../bin/vgdb --pid=9628 ...command...
==9628==
==9628== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9628== /path/to/gdb ./zsh
==9628== and then give GDB the following command
==9628== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9628
==9628== --pid is optional if only one valgrind process is running
==9628==
--9628-- Caught __NR_exit; running __libc_freeres()
--9628-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9628==
==9628== HEAP SUMMARY:
==9628== in use at exit: 3,169,072 bytes in 70,032 blocks
==9628== total heap usage: 1,462,969 allocs, 1,392,937 frees, 117,625,315 bytes allocated
==9628==
==9628== Searching for pointers to 70,032 not-freed blocks
--9628-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9628-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9628-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9628-- Scanning root segment: 0x4037000..0x403afff (16384)
--9628-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9628-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9628-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9628-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9628-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9628-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9628-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9628-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9628-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9628-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9628-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9628-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9628-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9628-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9628-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9628-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9628-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9628-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9628-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9628-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9628-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9628-- Scanning root segment: 0x701a000..0x701afff (4096)
--9628-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9628-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9628-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9628-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9628-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9628-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9628-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9628-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9628-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9628== Checked 4,830,272 bytes
==9628==
==9628== LEAK SUMMARY:
==9628== definitely lost: 2,181 bytes in 11 blocks
==9628== indirectly lost: 6,756 bytes in 7 blocks
==9628== possibly lost: 0 bytes in 0 blocks
==9628== still reachable: 3,160,135 bytes in 70,014 blocks
==9628== suppressed: 0 bytes in 0 blocks
==9628== Rerun with --leak-check=full to see details of leaked memory
==9628==
==9628== Use --track-origins=yes to see where uninitialised values come from
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628==
==9628== 1 errors in context 1 of 2:
==9628== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9628== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9628== by 0x488CD0: stringsubst (subst.c:301)
==9628== by 0x48801B: prefork (subst.c:77)
==9628== by 0x42B318: execcmd (exec.c:2619)
==9628== by 0x428CA0: execpline2 (exec.c:1697)
==9628== by 0x427FD2: execpline (exec.c:1484)
==9628== by 0x427756: execlist (exec.c:1267)
==9628== by 0x42717C: execode (exec.c:1073)
==9628== by 0x431299: runshfunc (exec.c:5040)
==9628== by 0x430E76: doshfunc (exec.c:4920)
==9628== by 0x4302FB: execshfunc (exec.c:4557)
==9628== by 0x42D8C1: execcmd (exec.c:3373)
==9628==
==9628==
==9628== 2 errors in context 2 of 2:
==9628== Conditional jump or move depends on uninitialised value(s)
==9628== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9628== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9628== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9628== by 0x40EFC2: execbuiltin (builtin.c:450)
==9628== by 0x42D8E9: execcmd (exec.c:3378)
==9628== by 0x428CA0: execpline2 (exec.c:1697)
==9628== by 0x427FD2: execpline (exec.c:1484)
==9628== by 0x42779A: execlist (exec.c:1275)
==9628== by 0x42717C: execode (exec.c:1073)
==9628== by 0x431299: runshfunc (exec.c:5040)
==9628== by 0x430E76: doshfunc (exec.c:4920)
==9628== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9628==
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9631-by-pythonnut-on-???
==9631== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9631-by-pythonnut-on-???
==9631== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9631-by-pythonnut-on-???
==9631==
==9631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9631== don't want to do, unless you know exactly what you're doing,
==9631== or are doing some strange experiment):
==9631== /usr/lib/valgrind/../../bin/vgdb --pid=9631 ...command...
==9631==
==9631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9631== /path/to/gdb ./zsh
==9631== and then give GDB the following command
==9631== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9631
==9631== --pid is optional if only one valgrind process is running
==9631==
--9631-- Caught __NR_exit; running __libc_freeres()
--9631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9631==
==9631== HEAP SUMMARY:
==9631== in use at exit: 3,169,215 bytes in 70,032 blocks
==9631== total heap usage: 1,462,977 allocs, 1,392,945 frees, 117,628,367 bytes allocated
==9631==
==9631== Searching for pointers to 70,032 not-freed blocks
--9631-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9631-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9631-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9631-- Scanning root segment: 0x4037000..0x403afff (16384)
--9631-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9631-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9631-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9631-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9631-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9631-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9631-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9631-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9631-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9631-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9631-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9631-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9631-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9631-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9631-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9631-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9631-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9631-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9631-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9631-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9631-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9631-- Scanning root segment: 0x701a000..0x701afff (4096)
--9631-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9631-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9631-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9631-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9631-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9631-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9631-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9631-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9631-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9631== Checked 4,831,768 bytes
==9631==
==9631== LEAK SUMMARY:
==9631== definitely lost: 2,181 bytes in 11 blocks
==9631== indirectly lost: 6,756 bytes in 7 blocks
==9631== possibly lost: 0 bytes in 0 blocks
==9631== still reachable: 3,160,278 bytes in 70,014 blocks
==9631== suppressed: 0 bytes in 0 blocks
==9631== Rerun with --leak-check=full to see details of leaked memory
==9631==
==9631== Use --track-origins=yes to see where uninitialised values come from
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631==
==9631== 1 errors in context 1 of 2:
==9631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9631== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9631== by 0x488CD0: stringsubst (subst.c:301)
==9631== by 0x48801B: prefork (subst.c:77)
==9631== by 0x42B318: execcmd (exec.c:2619)
==9631== by 0x428CA0: execpline2 (exec.c:1697)
==9631== by 0x427FD2: execpline (exec.c:1484)
==9631== by 0x427756: execlist (exec.c:1267)
==9631== by 0x42717C: execode (exec.c:1073)
==9631== by 0x431299: runshfunc (exec.c:5040)
==9631== by 0x430E76: doshfunc (exec.c:4920)
==9631== by 0x4302FB: execshfunc (exec.c:4557)
==9631== by 0x42D8C1: execcmd (exec.c:3373)
==9631==
==9631==
==9631== 2 errors in context 2 of 2:
==9631== Conditional jump or move depends on uninitialised value(s)
==9631== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9631== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9631== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9631== by 0x40EFC2: execbuiltin (builtin.c:450)
==9631== by 0x42D8E9: execcmd (exec.c:3378)
==9631== by 0x428CA0: execpline2 (exec.c:1697)
==9631== by 0x427FD2: execpline (exec.c:1484)
==9631== by 0x42779A: execlist (exec.c:1275)
==9631== by 0x42717C: execode (exec.c:1073)
==9631== by 0x431299: runshfunc (exec.c:5040)
==9631== by 0x430E76: doshfunc (exec.c:4920)
==9631== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9631==
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9632-by-pythonnut-on-???
==9632== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9632-by-pythonnut-on-???
==9632== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9632-by-pythonnut-on-???
==9632==
==9632== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9632== don't want to do, unless you know exactly what you're doing,
==9632== or are doing some strange experiment):
==9632== /usr/lib/valgrind/../../bin/vgdb --pid=9632 ...command...
==9632==
==9632== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9632== /path/to/gdb ./zsh
==9632== and then give GDB the following command
==9632== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9632
==9632== --pid is optional if only one valgrind process is running
==9632==
--9633-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==9633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9633-by-pythonnut-on-???
==9633== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9633-by-pythonnut-on-???
==9633== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9633-by-pythonnut-on-???
==9633==
==9633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9633== don't want to do, unless you know exactly what you're doing,
==9633== or are doing some strange experiment):
==9633== /usr/lib/valgrind/../../bin/vgdb --pid=9633 ...command...
==9633==
==9633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9633== /path/to/gdb ./zsh
==9633== and then give GDB the following command
==9633== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9633
==9633== --pid is optional if only one valgrind process is running
==9633==
--9633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9633==
==9633== HEAP SUMMARY:
==9633== in use at exit: 3,119,586 bytes in 68,912 blocks
==9633== total heap usage: 1,463,288 allocs, 1,394,376 frees, 117,667,848 bytes allocated
==9633==
==9633== Searching for pointers to 68,912 not-freed blocks
--9633-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9633-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9633-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9633-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9633-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9633-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9633-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9633-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9633-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9633-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9633-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9633-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9633-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9633-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9633-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9633-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9633-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9633-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9633-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9633-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9633-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9633-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9633-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9633-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9633-- Scanning root segment: 0x701a000..0x701afff (4096)
--9633-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9633-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9633-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9633-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9633-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9633-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9633-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9633-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9633-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9633== Checked 4,762,840 bytes
==9633==
==9633== LEAK SUMMARY:
==9633== definitely lost: 2,181 bytes in 11 blocks
==9633== indirectly lost: 6,756 bytes in 7 blocks
==9633== possibly lost: 0 bytes in 0 blocks
==9633== still reachable: 3,110,649 bytes in 68,894 blocks
==9633== suppressed: 0 bytes in 0 blocks
==9633== Rerun with --leak-check=full to see details of leaked memory
==9633==
==9633== Use --track-origins=yes to see where uninitialised values come from
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9633==
==9633== 1 errors in context 1 of 2:
==9633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9633== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9633== by 0x488CD0: stringsubst (subst.c:301)
==9633== by 0x48801B: prefork (subst.c:77)
==9633== by 0x42B318: execcmd (exec.c:2619)
==9633== by 0x428CA0: execpline2 (exec.c:1697)
==9633== by 0x427FD2: execpline (exec.c:1484)
==9633== by 0x427756: execlist (exec.c:1267)
==9633== by 0x42717C: execode (exec.c:1073)
==9633== by 0x431299: runshfunc (exec.c:5040)
==9633== by 0x430E76: doshfunc (exec.c:4920)
==9633== by 0x4302FB: execshfunc (exec.c:4557)
==9633== by 0x42D8C1: execcmd (exec.c:3373)
==9633==
==9633==
==9633== 2 errors in context 2 of 2:
==9633== Conditional jump or move depends on uninitialised value(s)
==9633== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9633== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9633== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9633== by 0x40EFC2: execbuiltin (builtin.c:450)
==9633== by 0x42D8E9: execcmd (exec.c:3378)
==9633== by 0x428CA0: execpline2 (exec.c:1697)
==9633== by 0x427FD2: execpline (exec.c:1484)
==9633== by 0x42779A: execlist (exec.c:1275)
==9633== by 0x42717C: execode (exec.c:1073)
==9633== by 0x431299: runshfunc (exec.c:5040)
==9633== by 0x430E76: doshfunc (exec.c:4920)
==9633== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9633==
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9632-- Caught __NR_exit; running __libc_freeres()
--9632-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9632==
==9632== HEAP SUMMARY:
==9632== in use at exit: 3,119,187 bytes in 68,902 blocks
==9632== total heap usage: 1,463,290 allocs, 1,394,388 frees, 117,668,392 bytes allocated
==9632==
==9632== Searching for pointers to 68,902 not-freed blocks
--9632-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9632-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9632-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9632-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9632-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9632-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9632-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9632-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9632-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9632-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9632-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9632-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9632-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9632-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9632-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9632-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9632-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9632-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9632-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9632-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9632-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9632-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9632-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9632-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9632-- Scanning root segment: 0x701a000..0x701afff (4096)
--9632-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9632-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9632-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9632-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9632-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9632-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9632-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9632-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9632-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9632== Checked 4,760,464 bytes
==9632==
==9632== LEAK SUMMARY:
==9632== definitely lost: 2,181 bytes in 11 blocks
==9632== indirectly lost: 6,756 bytes in 7 blocks
==9632== possibly lost: 0 bytes in 0 blocks
==9632== still reachable: 3,110,250 bytes in 68,884 blocks
==9632== suppressed: 0 bytes in 0 blocks
==9632== Rerun with --leak-check=full to see details of leaked memory
==9632==
==9632== Use --track-origins=yes to see where uninitialised values come from
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632==
==9632== 1 errors in context 1 of 2:
==9632== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9632== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9632== by 0x488CD0: stringsubst (subst.c:301)
==9632== by 0x48801B: prefork (subst.c:77)
==9632== by 0x42B318: execcmd (exec.c:2619)
==9632== by 0x428CA0: execpline2 (exec.c:1697)
==9632== by 0x427FD2: execpline (exec.c:1484)
==9632== by 0x427756: execlist (exec.c:1267)
==9632== by 0x42717C: execode (exec.c:1073)
==9632== by 0x431299: runshfunc (exec.c:5040)
==9632== by 0x430E76: doshfunc (exec.c:4920)
==9632== by 0x4302FB: execshfunc (exec.c:4557)
==9632== by 0x42D8C1: execcmd (exec.c:3373)
==9632==
==9632==
==9632== 2 errors in context 2 of 2:
==9632== Conditional jump or move depends on uninitialised value(s)
==9632== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9632== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9632== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9632== by 0x40EFC2: execbuiltin (builtin.c:450)
==9632== by 0x42D8E9: execcmd (exec.c:3378)
==9632== by 0x428CA0: execpline2 (exec.c:1697)
==9632== by 0x427FD2: execpline (exec.c:1484)
==9632== by 0x42779A: execlist (exec.c:1275)
==9632== by 0x42717C: execode (exec.c:1073)
==9632== by 0x431299: runshfunc (exec.c:5040)
==9632== by 0x430E76: doshfunc (exec.c:4920)
==9632== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9632==
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9636-- Caught __NR_exit; running __libc_freeres()
==9636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9636-by-pythonnut-on-???
==9636== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9636-by-pythonnut-on-???
==9636== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9636-by-pythonnut-on-???
==9636==
==9636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9636== don't want to do, unless you know exactly what you're doing,
==9636== or are doing some strange experiment):
==9636== /usr/lib/valgrind/../../bin/vgdb --pid=9636 ...command...
==9636==
==9636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9636== /path/to/gdb ./zsh
==9636== and then give GDB the following command
==9636== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9636
==9636== --pid is optional if only one valgrind process is running
==9636==
client request: code 4d430005, addr 0xFFEFF268C, len 4
client request: code 4d430005, addr 0xFFEFF25EC, len 4
--9636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9636==
==9636== HEAP SUMMARY:
==9636== in use at exit: 3,119,675 bytes in 68,914 blocks
==9636== total heap usage: 1,463,330 allocs, 1,394,416 frees, 117,684,108 bytes allocated
==9636==
==9636== Searching for pointers to 68,914 not-freed blocks
--9636-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9636-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9636-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9636-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9636-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9636-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9636-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9636-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9636-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9636-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9636-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9636-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9636-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9636-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9636-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9636-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9636-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9636-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9636-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9636-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9636-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9636-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9636-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9636-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9636-- Scanning root segment: 0x701a000..0x701afff (4096)
--9636-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9636-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9636-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9636-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9636-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9636-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9636-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9636-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9636-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9636== Checked 4,763,616 bytes
==9636==
==9636== LEAK SUMMARY:
==9636== definitely lost: 2,181 bytes in 11 blocks
==9636== indirectly lost: 6,756 bytes in 7 blocks
==9636== possibly lost: 0 bytes in 0 blocks
==9636== still reachable: 3,110,738 bytes in 68,896 blocks
==9636== suppressed: 0 bytes in 0 blocks
==9636== Rerun with --leak-check=full to see details of leaked memory
==9636==
==9636== Use --track-origins=yes to see where uninitialised values come from
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9636==
==9636== 1 errors in context 1 of 2:
==9636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9636== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9636== by 0x488CD0: stringsubst (subst.c:301)
==9636== by 0x48801B: prefork (subst.c:77)
==9636== by 0x42B318: execcmd (exec.c:2619)
==9636== by 0x428CA0: execpline2 (exec.c:1697)
==9636== by 0x427FD2: execpline (exec.c:1484)
==9636== by 0x427756: execlist (exec.c:1267)
==9636== by 0x42717C: execode (exec.c:1073)
==9636== by 0x431299: runshfunc (exec.c:5040)
==9636== by 0x430E76: doshfunc (exec.c:4920)
==9636== by 0x4302FB: execshfunc (exec.c:4557)
==9636== by 0x42D8C1: execcmd (exec.c:3373)
==9636==
==9636==
==9636== 2 errors in context 2 of 2:
==9636== Conditional jump or move depends on uninitialised value(s)
==9636== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9636== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9636== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9636== by 0x40EFC2: execbuiltin (builtin.c:450)
==9636== by 0x42D8E9: execcmd (exec.c:3378)
==9636== by 0x428CA0: execpline2 (exec.c:1697)
==9636== by 0x427FD2: execpline (exec.c:1484)
==9636== by 0x42779A: execlist (exec.c:1275)
==9636== by 0x42717C: execode (exec.c:1073)
==9636== by 0x431299: runshfunc (exec.c:5040)
==9636== by 0x430E76: doshfunc (exec.c:4920)
==9636== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9636==
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9635-- Caught __NR_exit; running __libc_freeres()
==9635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9635-by-pythonnut-on-???
==9635== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9635-by-pythonnut-on-???
==9635== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9635-by-pythonnut-on-???
==9635==
==9635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9635== don't want to do, unless you know exactly what you're doing,
==9635== or are doing some strange experiment):
==9635== /usr/lib/valgrind/../../bin/vgdb --pid=9635 ...command...
==9635==
==9635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9635== /path/to/gdb ./zsh
==9635== and then give GDB the following command
==9635== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9635
==9635== --pid is optional if only one valgrind process is running
==9635==
--9635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9635==
==9635== HEAP SUMMARY:
==9635== in use at exit: 3,119,624 bytes in 68,915 blocks
==9635== total heap usage: 1,463,327 allocs, 1,394,412 frees, 117,680,580 bytes allocated
==9635==
==9635== Searching for pointers to 68,915 not-freed blocks
--9635-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9635-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9635-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9635-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9635-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9635-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9635-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9635-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9635-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9635-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9635-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9635-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9635-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9635-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9635-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9635-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9635-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9635-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9635-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9635-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9635-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9635-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9635-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9635-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9635-- Scanning root segment: 0x701a000..0x701afff (4096)
--9635-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9635-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9635-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9635-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9635-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9635-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9635-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9635-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9635-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9635== Checked 4,763,224 bytes
==9635==
==9635== LEAK SUMMARY:
==9635== definitely lost: 2,181 bytes in 11 blocks
==9635== indirectly lost: 6,756 bytes in 7 blocks
==9635== possibly lost: 0 bytes in 0 blocks
==9635== still reachable: 3,110,687 bytes in 68,897 blocks
==9635== suppressed: 0 bytes in 0 blocks
==9635== Rerun with --leak-check=full to see details of leaked memory
==9635==
==9635== Use --track-origins=yes to see where uninitialised values come from
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9635==
==9635== 1 errors in context 1 of 2:
==9635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9635== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9635== by 0x488CD0: stringsubst (subst.c:301)
==9635== by 0x48801B: prefork (subst.c:77)
==9635== by 0x42B318: execcmd (exec.c:2619)
==9635== by 0x428CA0: execpline2 (exec.c:1697)
==9635== by 0x427FD2: execpline (exec.c:1484)
==9635== by 0x427756: execlist (exec.c:1267)
==9635== by 0x42717C: execode (exec.c:1073)
==9635== by 0x431299: runshfunc (exec.c:5040)
==9635== by 0x430E76: doshfunc (exec.c:4920)
==9635== by 0x4302FB: execshfunc (exec.c:4557)
==9635== by 0x42D8C1: execcmd (exec.c:3373)
==9635==
==9635==
==9635== 2 errors in context 2 of 2:
==9635== Conditional jump or move depends on uninitialised value(s)
==9635== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9635== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9635== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9635== by 0x40EFC2: execbuiltin (builtin.c:450)
==9635== by 0x42D8E9: execcmd (exec.c:3378)
==9635== by 0x428CA0: execpline2 (exec.c:1697)
==9635== by 0x427FD2: execpline (exec.c:1484)
==9635== by 0x42779A: execlist (exec.c:1275)
==9635== by 0x42717C: execode (exec.c:1073)
==9635== by 0x431299: runshfunc (exec.c:5040)
==9635== by 0x430E76: doshfunc (exec.c:4920)
==9635== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9635==
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--9639-- Caught __NR_exit; running __libc_freeres()
==9639== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9639-by-pythonnut-on-???
==9639== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9639-by-pythonnut-on-???
==9639== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9639-by-pythonnut-on-???
==9639==
==9639== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9639== don't want to do, unless you know exactly what you're doing,
==9639== or are doing some strange experiment):
==9639== /usr/lib/valgrind/../../bin/vgdb --pid=9639 ...command...
==9639==
==9639== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9639== /path/to/gdb ./zsh
==9639== and then give GDB the following command
==9639== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9639
==9639== --pid is optional if only one valgrind process is running
==9639==
--9639-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9639==
==9639== HEAP SUMMARY:
==9639== in use at exit: 3,119,925 bytes in 68,920 blocks
==9639== total heap usage: 1,463,338 allocs, 1,394,418 frees, 117,685,674 bytes allocated
==9639==
==9639== Searching for pointers to 68,920 not-freed blocks
--9639-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9639-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9639-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9639-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9639-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9639-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9639-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9639-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9639-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9639-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9639-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9639-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9639-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9639-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9639-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9639-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9639-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9639-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9639-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9639-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9639-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9639-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9639-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9639-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9639-- Scanning root segment: 0x701a000..0x701afff (4096)
--9639-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9639-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9639-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9639-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9639-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9639-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9639-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9639-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9639-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9639== Checked 4,763,272 bytes
==9639==
==9639== LEAK SUMMARY:
==9639== definitely lost: 2,181 bytes in 11 blocks
==9639== indirectly lost: 6,756 bytes in 7 blocks
==9639== possibly lost: 0 bytes in 0 blocks
==9639== still reachable: 3,110,988 bytes in 68,902 blocks
==9639== suppressed: 0 bytes in 0 blocks
==9639== Rerun with --leak-check=full to see details of leaked memory
==9639==
==9639== Use --track-origins=yes to see where uninitialised values come from
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9639==
==9639== 1 errors in context 1 of 2:
==9639== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9639== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9639== by 0x488CD0: stringsubst (subst.c:301)
==9639== by 0x48801B: prefork (subst.c:77)
==9639== by 0x42B318: execcmd (exec.c:2619)
==9639== by 0x428CA0: execpline2 (exec.c:1697)
==9639== by 0x427FD2: execpline (exec.c:1484)
==9639== by 0x427756: execlist (exec.c:1267)
==9639== by 0x42717C: execode (exec.c:1073)
==9639== by 0x431299: runshfunc (exec.c:5040)
==9639== by 0x430E76: doshfunc (exec.c:4920)
==9639== by 0x4302FB: execshfunc (exec.c:4557)
==9639== by 0x42D8C1: execcmd (exec.c:3373)
==9639==
==9639==
==9639== 2 errors in context 2 of 2:
==9639== Conditional jump or move depends on uninitialised value(s)
==9639== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9639== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9639== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9639== by 0x40EFC2: execbuiltin (builtin.c:450)
==9639== by 0x42D8E9: execcmd (exec.c:3378)
==9639== by 0x428CA0: execpline2 (exec.c:1697)
==9639== by 0x427FD2: execpline (exec.c:1484)
==9639== by 0x42779A: execlist (exec.c:1275)
==9639== by 0x42717C: execode (exec.c:1073)
==9639== by 0x431299: runshfunc (exec.c:5040)
==9639== by 0x430E76: doshfunc (exec.c:4920)
==9639== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9639==
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF272C, len 4
--9643-- Caught __NR_exit; running __libc_freeres()
==9643== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9643-by-pythonnut-on-???
==9643== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9643-by-pythonnut-on-???
==9643== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9643-by-pythonnut-on-???
==9643==
==9643== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9643== don't want to do, unless you know exactly what you're doing,
==9643== or are doing some strange experiment):
==9643== /usr/lib/valgrind/../../bin/vgdb --pid=9643 ...command...
==9643==
==9643== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9643== /path/to/gdb ./zsh
==9643== and then give GDB the following command
==9643== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9643
==9643== --pid is optional if only one valgrind process is running
==9643==
--9643-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9643==
==9643== HEAP SUMMARY:
==9643== in use at exit: 3,120,032 bytes in 68,924 blocks
==9643== total heap usage: 1,463,346 allocs, 1,394,422 frees, 117,687,893 bytes allocated
==9643==
==9643== Searching for pointers to 68,924 not-freed blocks
--9643-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9643-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9643-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9643-- Scanning root segment: 0x4037000..0x403afff (16384)
--9643-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9643-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9643-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9643-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9643-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9643-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9643-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9643-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9643-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9643-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9643-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9643-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9643-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9643-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9643-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9643-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9643-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9643-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9643-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9643-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9643-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9643-- Scanning root segment: 0x701a000..0x701afff (4096)
--9643-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9643-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9643-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9643-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9643-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9643-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9643-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9643-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9643-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9643== Checked 4,780,024 bytes
==9643==
==9643== LEAK SUMMARY:
==9643== definitely lost: 2,181 bytes in 11 blocks
==9643== indirectly lost: 6,756 bytes in 7 blocks
==9643== possibly lost: 0 bytes in 0 blocks
==9643== still reachable: 3,111,095 bytes in 68,906 blocks
==9643== suppressed: 0 bytes in 0 blocks
==9643== Rerun with --leak-check=full to see details of leaked memory
==9643==
==9643== Use --track-origins=yes to see where uninitialised values come from
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9643==
==9643== 1 errors in context 1 of 2:
==9643== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9643== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9643== by 0x488CD0: stringsubst (subst.c:301)
==9643== by 0x48801B: prefork (subst.c:77)
==9643== by 0x42B318: execcmd (exec.c:2619)
==9643== by 0x428CA0: execpline2 (exec.c:1697)
==9643== by 0x427FD2: execpline (exec.c:1484)
==9643== by 0x427756: execlist (exec.c:1267)
==9643== by 0x42717C: execode (exec.c:1073)
==9643== by 0x431299: runshfunc (exec.c:5040)
==9643== by 0x430E76: doshfunc (exec.c:4920)
==9643== by 0x4302FB: execshfunc (exec.c:4557)
==9643== by 0x42D8C1: execcmd (exec.c:3373)
==9643==
==9643==
==9643== 2 errors in context 2 of 2:
==9643== Conditional jump or move depends on uninitialised value(s)
==9643== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9643== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9643== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9643== by 0x40EFC2: execbuiltin (builtin.c:450)
==9643== by 0x42D8E9: execcmd (exec.c:3378)
==9643== by 0x428CA0: execpline2 (exec.c:1697)
==9643== by 0x427FD2: execpline (exec.c:1484)
==9643== by 0x42779A: execlist (exec.c:1275)
==9643== by 0x42717C: execode (exec.c:1073)
==9643== by 0x431299: runshfunc (exec.c:5040)
==9643== by 0x430E76: doshfunc (exec.c:4920)
==9643== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9643==
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
--9647-- Caught __NR_exit; running __libc_freeres()
==9647== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9647-by-pythonnut-on-???
==9647== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9647-by-pythonnut-on-???
==9647== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9647-by-pythonnut-on-???
==9647==
==9647== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9647== don't want to do, unless you know exactly what you're doing,
==9647== or are doing some strange experiment):
==9647== /usr/lib/valgrind/../../bin/vgdb --pid=9647 ...command...
==9647==
==9647== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9647== /path/to/gdb ./zsh
==9647== and then give GDB the following command
==9647== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9647
==9647== --pid is optional if only one valgrind process is running
==9647==
--9647-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9647==
==9647== HEAP SUMMARY:
==9647== in use at exit: 3,119,292 bytes in 68,907 blocks
==9647== total heap usage: 1,463,396 allocs, 1,394,489 frees, 117,694,788 bytes allocated
==9647==
==9647== Searching for pointers to 68,907 not-freed blocks
--9647-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9647-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9647-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9647-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9647-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9647-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9647-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9647-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9647-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9647-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9647-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9647-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9647-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9647-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9647-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9647-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9647-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9647-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9647-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9647-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9647-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9647-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9647-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9647-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9647-- Scanning root segment: 0x701a000..0x701afff (4096)
--9647-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9647-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9647-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9647-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9647-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9647-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9647-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9647-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9647-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9647== Checked 4,780,160 bytes
==9647==
==9647== LEAK SUMMARY:
==9647== definitely lost: 2,181 bytes in 11 blocks
==9647== indirectly lost: 6,756 bytes in 7 blocks
==9647== possibly lost: 0 bytes in 0 blocks
==9647== still reachable: 3,110,355 bytes in 68,889 blocks
==9647== suppressed: 0 bytes in 0 blocks
==9647== Rerun with --leak-check=full to see details of leaked memory
==9647==
==9647== Use --track-origins=yes to see where uninitialised values come from
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9647==
==9647== 1 errors in context 1 of 2:
==9647== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9647== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9647== by 0x488CD0: stringsubst (subst.c:301)
==9647== by 0x48801B: prefork (subst.c:77)
==9647== by 0x42B318: execcmd (exec.c:2619)
==9647== by 0x428CA0: execpline2 (exec.c:1697)
==9647== by 0x427FD2: execpline (exec.c:1484)
==9647== by 0x427756: execlist (exec.c:1267)
==9647== by 0x42717C: execode (exec.c:1073)
==9647== by 0x431299: runshfunc (exec.c:5040)
==9647== by 0x430E76: doshfunc (exec.c:4920)
==9647== by 0x4302FB: execshfunc (exec.c:4557)
==9647== by 0x42D8C1: execcmd (exec.c:3373)
==9647==
==9647==
==9647== 2 errors in context 2 of 2:
==9647== Conditional jump or move depends on uninitialised value(s)
==9647== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9647== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9647== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9647== by 0x40EFC2: execbuiltin (builtin.c:450)
==9647== by 0x42D8E9: execcmd (exec.c:3378)
==9647== by 0x428CA0: execpline2 (exec.c:1697)
==9647== by 0x427FD2: execpline (exec.c:1484)
==9647== by 0x42779A: execlist (exec.c:1275)
==9647== by 0x42717C: execode (exec.c:1073)
==9647== by 0x431299: runshfunc (exec.c:5040)
==9647== by 0x430E76: doshfunc (exec.c:4920)
==9647== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9647==
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF617C, len 4
==9649== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9649-by-pythonnut-on-???
==9649== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9649-by-pythonnut-on-???
==9649== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9649-by-pythonnut-on-???
==9649==
==9649== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9649== don't want to do, unless you know exactly what you're doing,
==9649== or are doing some strange experiment):
==9649== /usr/lib/valgrind/../../bin/vgdb --pid=9649 ...command...
==9649==
==9649== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9649== /path/to/gdb ./zsh
==9649== and then give GDB the following command
==9649== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9649
==9649== --pid is optional if only one valgrind process is running
==9649==
==9651== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9651-by-pythonnut-on-???
==9651== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9651-by-pythonnut-on-???
==9651== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9651-by-pythonnut-on-???
==9651==
==9651== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9651== don't want to do, unless you know exactly what you're doing,
==9651== or are doing some strange experiment):
==9651== /usr/lib/valgrind/../../bin/vgdb --pid=9651 ...command...
==9651==
==9651== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9651== /path/to/gdb ./zsh
==9651== and then give GDB the following command
==9651== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9651
==9651== --pid is optional if only one valgrind process is running
==9651==
==9652== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9652-by-pythonnut-on-???
==9652== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9652-by-pythonnut-on-???
==9652== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9652-by-pythonnut-on-???
==9652==
==9652== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9652== don't want to do, unless you know exactly what you're doing,
==9652== or are doing some strange experiment):
==9652== /usr/lib/valgrind/../../bin/vgdb --pid=9652 ...command...
==9652==
==9652== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9652== /path/to/gdb ./zsh
==9652== and then give GDB the following command
==9652== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9652
==9652== --pid is optional if only one valgrind process is running
==9652==
==9653== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9653-by-pythonnut-on-???
==9653== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9653-by-pythonnut-on-???
==9653== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9653-by-pythonnut-on-???
==9653==
==9653== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9653== don't want to do, unless you know exactly what you're doing,
==9653== or are doing some strange experiment):
==9653== /usr/lib/valgrind/../../bin/vgdb --pid=9653 ...command...
==9653==
--9652-- Caught __NR_exit; running __libc_freeres()
==9653== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9653== /path/to/gdb ./zsh
==9653== and then give GDB the following command
==9653== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9653
==9653== --pid is optional if only one valgrind process is running
==9653==
client request: code 4d430005, addr 0xFFEFF493C, len 4
==9656== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9656-by-pythonnut-on-???
==9656== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9656-by-pythonnut-on-???
==9656== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9656-by-pythonnut-on-???
==9656==
==9656== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9656== don't want to do, unless you know exactly what you're doing,
==9656== or are doing some strange experiment):
==9656== /usr/lib/valgrind/../../bin/vgdb --pid=9656 ...command...
==9656==
==9656== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9656== /path/to/gdb ./zsh
==9656== and then give GDB the following command
==9656== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9656
==9656== --pid is optional if only one valgrind process is running
==9656==
--9652-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9652==
client request: code 4d430005, addr 0xFFEFF028C, len 4
==9652== HEAP SUMMARY:
==9652== in use at exit: 3,120,381 bytes in 68,961 blocks
==9652== total heap usage: 1,463,632 allocs, 1,394,671 frees, 117,717,222 bytes allocated
==9652==
==9655== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9655-by-pythonnut-on-???
==9655== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9655-by-pythonnut-on-???
==9655== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9655-by-pythonnut-on-???
==9655==
==9655== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9655== don't want to do, unless you know exactly what you're doing,
==9655== or are doing some strange experiment):
==9655== /usr/lib/valgrind/../../bin/vgdb --pid=9655 ...command...
==9655==
==9655== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9655== /path/to/gdb ./zsh
==9655== and then give GDB the following command
==9655== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9655
==9655== --pid is optional if only one valgrind process is running
==9655==
--9655-- Caught __NR_exit; running __libc_freeres()
==9652== Searching for pointers to 68,961 not-freed blocks
--9652-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9652-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9652-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9652-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9652-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9652-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9652-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9652-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9652-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9652-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9652-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9652-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9652-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9652-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9652-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9652-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9652-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9652-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9652-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9652-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9652-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9652-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9652-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9652-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9652-- Scanning root segment: 0x701a000..0x701afff (4096)
--9652-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9652-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9652-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9652-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9652-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9652-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9652-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9652-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9652-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9655-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9655==
==9655== HEAP SUMMARY:
==9655== in use at exit: 3,121,608 bytes in 68,950 blocks
==9655== total heap usage: 1,463,622 allocs, 1,394,672 frees, 117,959,498 bytes allocated
==9655==
==9655== Searching for pointers to 68,950 not-freed blocks
--9655-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9655-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9655-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9655-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9655-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9655-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9655-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9655-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9655-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9655-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9655-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9655-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9655-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9655-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9655-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9655-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9655-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9655-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9655-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9655-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9655-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9655-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9655-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9655-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9655-- Scanning root segment: 0x701a000..0x701afff (4096)
--9655-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9655-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9655-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9655-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9655-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9655-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9655-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9655-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9655-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9652== Checked 4,782,512 bytes
==9652==
==9652== LEAK SUMMARY:
==9652== definitely lost: 2,181 bytes in 11 blocks
==9652== indirectly lost: 6,756 bytes in 7 blocks
==9652== possibly lost: 0 bytes in 0 blocks
==9652== still reachable: 3,111,444 bytes in 68,943 blocks
==9652== suppressed: 0 bytes in 0 blocks
==9652== Rerun with --leak-check=full to see details of leaked memory
==9652==
==9652== Use --track-origins=yes to see where uninitialised values come from
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9652==
==9652== 1 errors in context 1 of 2:
==9652== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9652== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9652== by 0x488CD0: stringsubst (subst.c:301)
==9652== by 0x48801B: prefork (subst.c:77)
==9652== by 0x42B318: execcmd (exec.c:2619)
==9652== by 0x428CA0: execpline2 (exec.c:1697)
==9652== by 0x427FD2: execpline (exec.c:1484)
==9652== by 0x427756: execlist (exec.c:1267)
==9652== by 0x42717C: execode (exec.c:1073)
==9652== by 0x431299: runshfunc (exec.c:5040)
==9652== by 0x430E76: doshfunc (exec.c:4920)
==9652== by 0x4302FB: execshfunc (exec.c:4557)
==9652== by 0x42D8C1: execcmd (exec.c:3373)
==9652==
==9652==
==9652== 2 errors in context 2 of 2:
==9652== Conditional jump or move depends on uninitialised value(s)
==9652== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9652== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9652== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9652== by 0x40EFC2: execbuiltin (builtin.c:450)
==9652== by 0x42D8E9: execcmd (exec.c:3378)
==9652== by 0x428CA0: execpline2 (exec.c:1697)
==9652== by 0x427FD2: execpline (exec.c:1484)
==9652== by 0x42779A: execlist (exec.c:1275)
==9652== by 0x42717C: execode (exec.c:1073)
==9652== by 0x431299: runshfunc (exec.c:5040)
==9652== by 0x430E76: doshfunc (exec.c:4920)
==9652== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9652==
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Caught __NR_exit; running __libc_freeres()
==9655== Checked 4,768,408 bytes
==9655==
==9650== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9650-by-pythonnut-on-???
==9650== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9650-by-pythonnut-on-???
==9650== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9650-by-pythonnut-on-???
==9650==
==9650== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9650== don't want to do, unless you know exactly what you're doing,
==9650== or are doing some strange experiment):
==9650== /usr/lib/valgrind/../../bin/vgdb --pid=9650 ...command...
==9650==
==9650== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9650== /path/to/gdb ./zsh
==9650== and then give GDB the following command
==9650== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9650
==9650== --pid is optional if only one valgrind process is running
==9650==
==9655== LEAK SUMMARY:
==9655== definitely lost: 2,181 bytes in 11 blocks
==9655== indirectly lost: 6,756 bytes in 7 blocks
==9655== possibly lost: 0 bytes in 0 blocks
==9655== still reachable: 3,112,671 bytes in 68,932 blocks
==9655== suppressed: 0 bytes in 0 blocks
==9655== Rerun with --leak-check=full to see details of leaked memory
==9655==
==9655== Use --track-origins=yes to see where uninitialised values come from
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9655==
==9655== 1 errors in context 1 of 2:
==9655== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9655== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9655== by 0x488CD0: stringsubst (subst.c:301)
==9655== by 0x48801B: prefork (subst.c:77)
==9655== by 0x42B318: execcmd (exec.c:2619)
==9655== by 0x428CA0: execpline2 (exec.c:1697)
==9655== by 0x427FD2: execpline (exec.c:1484)
==9655== by 0x427756: execlist (exec.c:1267)
==9655== by 0x42717C: execode (exec.c:1073)
==9655== by 0x431299: runshfunc (exec.c:5040)
==9655== by 0x430E76: doshfunc (exec.c:4920)
==9655== by 0x4302FB: execshfunc (exec.c:4557)
==9655== by 0x42D8C1: execcmd (exec.c:3373)
==9655==
==9655==
==9655== 2 errors in context 2 of 2:
==9655== Conditional jump or move depends on uninitialised value(s)
==9655== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9655== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9655== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9655== by 0x40EFC2: execbuiltin (builtin.c:450)
==9655== by 0x42D8E9: execcmd (exec.c:3378)
==9655== by 0x428CA0: execpline2 (exec.c:1697)
==9655== by 0x427FD2: execpline (exec.c:1484)
==9655== by 0x42779A: execlist (exec.c:1275)
==9655== by 0x42717C: execode (exec.c:1073)
==9655== by 0x431299: runshfunc (exec.c:5040)
==9655== by 0x430E76: doshfunc (exec.c:4920)
==9655== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9655==
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9650==
==9650== HEAP SUMMARY:
==9650== in use at exit: 3,120,317 bytes in 68,958 blocks
==9650== total heap usage: 1,463,630 allocs, 1,394,672 frees, 117,716,981 bytes allocated
==9650==
--9657-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9657== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9657-by-pythonnut-on-???
==9657== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9657-by-pythonnut-on-???
==9657== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9657-by-pythonnut-on-???
==9657==
==9657== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9657== don't want to do, unless you know exactly what you're doing,
==9657== or are doing some strange experiment):
==9657== /usr/lib/valgrind/../../bin/vgdb --pid=9657 ...command...
==9657==
==9657== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9657== /path/to/gdb ./zsh
==9657== and then give GDB the following command
==9657== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9657
==9657== --pid is optional if only one valgrind process is running
==9657==
client request: code 4d430005, addr 0xFFEFF8FCC, len 4
==9650== Searching for pointers to 68,958 not-freed blocks
--9650-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9650-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9650-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9650-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9650-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9650-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9650-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9650-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9650-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9650-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9650-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9650-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9650-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9650-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9650-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9650-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9650-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9650-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9650-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9650-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9650-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9650-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9650-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9650-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9650-- Scanning root segment: 0x701a000..0x701afff (4096)
--9650-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9650-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9650-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9650-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9650-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9650-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9650-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9650-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9650-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF5FBC, len 4
==9650== Checked 4,781,824 bytes
==9650==
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF7C9C, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
client request: code 4d430005, addr 0xFFEFF6CCC, len 4
==9650== LEAK SUMMARY:
==9650== definitely lost: 2,181 bytes in 11 blocks
==9650== indirectly lost: 6,756 bytes in 7 blocks
==9650== possibly lost: 0 bytes in 0 blocks
==9650== still reachable: 3,111,380 bytes in 68,940 blocks
==9650== suppressed: 0 bytes in 0 blocks
==9650== Rerun with --leak-check=full to see details of leaked memory
==9650==
==9650== Use --track-origins=yes to see where uninitialised values come from
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9650==
==9650== 1 errors in context 1 of 2:
==9650== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9650== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9650== by 0x488CD0: stringsubst (subst.c:301)
==9650== by 0x48801B: prefork (subst.c:77)
==9650== by 0x42B318: execcmd (exec.c:2619)
==9650== by 0x428CA0: execpline2 (exec.c:1697)
==9650== by 0x427FD2: execpline (exec.c:1484)
==9650== by 0x427756: execlist (exec.c:1267)
==9650== by 0x42717C: execode (exec.c:1073)
==9650== by 0x431299: runshfunc (exec.c:5040)
==9650== by 0x430E76: doshfunc (exec.c:4920)
==9650== by 0x4302FB: execshfunc (exec.c:4557)
==9650== by 0x42D8C1: execcmd (exec.c:3373)
==9650==
==9650==
==9650== 2 errors in context 2 of 2:
==9650== Conditional jump or move depends on uninitialised value(s)
==9650== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9650== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9650== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9650== by 0x40EFC2: execbuiltin (builtin.c:450)
==9650== by 0x42D8E9: execcmd (exec.c:3378)
==9650== by 0x428CA0: execpline2 (exec.c:1697)
==9650== by 0x427FD2: execpline (exec.c:1484)
==9650== by 0x42779A: execlist (exec.c:1275)
==9650== by 0x42717C: execode (exec.c:1073)
==9650== by 0x431299: runshfunc (exec.c:5040)
==9650== by 0x430E76: doshfunc (exec.c:4920)
==9650== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9650==
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF65AC, len 4
client request: code 4d430005, addr 0xFFEFF773C, len 4
--9658-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEC84C, len 4
==9658== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9658-by-pythonnut-on-???
==9658== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9658-by-pythonnut-on-???
==9658== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9658-by-pythonnut-on-???
==9658==
==9658== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9658== don't want to do, unless you know exactly what you're doing,
==9658== or are doing some strange experiment):
==9658== /usr/lib/valgrind/../../bin/vgdb --pid=9658 ...command...
==9658==
==9658== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9658== /path/to/gdb ./zsh
==9658== and then give GDB the following command
==9658== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9658
==9658== --pid is optional if only one valgrind process is running
==9658==
client request: code 4d430005, addr 0xFFEFF773C, len 4
--9658-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9660-by-pythonnut-on-???
==9660== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9660-by-pythonnut-on-???
==9660== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9660-by-pythonnut-on-???
==9660==
==9660== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9660== don't want to do, unless you know exactly what you're doing,
==9660== or are doing some strange experiment):
==9660== /usr/lib/valgrind/../../bin/vgdb --pid=9660 ...command...
==9660==
==9660== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9660== /path/to/gdb ./zsh
==9660== and then give GDB the following command
==9660== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9660
==9660== --pid is optional if only one valgrind process is running
==9660==
==9658==
==9658== HEAP SUMMARY:
==9658== in use at exit: 3,120,324 bytes in 68,958 blocks
==9658== total heap usage: 1,463,645 allocs, 1,394,687 frees, 117,721,979 bytes allocated
==9658==
client request: code 4d430005, addr 0xFFEFF327C, len 4
client request: code 4d430005, addr 0xFFEFF327C, len 4
==9661== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9661-by-pythonnut-on-???
==9661== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9661-by-pythonnut-on-???
==9661== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9661-by-pythonnut-on-???
==9661==
==9661== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9661== don't want to do, unless you know exactly what you're doing,
==9661== or are doing some strange experiment):
==9661== /usr/lib/valgrind/../../bin/vgdb --pid=9661 ...command...
==9661==
==9661== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9661== /path/to/gdb ./zsh
==9661== and then give GDB the following command
==9661== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9661
==9661== --pid is optional if only one valgrind process is running
==9661==
==9658== Searching for pointers to 68,958 not-freed blocks
--9658-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9658-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9658-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9658-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9658-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9658-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9658-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9658-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9658-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9658-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9658-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9658-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9658-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9658-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9658-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9658-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9658-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9658-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9658-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9658-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9658-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9658-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9658-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9658-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9658-- Scanning root segment: 0x701a000..0x701afff (4096)
--9658-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9658-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9658-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9658-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9658-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9658-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9658-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9658-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9658-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9661-- Caught __NR_exit; running __libc_freeres()
--9661-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661==
==9661== HEAP SUMMARY:
==9661== in use at exit: 3,153,255 bytes in 69,448 blocks
==9661== total heap usage: 1,467,399 allocs, 1,397,951 frees, 119,729,617 bytes allocated
==9661==
==9661== Searching for pointers to 69,448 not-freed blocks
--9661-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9661-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9661-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9661-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9661-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9661-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9661-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9661-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9661-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9661-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9661-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9661-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9661-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9661-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9661-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9661-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9661-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9661-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9661-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9661-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9661-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9661-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9661-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9661-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9661-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9661-- Scanning root segment: 0x701a000..0x701afff (4096)
--9661-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9661-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9661-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9661-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9661-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9661-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9661-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9661-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9661-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9658== Checked 4,781,960 bytes
==9658==
==9658== LEAK SUMMARY:
==9658== definitely lost: 2,181 bytes in 11 blocks
==9658== indirectly lost: 6,756 bytes in 7 blocks
==9658== possibly lost: 0 bytes in 0 blocks
==9658== still reachable: 3,111,387 bytes in 68,940 blocks
==9658== suppressed: 0 bytes in 0 blocks
==9658== Rerun with --leak-check=full to see details of leaked memory
==9658==
==9658== Use --track-origins=yes to see where uninitialised values come from
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9658==
==9658== 1 errors in context 1 of 2:
==9658== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9658== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9658== by 0x488CD0: stringsubst (subst.c:301)
==9658== by 0x48801B: prefork (subst.c:77)
==9658== by 0x42B318: execcmd (exec.c:2619)
==9658== by 0x428CA0: execpline2 (exec.c:1697)
==9658== by 0x427FD2: execpline (exec.c:1484)
==9658== by 0x427756: execlist (exec.c:1267)
==9658== by 0x42717C: execode (exec.c:1073)
==9658== by 0x431299: runshfunc (exec.c:5040)
==9658== by 0x430E76: doshfunc (exec.c:4920)
==9658== by 0x4302FB: execshfunc (exec.c:4557)
==9658== by 0x42D8C1: execcmd (exec.c:3373)
==9658==
==9658==
==9658== 2 errors in context 2 of 2:
==9658== Conditional jump or move depends on uninitialised value(s)
==9658== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9658== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9658== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9658== by 0x40EFC2: execbuiltin (builtin.c:450)
==9658== by 0x42D8E9: execcmd (exec.c:3378)
==9658== by 0x428CA0: execpline2 (exec.c:1697)
==9658== by 0x427FD2: execpline (exec.c:1484)
==9658== by 0x42779A: execlist (exec.c:1275)
==9658== by 0x42717C: execode (exec.c:1073)
==9658== by 0x431299: runshfunc (exec.c:5040)
==9658== by 0x430E76: doshfunc (exec.c:4920)
==9658== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9658==
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9664-- Caught __NR_exit; running __libc_freeres()
==9664== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9664-by-pythonnut-on-???
==9664== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9664-by-pythonnut-on-???
==9664== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9664-by-pythonnut-on-???
==9664==
==9664== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9664== don't want to do, unless you know exactly what you're doing,
==9664== or are doing some strange experiment):
==9664== /usr/lib/valgrind/../../bin/vgdb --pid=9664 ...command...
==9664==
==9664== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9664== /path/to/gdb ./zsh
==9664== and then give GDB the following command
==9664== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9664
==9664== --pid is optional if only one valgrind process is running
==9664==
--9664-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661== Checked 4,856,456 bytes
==9661==
==9664==
==9664== HEAP SUMMARY:
==9664== in use at exit: 3,120,484 bytes in 68,959 blocks
==9664== total heap usage: 1,463,662 allocs, 1,394,703 frees, 117,726,830 bytes allocated
==9664==
==9661== LEAK SUMMARY:
==9661== definitely lost: 2,181 bytes in 11 blocks
==9661== indirectly lost: 6,756 bytes in 7 blocks
==9661== possibly lost: 0 bytes in 0 blocks
==9661== still reachable: 3,144,318 bytes in 69,430 blocks
==9661== suppressed: 0 bytes in 0 blocks
==9661== Rerun with --leak-check=full to see details of leaked memory
==9661==
==9661== Use --track-origins=yes to see where uninitialised values come from
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9661==
==9661== 1 errors in context 1 of 2:
==9661== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9661== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9661== by 0x488CD0: stringsubst (subst.c:301)
==9661== by 0x48801B: prefork (subst.c:77)
==9661== by 0x42B318: execcmd (exec.c:2619)
==9661== by 0x428CA0: execpline2 (exec.c:1697)
==9661== by 0x427FD2: execpline (exec.c:1484)
==9661== by 0x427756: execlist (exec.c:1267)
==9661== by 0x42717C: execode (exec.c:1073)
==9661== by 0x431299: runshfunc (exec.c:5040)
==9661== by 0x430E76: doshfunc (exec.c:4920)
==9661== by 0x4302FB: execshfunc (exec.c:4557)
==9661== by 0x42D8C1: execcmd (exec.c:3373)
==9661==
==9661==
==9661== 2 errors in context 2 of 2:
==9661== Conditional jump or move depends on uninitialised value(s)
==9661== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9661== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9661== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9661== by 0x40EFC2: execbuiltin (builtin.c:450)
==9661== by 0x42D8E9: execcmd (exec.c:3378)
==9661== by 0x428CA0: execpline2 (exec.c:1697)
==9661== by 0x427FD2: execpline (exec.c:1484)
==9661== by 0x42779A: execlist (exec.c:1275)
==9661== by 0x42717C: execode (exec.c:1073)
==9661== by 0x431299: runshfunc (exec.c:5040)
==9661== by 0x430E76: doshfunc (exec.c:4920)
==9661== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9661==
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9660-- Caught __NR_exit; running __libc_freeres()
==9664== Searching for pointers to 68,959 not-freed blocks
--9664-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9664-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9664-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9664-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9664-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9664-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9664-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9664-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9664-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9664-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9664-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9664-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9664-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9664-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9664-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9664-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9664-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9664-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9664-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9664-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9664-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9664-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9664-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9664-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9664-- Scanning root segment: 0x701a000..0x701afff (4096)
--9664-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9664-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9664-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9664-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9664-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9664-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9664-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9664-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9664-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9660-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660==
==9660== HEAP SUMMARY:
==9660== in use at exit: 3,150,973 bytes in 69,368 blocks
==9660== total heap usage: 1,467,304 allocs, 1,397,936 frees, 119,497,678 bytes allocated
==9660==
==9660== Searching for pointers to 69,368 not-freed blocks
--9660-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9660-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9660-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9660-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9660-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9660-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9660-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9660-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9660-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9660-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9660-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9660-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9660-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9660-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9660-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9660-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9660-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9660-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9660-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9660-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9660-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9660-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9660-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9660-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9660-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9660-- Scanning root segment: 0x701a000..0x701afff (4096)
--9660-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9660-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9660-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9660-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9660-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9660-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9660-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9660-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9660-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9664== Checked 4,781,304 bytes
==9664==
==9664== LEAK SUMMARY:
==9664== definitely lost: 2,181 bytes in 11 blocks
==9664== indirectly lost: 6,756 bytes in 7 blocks
==9664== possibly lost: 0 bytes in 0 blocks
==9664== still reachable: 3,111,547 bytes in 68,941 blocks
==9664== suppressed: 0 bytes in 0 blocks
==9664== Rerun with --leak-check=full to see details of leaked memory
==9664==
==9664== Use --track-origins=yes to see where uninitialised values come from
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9664==
==9664== 1 errors in context 1 of 2:
==9664== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9664== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9664== by 0x488CD0: stringsubst (subst.c:301)
==9664== by 0x48801B: prefork (subst.c:77)
==9664== by 0x42B318: execcmd (exec.c:2619)
==9664== by 0x428CA0: execpline2 (exec.c:1697)
==9664== by 0x427FD2: execpline (exec.c:1484)
==9664== by 0x427756: execlist (exec.c:1267)
==9664== by 0x42717C: execode (exec.c:1073)
==9664== by 0x431299: runshfunc (exec.c:5040)
==9664== by 0x430E76: doshfunc (exec.c:4920)
==9664== by 0x4302FB: execshfunc (exec.c:4557)
==9664== by 0x42D8C1: execcmd (exec.c:3373)
==9664==
==9664==
==9664== 2 errors in context 2 of 2:
==9664== Conditional jump or move depends on uninitialised value(s)
==9664== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9664== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9664== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9664== by 0x40EFC2: execbuiltin (builtin.c:450)
==9664== by 0x42D8E9: execcmd (exec.c:3378)
==9664== by 0x428CA0: execpline2 (exec.c:1697)
==9664== by 0x427FD2: execpline (exec.c:1484)
==9664== by 0x42779A: execlist (exec.c:1275)
==9664== by 0x42717C: execode (exec.c:1073)
==9664== by 0x431299: runshfunc (exec.c:5040)
==9664== by 0x430E76: doshfunc (exec.c:4920)
==9664== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9664==
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9665-by-pythonnut-on-???
==9665== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9665-by-pythonnut-on-???
==9665== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9665-by-pythonnut-on-???
==9665==
==9665== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9665== don't want to do, unless you know exactly what you're doing,
==9665== or are doing some strange experiment):
==9665== /usr/lib/valgrind/../../bin/vgdb --pid=9665 ...command...
==9665==
==9665== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9665== /path/to/gdb ./zsh
==9665== and then give GDB the following command
==9665== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9665
==9665== --pid is optional if only one valgrind process is running
==9665==
--9665-- Caught __NR_exit; running __libc_freeres()
==9660== Checked 4,852,480 bytes
==9660==
--9665-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9665==
==9665== HEAP SUMMARY:
==9665== in use at exit: 3,120,658 bytes in 68,964 blocks
==9665== total heap usage: 1,463,709 allocs, 1,394,745 frees, 117,735,782 bytes allocated
==9665==
==9660== LEAK SUMMARY:
==9660== definitely lost: 2,181 bytes in 11 blocks
==9660== indirectly lost: 6,756 bytes in 7 blocks
==9660== possibly lost: 0 bytes in 0 blocks
==9660== still reachable: 3,142,036 bytes in 69,350 blocks
==9660== suppressed: 0 bytes in 0 blocks
==9660== Rerun with --leak-check=full to see details of leaked memory
==9660==
==9660== Use --track-origins=yes to see where uninitialised values come from
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9660==
==9660== 1 errors in context 1 of 2:
==9660== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9660== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9660== by 0x488CD0: stringsubst (subst.c:301)
==9660== by 0x48801B: prefork (subst.c:77)
==9660== by 0x42B318: execcmd (exec.c:2619)
==9660== by 0x428CA0: execpline2 (exec.c:1697)
==9660== by 0x427FD2: execpline (exec.c:1484)
==9660== by 0x427756: execlist (exec.c:1267)
==9660== by 0x42717C: execode (exec.c:1073)
==9660== by 0x431299: runshfunc (exec.c:5040)
==9660== by 0x430E76: doshfunc (exec.c:4920)
==9660== by 0x4302FB: execshfunc (exec.c:4557)
==9660== by 0x42D8C1: execcmd (exec.c:3373)
==9660==
==9660==
==9660== 2 errors in context 2 of 2:
==9660== Conditional jump or move depends on uninitialised value(s)
==9660== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9660== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9660== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9660== by 0x40EFC2: execbuiltin (builtin.c:450)
==9660== by 0x42D8E9: execcmd (exec.c:3378)
==9660== by 0x428CA0: execpline2 (exec.c:1697)
==9660== by 0x427FD2: execpline (exec.c:1484)
==9660== by 0x42779A: execlist (exec.c:1275)
==9660== by 0x42717C: execode (exec.c:1073)
==9660== by 0x431299: runshfunc (exec.c:5040)
==9660== by 0x430E76: doshfunc (exec.c:4920)
==9660== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9660==
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9666-by-pythonnut-on-???
==9666== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9666-by-pythonnut-on-???
==9666== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9666-by-pythonnut-on-???
==9666==
==9666== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9666== don't want to do, unless you know exactly what you're doing,
==9666== or are doing some strange experiment):
==9666== /usr/lib/valgrind/../../bin/vgdb --pid=9666 ...command...
==9666==
==9666== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9666== /path/to/gdb ./zsh
==9666== and then give GDB the following command
==9666== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9666
==9666== --pid is optional if only one valgrind process is running
==9666==
==9665== Searching for pointers to 68,964 not-freed blocks
--9665-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9665-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9665-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9665-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9665-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9665-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9665-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9665-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9665-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9665-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9665-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9665-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9665-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9665-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9665-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9665-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9665-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9665-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9665-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9665-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9665-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9665-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9665-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9665-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9665-- Scanning root segment: 0x701a000..0x701afff (4096)
--9665-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9665-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9665-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9665-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9665-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9665-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9665-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9665-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9665-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
client request: code 4d430005, addr 0xFFEFF2BEC, len 4
==9667== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9667-by-pythonnut-on-???
==9667== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9667-by-pythonnut-on-???
==9667== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9667-by-pythonnut-on-???
==9667==
==9667== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9667== don't want to do, unless you know exactly what you're doing,
==9667== or are doing some strange experiment):
==9667== /usr/lib/valgrind/../../bin/vgdb --pid=9667 ...command...
==9667==
==9667== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9667== /path/to/gdb ./zsh
==9667== and then give GDB the following command
==9667== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9667
==9667== --pid is optional if only one valgrind process is running
==9667==
--9667-- Caught __NR_exit; running __libc_freeres()
--9667-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9667==
==9667== HEAP SUMMARY:
==9667== in use at exit: 3,153,502 bytes in 69,456 blocks
==9667== total heap usage: 1,467,416 allocs, 1,397,960 frees, 119,699,788 bytes allocated
==9667==
==9667== Searching for pointers to 69,456 not-freed blocks
--9667-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9667-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9667-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9667-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9667-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9667-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9667-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9667-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9667-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9667-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9667-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9667-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9667-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9667-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9667-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9667-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9667-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9667-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9667-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9667-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9667-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9667-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9667-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9667-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9667-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9667-- Scanning root segment: 0x701a000..0x701afff (4096)
--9667-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9667-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9667-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9667-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9667-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9667-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9667-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9667-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9667-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9665== Checked 4,781,384 bytes
==9665==
==9665== LEAK SUMMARY:
==9665== definitely lost: 2,181 bytes in 11 blocks
==9665== indirectly lost: 6,756 bytes in 7 blocks
==9665== possibly lost: 0 bytes in 0 blocks
==9665== still reachable: 3,111,721 bytes in 68,946 blocks
==9665== suppressed: 0 bytes in 0 blocks
==9665== Rerun with --leak-check=full to see details of leaked memory
==9665==
==9665== Use --track-origins=yes to see where uninitialised values come from
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665==
==9665== 1 errors in context 1 of 2:
==9665== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9665== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9665== by 0x488CD0: stringsubst (subst.c:301)
==9665== by 0x48801B: prefork (subst.c:77)
==9665== by 0x42B318: execcmd (exec.c:2619)
==9665== by 0x428CA0: execpline2 (exec.c:1697)
==9665== by 0x427FD2: execpline (exec.c:1484)
==9665== by 0x427756: execlist (exec.c:1267)
==9665== by 0x42717C: execode (exec.c:1073)
==9665== by 0x431299: runshfunc (exec.c:5040)
==9665== by 0x430E76: doshfunc (exec.c:4920)
==9665== by 0x4302FB: execshfunc (exec.c:4557)
==9665== by 0x42D8C1: execcmd (exec.c:3373)
==9665==
==9665==
==9665== 2 errors in context 2 of 2:
==9665== Conditional jump or move depends on uninitialised value(s)
==9665== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9665== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9665== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9665== by 0x40EFC2: execbuiltin (builtin.c:450)
==9665== by 0x42D8E9: execcmd (exec.c:3378)
==9665== by 0x428CA0: execpline2 (exec.c:1697)
==9665== by 0x427FD2: execpline (exec.c:1484)
==9665== by 0x42779A: execlist (exec.c:1275)
==9665== by 0x42717C: execode (exec.c:1073)
==9665== by 0x431299: runshfunc (exec.c:5040)
==9665== by 0x430E76: doshfunc (exec.c:4920)
==9665== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9665==
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9668-- Caught __NR_exit; running __libc_freeres()
==9668== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9668-by-pythonnut-on-???
==9668== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9668-by-pythonnut-on-???
==9668== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9668-by-pythonnut-on-???
==9668==
==9668== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9668== don't want to do, unless you know exactly what you're doing,
==9668== or are doing some strange experiment):
==9668== /usr/lib/valgrind/../../bin/vgdb --pid=9668 ...command...
==9668==
==9668== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9668== /path/to/gdb ./zsh
==9668== and then give GDB the following command
==9668== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9668
==9668== --pid is optional if only one valgrind process is running
==9668==
--9668-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9668==
==9668== HEAP SUMMARY:
==9668== in use at exit: 3,120,594 bytes in 68,964 blocks
==9668== total heap usage: 1,463,689 allocs, 1,394,725 frees, 117,733,552 bytes allocated
==9668==
==9667== Checked 4,857,184 bytes
==9667==
==9668== Searching for pointers to 68,964 not-freed blocks
--9668-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9668-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9668-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9668-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9668-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9668-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9668-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9668-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9668-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9668-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9668-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9668-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9668-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9668-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9668-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9668-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9668-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9668-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9668-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9668-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9668-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9668-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9668-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9668-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9668-- Scanning root segment: 0x701a000..0x701afff (4096)
--9668-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9668-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9668-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9668-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9668-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9668-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9668-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9668-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9668-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9667== LEAK SUMMARY:
==9667== definitely lost: 2,181 bytes in 11 blocks
==9667== indirectly lost: 6,756 bytes in 7 blocks
==9667== possibly lost: 0 bytes in 0 blocks
==9667== still reachable: 3,144,565 bytes in 69,438 blocks
==9667== suppressed: 0 bytes in 0 blocks
==9667== Rerun with --leak-check=full to see details of leaked memory
==9667==
==9667== Use --track-origins=yes to see where uninitialised values come from
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9667==
==9667== 1 errors in context 1 of 2:
==9667== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9667== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9667== by 0x488CD0: stringsubst (subst.c:301)
==9667== by 0x48801B: prefork (subst.c:77)
==9667== by 0x42B318: execcmd (exec.c:2619)
==9667== by 0x428CA0: execpline2 (exec.c:1697)
==9667== by 0x427FD2: execpline (exec.c:1484)
==9667== by 0x427756: execlist (exec.c:1267)
==9667== by 0x42717C: execode (exec.c:1073)
==9667== by 0x431299: runshfunc (exec.c:5040)
==9667== by 0x430E76: doshfunc (exec.c:4920)
==9667== by 0x4302FB: execshfunc (exec.c:4557)
==9667== by 0x42D8C1: execcmd (exec.c:3373)
==9667==
==9667==
==9667== 2 errors in context 2 of 2:
==9667== Conditional jump or move depends on uninitialised value(s)
==9667== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9667== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9667== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9667== by 0x40EFC2: execbuiltin (builtin.c:450)
==9667== by 0x42D8E9: execcmd (exec.c:3378)
==9667== by 0x428CA0: execpline2 (exec.c:1697)
==9667== by 0x427FD2: execpline (exec.c:1484)
==9667== by 0x42779A: execlist (exec.c:1275)
==9667== by 0x42717C: execode (exec.c:1073)
==9667== by 0x431299: runshfunc (exec.c:5040)
==9667== by 0x430E76: doshfunc (exec.c:4920)
==9667== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9667==
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9666-- Caught __NR_exit; running __libc_freeres()
--9666-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9666==
==9666== HEAP SUMMARY:
==9666== in use at exit: 3,151,246 bytes in 69,376 blocks
==9666== total heap usage: 1,467,319 allocs, 1,397,943 frees, 119,500,591 bytes allocated
==9666==
==9666== Searching for pointers to 69,376 not-freed blocks
--9666-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9666-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9666-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9666-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9666-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9666-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9666-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9666-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9666-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9666-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9666-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9666-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9666-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9666-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9666-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9666-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9666-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9666-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9666-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9666-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9666-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9666-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9666-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9666-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9666-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9666-- Scanning root segment: 0x701a000..0x701afff (4096)
--9666-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9666-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9666-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9666-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9666-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9666-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9666-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9666-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9666-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9668== Checked 4,781,336 bytes
==9668==
==9668== LEAK SUMMARY:
==9668== definitely lost: 2,181 bytes in 11 blocks
==9668== indirectly lost: 6,756 bytes in 7 blocks
==9668== possibly lost: 0 bytes in 0 blocks
==9668== still reachable: 3,111,657 bytes in 68,946 blocks
==9668== suppressed: 0 bytes in 0 blocks
==9668== Rerun with --leak-check=full to see details of leaked memory
==9668==
==9668== Use --track-origins=yes to see where uninitialised values come from
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9668==
==9668== 1 errors in context 1 of 2:
==9668== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9668== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9668== by 0x488CD0: stringsubst (subst.c:301)
==9668== by 0x48801B: prefork (subst.c:77)
==9668== by 0x42B318: execcmd (exec.c:2619)
==9668== by 0x428CA0: execpline2 (exec.c:1697)
==9668== by 0x427FD2: execpline (exec.c:1484)
==9668== by 0x427756: execlist (exec.c:1267)
==9668== by 0x42717C: execode (exec.c:1073)
==9668== by 0x431299: runshfunc (exec.c:5040)
==9668== by 0x430E76: doshfunc (exec.c:4920)
==9668== by 0x4302FB: execshfunc (exec.c:4557)
==9668== by 0x42D8C1: execcmd (exec.c:3373)
==9668==
==9668==
==9668== 2 errors in context 2 of 2:
==9668== Conditional jump or move depends on uninitialised value(s)
==9668== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9668== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9668== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9668== by 0x40EFC2: execbuiltin (builtin.c:450)
==9668== by 0x42D8E9: execcmd (exec.c:3378)
==9668== by 0x428CA0: execpline2 (exec.c:1697)
==9668== by 0x427FD2: execpline (exec.c:1484)
==9668== by 0x42779A: execlist (exec.c:1275)
==9668== by 0x42717C: execode (exec.c:1073)
==9668== by 0x431299: runshfunc (exec.c:5040)
==9668== by 0x430E76: doshfunc (exec.c:4920)
==9668== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9668==
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9669-by-pythonnut-on-???
==9669== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9669-by-pythonnut-on-???
==9669== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9669-by-pythonnut-on-???
==9669==
==9669== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9669== don't want to do, unless you know exactly what you're doing,
==9669== or are doing some strange experiment):
==9669== /usr/lib/valgrind/../../bin/vgdb --pid=9669 ...command...
==9669==
==9669== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9669== /path/to/gdb ./zsh
==9669== and then give GDB the following command
==9669== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9669
==9669== --pid is optional if only one valgrind process is running
==9669==
--9669-- Caught __NR_exit; running __libc_freeres()
==9666== Checked 4,853,240 bytes
==9666==
--9669-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9669==
==9669== HEAP SUMMARY:
==9669== in use at exit: 3,120,632 bytes in 68,965 blocks
==9669== total heap usage: 1,463,702 allocs, 1,394,737 frees, 117,736,249 bytes allocated
==9669==
==9666== LEAK SUMMARY:
==9666== definitely lost: 2,181 bytes in 11 blocks
==9666== indirectly lost: 6,756 bytes in 7 blocks
==9666== possibly lost: 0 bytes in 0 blocks
==9666== still reachable: 3,142,309 bytes in 69,358 blocks
==9666== suppressed: 0 bytes in 0 blocks
==9666== Rerun with --leak-check=full to see details of leaked memory
==9666==
==9666== Use --track-origins=yes to see where uninitialised values come from
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666==
==9666== 1 errors in context 1 of 2:
==9666== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9666== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9666== by 0x488CD0: stringsubst (subst.c:301)
==9666== by 0x48801B: prefork (subst.c:77)
==9666== by 0x42B318: execcmd (exec.c:2619)
==9666== by 0x428CA0: execpline2 (exec.c:1697)
==9666== by 0x427FD2: execpline (exec.c:1484)
==9666== by 0x427756: execlist (exec.c:1267)
==9666== by 0x42717C: execode (exec.c:1073)
==9666== by 0x431299: runshfunc (exec.c:5040)
==9666== by 0x430E76: doshfunc (exec.c:4920)
==9666== by 0x4302FB: execshfunc (exec.c:4557)
==9666== by 0x42D8C1: execcmd (exec.c:3373)
==9666==
==9666==
==9666== 2 errors in context 2 of 2:
==9666== Conditional jump or move depends on uninitialised value(s)
==9666== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9666== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9666== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9666== by 0x40EFC2: execbuiltin (builtin.c:450)
==9666== by 0x42D8E9: execcmd (exec.c:3378)
==9666== by 0x428CA0: execpline2 (exec.c:1697)
==9666== by 0x427FD2: execpline (exec.c:1484)
==9666== by 0x42779A: execlist (exec.c:1275)
==9666== by 0x42717C: execode (exec.c:1073)
==9666== by 0x431299: runshfunc (exec.c:5040)
==9666== by 0x430E76: doshfunc (exec.c:4920)
==9666== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9666==
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF73AC, len 4
client request: code 4d430005, addr 0xFFEFF73AC, len 4
client request: code 4d430005, addr 0xFFEFF73AC, len 4
==9669== Searching for pointers to 68,965 not-freed blocks
--9669-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9669-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9669-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9669-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9669-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9669-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9669-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9669-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9669-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9669-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9669-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9669-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9669-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9669-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9669-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9669-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9669-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9669-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9669-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9669-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9669-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9669-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9669-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9669-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9669-- Scanning root segment: 0x701a000..0x701afff (4096)
--9669-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9669-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9669-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9669-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9669-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9669-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9669-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9669-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9669-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFEC39C, len 4
--9670-- Caught __NR_exit; running __libc_freeres()
==9670== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9670-by-pythonnut-on-???
==9670== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9670-by-pythonnut-on-???
==9670== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9670-by-pythonnut-on-???
==9670==
==9670== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9670== don't want to do, unless you know exactly what you're doing,
==9670== or are doing some strange experiment):
==9670== /usr/lib/valgrind/../../bin/vgdb --pid=9670 ...command...
==9670==
==9670== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9670== /path/to/gdb ./zsh
==9670== and then give GDB the following command
==9670== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9670
==9670== --pid is optional if only one valgrind process is running
==9670==
--9670-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9670==
==9670== HEAP SUMMARY:
==9670== in use at exit: 3,153,073 bytes in 69,367 blocks
==9670== total heap usage: 1,467,432 allocs, 1,398,065 frees, 119,516,054 bytes allocated
==9670==
==9670== Searching for pointers to 69,367 not-freed blocks
--9670-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9670-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9670-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9670-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9670-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9670-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9670-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9670-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9670-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9670-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9670-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9670-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9670-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9670-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9670-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9670-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9670-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9670-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9670-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9670-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9670-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9670-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9670-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9670-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9670-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9670-- Scanning root segment: 0x701a000..0x701afff (4096)
--9670-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9670-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9670-- Scanning root segment: 0xae51000..0xae52fff (8192)
==9669== Checked 4,780,856 bytes
--9670-- Scanning root segment: 0xb054000..0xb054fff (4096)
==9669==
--9670-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9670-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9670-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9670-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9670-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9669== LEAK SUMMARY:
==9669== definitely lost: 2,181 bytes in 11 blocks
==9669== indirectly lost: 6,756 bytes in 7 blocks
==9669== possibly lost: 0 bytes in 0 blocks
==9669== still reachable: 3,111,695 bytes in 68,947 blocks
==9669== suppressed: 0 bytes in 0 blocks
==9669== Rerun with --leak-check=full to see details of leaked memory
==9669==
==9669== Use --track-origins=yes to see where uninitialised values come from
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669==
==9669== 1 errors in context 1 of 2:
==9669== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9669== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9669== by 0x488CD0: stringsubst (subst.c:301)
==9669== by 0x48801B: prefork (subst.c:77)
==9669== by 0x42B318: execcmd (exec.c:2619)
==9669== by 0x428CA0: execpline2 (exec.c:1697)
==9669== by 0x427FD2: execpline (exec.c:1484)
==9669== by 0x427756: execlist (exec.c:1267)
==9669== by 0x42717C: execode (exec.c:1073)
==9669== by 0x431299: runshfunc (exec.c:5040)
==9669== by 0x430E76: doshfunc (exec.c:4920)
==9669== by 0x4302FB: execshfunc (exec.c:4557)
==9669== by 0x42D8C1: execcmd (exec.c:3373)
==9669==
==9669==
==9669== 2 errors in context 2 of 2:
==9669== Conditional jump or move depends on uninitialised value(s)
==9669== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9669== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9669== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9669== by 0x40EFC2: execbuiltin (builtin.c:450)
==9669== by 0x42D8E9: execcmd (exec.c:3378)
==9669== by 0x428CA0: execpline2 (exec.c:1697)
==9669== by 0x427FD2: execpline (exec.c:1484)
==9669== by 0x42779A: execlist (exec.c:1275)
==9669== by 0x42717C: execode (exec.c:1073)
==9669== by 0x431299: runshfunc (exec.c:5040)
==9669== by 0x430E76: doshfunc (exec.c:4920)
==9669== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9669==
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9672-by-pythonnut-on-???
==9672== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9672-by-pythonnut-on-???
==9672== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9672-by-pythonnut-on-???
==9672==
==9672== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9672== don't want to do, unless you know exactly what you're doing,
==9672== or are doing some strange experiment):
==9672== /usr/lib/valgrind/../../bin/vgdb --pid=9672 ...command...
==9672==
==9672== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9672== /path/to/gdb ./zsh
==9672== and then give GDB the following command
==9672== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9672
==9672== --pid is optional if only one valgrind process is running
==9672==
--9672-- Caught __NR_exit; running __libc_freeres()
--9672-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9672==
==9672== HEAP SUMMARY:
==9672== in use at exit: 3,119,143 bytes in 68,905 blocks
==9672== total heap usage: 1,463,672 allocs, 1,394,767 frees, 117,739,247 bytes allocated
==9672==
==9670== Checked 4,853,472 bytes
==9670==
==9672== Searching for pointers to 68,905 not-freed blocks
--9672-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9672-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9672-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9672-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9672-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9672-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9672-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9672-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9672-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9672-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9672-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9672-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9672-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9672-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9672-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9672-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9672-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9672-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9672-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9672-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9672-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9672-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9672-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9672-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9672-- Scanning root segment: 0x701a000..0x701afff (4096)
--9672-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9672-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9672-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9672-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9672-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9672-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9672-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9672-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9672-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9670== LEAK SUMMARY:
==9670== definitely lost: 2,181 bytes in 11 blocks
==9670== indirectly lost: 6,756 bytes in 7 blocks
==9670== possibly lost: 0 bytes in 0 blocks
==9670== still reachable: 3,144,136 bytes in 69,349 blocks
==9670== suppressed: 0 bytes in 0 blocks
==9670== Rerun with --leak-check=full to see details of leaked memory
==9670==
==9670== Use --track-origins=yes to see where uninitialised values come from
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9670==
==9670== 1 errors in context 1 of 2:
==9670== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9670== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9670== by 0x488CD0: stringsubst (subst.c:301)
==9670== by 0x48801B: prefork (subst.c:77)
==9670== by 0x42B318: execcmd (exec.c:2619)
==9670== by 0x428CA0: execpline2 (exec.c:1697)
==9670== by 0x427FD2: execpline (exec.c:1484)
==9670== by 0x427756: execlist (exec.c:1267)
==9670== by 0x42717C: execode (exec.c:1073)
==9670== by 0x431299: runshfunc (exec.c:5040)
==9670== by 0x430E76: doshfunc (exec.c:4920)
==9670== by 0x4302FB: execshfunc (exec.c:4557)
==9670== by 0x42D8C1: execcmd (exec.c:3373)
==9670==
==9670==
==9670== 2 errors in context 2 of 2:
==9670== Conditional jump or move depends on uninitialised value(s)
==9670== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9670== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9670== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9670== by 0x40EFC2: execbuiltin (builtin.c:450)
==9670== by 0x42D8E9: execcmd (exec.c:3378)
==9670== by 0x428CA0: execpline2 (exec.c:1697)
==9670== by 0x427FD2: execpline (exec.c:1484)
==9670== by 0x42779A: execlist (exec.c:1275)
==9670== by 0x42717C: execode (exec.c:1073)
==9670== by 0x431299: runshfunc (exec.c:5040)
==9670== by 0x430E76: doshfunc (exec.c:4920)
==9670== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9670==
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9673-by-pythonnut-on-???
==9673== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9673-by-pythonnut-on-???
==9673== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9673-by-pythonnut-on-???
==9673==
==9673== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9673== don't want to do, unless you know exactly what you're doing,
==9673== or are doing some strange experiment):
==9673== /usr/lib/valgrind/../../bin/vgdb --pid=9673 ...command...
==9673==
==9673== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9673== /path/to/gdb ./zsh
==9673== and then give GDB the following command
==9673== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9673
==9673== --pid is optional if only one valgrind process is running
==9673==
--9673-- Caught __NR_exit; running __libc_freeres()
--9673-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9673==
==9673== HEAP SUMMARY:
==9673== in use at exit: 3,152,257 bytes in 69,323 blocks
==9673== total heap usage: 1,467,389 allocs, 1,398,066 frees, 119,515,536 bytes allocated
==9673==
==9673== Searching for pointers to 69,323 not-freed blocks
--9673-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9673-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9673-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9673-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9673-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9673-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9673-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9673-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9673-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9673-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9673-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9673-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9673-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9673-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9673-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9673-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9673-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9673-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9673-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9673-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9673-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9673-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9673-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9673-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9673-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9673-- Scanning root segment: 0x701a000..0x701afff (4096)
--9673-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9673-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9673-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9673-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9673-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9673-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9673-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9673-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9673-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9672== Checked 4,780,312 bytes
==9672==
==9672== LEAK SUMMARY:
==9672== definitely lost: 2,181 bytes in 11 blocks
==9672== indirectly lost: 6,756 bytes in 7 blocks
==9672== possibly lost: 0 bytes in 0 blocks
==9672== still reachable: 3,110,206 bytes in 68,887 blocks
==9672== suppressed: 0 bytes in 0 blocks
==9672== Rerun with --leak-check=full to see details of leaked memory
==9672==
==9672== Use --track-origins=yes to see where uninitialised values come from
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672==
==9672== 1 errors in context 1 of 2:
==9672== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9672== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9672== by 0x488CD0: stringsubst (subst.c:301)
==9672== by 0x48801B: prefork (subst.c:77)
==9672== by 0x42B318: execcmd (exec.c:2619)
==9672== by 0x428CA0: execpline2 (exec.c:1697)
==9672== by 0x427FD2: execpline (exec.c:1484)
==9672== by 0x427756: execlist (exec.c:1267)
==9672== by 0x42717C: execode (exec.c:1073)
==9672== by 0x431299: runshfunc (exec.c:5040)
==9672== by 0x430E76: doshfunc (exec.c:4920)
==9672== by 0x4302FB: execshfunc (exec.c:4557)
==9672== by 0x42D8C1: execcmd (exec.c:3373)
==9672==
==9672==
==9672== 2 errors in context 2 of 2:
==9672== Conditional jump or move depends on uninitialised value(s)
==9672== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9672== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9672== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9672== by 0x40EFC2: execbuiltin (builtin.c:450)
==9672== by 0x42D8E9: execcmd (exec.c:3378)
==9672== by 0x428CA0: execpline2 (exec.c:1697)
==9672== by 0x427FD2: execpline (exec.c:1484)
==9672== by 0x42779A: execlist (exec.c:1275)
==9672== by 0x42717C: execode (exec.c:1073)
==9672== by 0x431299: runshfunc (exec.c:5040)
==9672== by 0x430E76: doshfunc (exec.c:4920)
==9672== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9672==
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9674-by-pythonnut-on-???
==9674== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9674-by-pythonnut-on-???
==9674== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9674-by-pythonnut-on-???
==9674==
==9674== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9674== don't want to do, unless you know exactly what you're doing,
==9674== or are doing some strange experiment):
==9674== /usr/lib/valgrind/../../bin/vgdb --pid=9674 ...command...
==9674==
==9674== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9674== /path/to/gdb ./zsh
==9674== and then give GDB the following command
==9674== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9674
==9674== --pid is optional if only one valgrind process is running
==9674==
--9677-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==9677== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9677-by-pythonnut-on-???
==9677== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9677-by-pythonnut-on-???
==9677== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9677-by-pythonnut-on-???
==9677==
==9677== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9677== don't want to do, unless you know exactly what you're doing,
==9677== or are doing some strange experiment):
==9677== /usr/lib/valgrind/../../bin/vgdb --pid=9677 ...command...
==9677==
==9677== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9677== /path/to/gdb ./zsh
==9677== and then give GDB the following command
==9677== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9677
==9677== --pid is optional if only one valgrind process is running
==9677==
==9673== Checked 4,852,152 bytes
==9673==
--9677-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677==
==9677== HEAP SUMMARY:
==9677== in use at exit: 3,121,279 bytes in 69,145 blocks
==9677== total heap usage: 1,464,046 allocs, 1,394,901 frees, 117,771,810 bytes allocated
==9677==
==9673== LEAK SUMMARY:
==9673== definitely lost: 2,181 bytes in 11 blocks
==9673== indirectly lost: 6,756 bytes in 7 blocks
==9673== possibly lost: 0 bytes in 0 blocks
==9673== still reachable: 3,143,320 bytes in 69,305 blocks
==9673== suppressed: 0 bytes in 0 blocks
==9673== Rerun with --leak-check=full to see details of leaked memory
==9673==
==9673== Use --track-origins=yes to see where uninitialised values come from
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673==
==9673== 1 errors in context 1 of 2:
==9673== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9673== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9673== by 0x488CD0: stringsubst (subst.c:301)
==9673== by 0x48801B: prefork (subst.c:77)
==9673== by 0x42B318: execcmd (exec.c:2619)
==9673== by 0x428CA0: execpline2 (exec.c:1697)
==9673== by 0x427FD2: execpline (exec.c:1484)
==9673== by 0x427756: execlist (exec.c:1267)
==9673== by 0x42717C: execode (exec.c:1073)
==9673== by 0x431299: runshfunc (exec.c:5040)
==9673== by 0x430E76: doshfunc (exec.c:4920)
==9673== by 0x4302FB: execshfunc (exec.c:4557)
==9673== by 0x42D8C1: execcmd (exec.c:3373)
==9673==
==9673==
==9673== 2 errors in context 2 of 2:
==9673== Conditional jump or move depends on uninitialised value(s)
==9673== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9673== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9673== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9673== by 0x40EFC2: execbuiltin (builtin.c:450)
==9673== by 0x42D8E9: execcmd (exec.c:3378)
==9673== by 0x428CA0: execpline2 (exec.c:1697)
==9673== by 0x427FD2: execpline (exec.c:1484)
==9673== by 0x42779A: execlist (exec.c:1275)
==9673== by 0x42717C: execode (exec.c:1073)
==9673== by 0x431299: runshfunc (exec.c:5040)
==9673== by 0x430E76: doshfunc (exec.c:4920)
==9673== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9673==
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFECF3C, len 4
==9677== Searching for pointers to 69,145 not-freed blocks
--9677-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9677-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9677-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9677-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9677-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9677-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9677-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9677-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9677-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9677-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9677-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9677-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9677-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9677-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9677-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9677-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9677-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9677-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9677-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9677-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9677-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9677-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9677-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9677-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9677-- Scanning root segment: 0x701a000..0x701afff (4096)
--9677-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9677-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9677-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9677-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9677-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9677-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9677-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9677-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9677-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9680-by-pythonnut-on-???
==9680== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9680-by-pythonnut-on-???
==9680== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9680-by-pythonnut-on-???
==9680==
==9680== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9680== don't want to do, unless you know exactly what you're doing,
==9680== or are doing some strange experiment):
==9680== /usr/lib/valgrind/../../bin/vgdb --pid=9680 ...command...
==9680==
==9680== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9680== /path/to/gdb ./zsh
==9680== and then give GDB the following command
==9680== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9680
==9680== --pid is optional if only one valgrind process is running
==9680==
client request: code 4d430005, addr 0xFFEFF493C, len 4
==9681== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9681-by-pythonnut-on-???
==9681== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9681-by-pythonnut-on-???
==9681== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9681-by-pythonnut-on-???
==9681==
==9681== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9681== don't want to do, unless you know exactly what you're doing,
==9681== or are doing some strange experiment):
==9681== /usr/lib/valgrind/../../bin/vgdb --pid=9681 ...command...
==9681==
==9681== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9681== /path/to/gdb ./zsh
==9681== and then give GDB the following command
==9681== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9681
==9681== --pid is optional if only one valgrind process is running
==9681==
client request: code 4d430005, addr 0xFFEFF493C, len 4
--9681-- Caught __NR_exit; running __libc_freeres()
--9681-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677== Checked 4,778,616 bytes
==9677==
==9681==
==9681== HEAP SUMMARY:
==9681== in use at exit: 3,160,061 bytes in 69,547 blocks
==9681== total heap usage: 1,468,165 allocs, 1,398,618 frees, 119,801,712 bytes allocated
==9681==
==9677== LEAK SUMMARY:
==9677== definitely lost: 2,181 bytes in 11 blocks
==9677== indirectly lost: 6,756 bytes in 7 blocks
==9677== possibly lost: 0 bytes in 0 blocks
==9677== still reachable: 3,112,342 bytes in 69,127 blocks
==9677== suppressed: 0 bytes in 0 blocks
==9677== Rerun with --leak-check=full to see details of leaked memory
==9677==
==9677== Use --track-origins=yes to see where uninitialised values come from
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9677==
==9677== 1 errors in context 1 of 2:
==9677== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9677== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9677== by 0x488CD0: stringsubst (subst.c:301)
==9677== by 0x48801B: prefork (subst.c:77)
==9677== by 0x42B318: execcmd (exec.c:2619)
==9677== by 0x428CA0: execpline2 (exec.c:1697)
==9677== by 0x427FD2: execpline (exec.c:1484)
==9677== by 0x427756: execlist (exec.c:1267)
==9677== by 0x42717C: execode (exec.c:1073)
==9677== by 0x431299: runshfunc (exec.c:5040)
==9677== by 0x430E76: doshfunc (exec.c:4920)
==9677== by 0x4302FB: execshfunc (exec.c:4557)
==9677== by 0x42D8C1: execcmd (exec.c:3373)
==9677==
==9677==
==9677== 2 errors in context 2 of 2:
==9677== Conditional jump or move depends on uninitialised value(s)
==9677== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9677== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9677== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9677== by 0x40EFC2: execbuiltin (builtin.c:450)
==9677== by 0x42D8E9: execcmd (exec.c:3378)
==9677== by 0x428CA0: execpline2 (exec.c:1697)
==9677== by 0x427FD2: execpline (exec.c:1484)
==9677== by 0x42779A: execlist (exec.c:1275)
==9677== by 0x42717C: execode (exec.c:1073)
==9677== by 0x431299: runshfunc (exec.c:5040)
==9677== by 0x430E76: doshfunc (exec.c:4920)
==9677== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9677==
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9674-- Caught __NR_exit; running __libc_freeres()
==9681== Searching for pointers to 69,547 not-freed blocks
--9681-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9681-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9681-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9681-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9681-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9681-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9681-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9681-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9681-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9681-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9681-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9681-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9681-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9681-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9681-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9681-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9681-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9681-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9681-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9681-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9681-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9681-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9681-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9681-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9681-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9681-- Scanning root segment: 0x701a000..0x701afff (4096)
--9681-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9681-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9681-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9681-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9681-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9681-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9681-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9681-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9681-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9674-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9674==
==9674== HEAP SUMMARY:
==9674== in use at exit: 3,121,215 bytes in 69,142 blocks
==9674== total heap usage: 1,464,044 allocs, 1,394,902 frees, 117,771,569 bytes allocated
==9674==
==9674== Searching for pointers to 69,142 not-freed blocks
--9674-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9674-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9674-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9674-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9674-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9674-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9674-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9674-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9674-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9674-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9674-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9674-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9674-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9674-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9674-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9674-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9674-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9674-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9674-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9674-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9674-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9674-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9674-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9674-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9674-- Scanning root segment: 0x701a000..0x701afff (4096)
--9674-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9674-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9674-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9674-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9674-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9674-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9674-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9674-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9674-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9681== Checked 4,877,224 bytes
==9681==
==9681== LEAK SUMMARY:
==9681== definitely lost: 2,181 bytes in 11 blocks
==9681== indirectly lost: 6,756 bytes in 7 blocks
==9681== possibly lost: 0 bytes in 0 blocks
==9681== still reachable: 3,151,124 bytes in 69,529 blocks
==9681== suppressed: 0 bytes in 0 blocks
==9681== Rerun with --leak-check=full to see details of leaked memory
==9681==
==9681== Use --track-origins=yes to see where uninitialised values come from
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9681==
==9681== 1 errors in context 1 of 2:
==9681== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9681== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9681== by 0x488CD0: stringsubst (subst.c:301)
==9681== by 0x48801B: prefork (subst.c:77)
==9681== by 0x42B318: execcmd (exec.c:2619)
==9681== by 0x428CA0: execpline2 (exec.c:1697)
==9681== by 0x427FD2: execpline (exec.c:1484)
==9681== by 0x427756: execlist (exec.c:1267)
==9681== by 0x42717C: execode (exec.c:1073)
==9681== by 0x431299: runshfunc (exec.c:5040)
==9681== by 0x430E76: doshfunc (exec.c:4920)
==9681== by 0x4302FB: execshfunc (exec.c:4557)
==9681== by 0x42D8C1: execcmd (exec.c:3373)
==9681==
==9681==
==9681== 2 errors in context 2 of 2:
==9681== Conditional jump or move depends on uninitialised value(s)
==9681== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9681== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9681== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9681== by 0x40EFC2: execbuiltin (builtin.c:450)
==9681== by 0x42D8E9: execcmd (exec.c:3378)
==9681== by 0x428CA0: execpline2 (exec.c:1697)
==9681== by 0x427FD2: execpline (exec.c:1484)
==9681== by 0x42779A: execlist (exec.c:1275)
==9681== by 0x42717C: execode (exec.c:1073)
==9681== by 0x431299: runshfunc (exec.c:5040)
==9681== by 0x430E76: doshfunc (exec.c:4920)
==9681== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9681==
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9680-- Caught __NR_exit; running __libc_freeres()
==9674== Checked 4,777,928 bytes
==9674==
--9680-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9680==
==9680== HEAP SUMMARY:
==9680== in use at exit: 3,157,709 bytes in 69,467 blocks
==9680== total heap usage: 1,468,071 allocs, 1,398,604 frees, 119,602,517 bytes allocated
==9680==
==9674== LEAK SUMMARY:
==9674== definitely lost: 2,181 bytes in 11 blocks
==9674== indirectly lost: 6,756 bytes in 7 blocks
==9674== possibly lost: 0 bytes in 0 blocks
==9674== still reachable: 3,112,278 bytes in 69,124 blocks
==9674== suppressed: 0 bytes in 0 blocks
==9674== Rerun with --leak-check=full to see details of leaked memory
==9674==
==9674== Use --track-origins=yes to see where uninitialised values come from
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674==
==9674== 1 errors in context 1 of 2:
==9674== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9674== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9674== by 0x488CD0: stringsubst (subst.c:301)
==9674== by 0x48801B: prefork (subst.c:77)
==9674== by 0x42B318: execcmd (exec.c:2619)
==9674== by 0x428CA0: execpline2 (exec.c:1697)
==9674== by 0x427FD2: execpline (exec.c:1484)
==9674== by 0x427756: execlist (exec.c:1267)
==9674== by 0x42717C: execode (exec.c:1073)
==9674== by 0x431299: runshfunc (exec.c:5040)
==9674== by 0x430E76: doshfunc (exec.c:4920)
==9674== by 0x4302FB: execshfunc (exec.c:4557)
==9674== by 0x42D8C1: execcmd (exec.c:3373)
==9674==
==9674==
==9674== 2 errors in context 2 of 2:
==9674== Conditional jump or move depends on uninitialised value(s)
==9674== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9674== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9674== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9674== by 0x40EFC2: execbuiltin (builtin.c:450)
==9674== by 0x42D8E9: execcmd (exec.c:3378)
==9674== by 0x428CA0: execpline2 (exec.c:1697)
==9674== by 0x427FD2: execpline (exec.c:1484)
==9674== by 0x42779A: execlist (exec.c:1275)
==9674== by 0x42717C: execode (exec.c:1073)
==9674== by 0x431299: runshfunc (exec.c:5040)
==9674== by 0x430E76: doshfunc (exec.c:4920)
==9674== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9674==
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680== Searching for pointers to 69,467 not-freed blocks
--9680-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9680-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9680-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9680-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9680-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9680-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9680-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9680-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9680-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9680-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9680-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9680-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9680-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9680-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9680-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9680-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9680-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9680-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9680-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9680-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9680-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9680-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9680-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9680-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9680-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9680-- Scanning root segment: 0x701a000..0x701afff (4096)
--9680-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9680-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9680-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9680-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9680-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9680-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9680-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9680-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9680-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9682-- Caught __NR_exit; running __libc_freeres()
==9682== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9682-by-pythonnut-on-???
==9682== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9682-by-pythonnut-on-???
==9682== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9682-by-pythonnut-on-???
==9682==
==9682== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9682== don't want to do, unless you know exactly what you're doing,
==9682== or are doing some strange experiment):
==9682== /usr/lib/valgrind/../../bin/vgdb --pid=9682 ...command...
==9682==
==9682== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9682== /path/to/gdb ./zsh
==9682== and then give GDB the following command
==9682== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9682
==9682== --pid is optional if only one valgrind process is running
==9682==
--9682-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9682==
==9682== HEAP SUMMARY:
==9682== in use at exit: 3,121,222 bytes in 69,142 blocks
==9682== total heap usage: 1,464,059 allocs, 1,394,917 frees, 117,776,567 bytes allocated
==9682==
==9682== Searching for pointers to 69,142 not-freed blocks
--9682-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9682-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9682-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9682-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9682-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9682-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9682-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9682-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9682-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9682-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9682-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9682-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9682-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9682-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9682-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9682-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9682-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9682-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9682-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9682-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9682-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9682-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9682-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9682-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9682-- Scanning root segment: 0x701a000..0x701afff (4096)
--9682-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9682-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9682-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9682-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9682-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9682-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9682-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9682-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9682-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== Checked 4,856,792 bytes
==9680==
==9680== LEAK SUMMARY:
==9680== definitely lost: 2,181 bytes in 11 blocks
==9680== indirectly lost: 6,756 bytes in 7 blocks
==9680== possibly lost: 0 bytes in 0 blocks
==9680== still reachable: 3,148,772 bytes in 69,449 blocks
==9680== suppressed: 0 bytes in 0 blocks
==9680== Rerun with --leak-check=full to see details of leaked memory
==9680==
==9680== Use --track-origins=yes to see where uninitialised values come from
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680==
==9680== 1 errors in context 1 of 2:
==9680== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9680== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9680== by 0x488CD0: stringsubst (subst.c:301)
==9680== by 0x48801B: prefork (subst.c:77)
==9680== by 0x42B318: execcmd (exec.c:2619)
==9680== by 0x428CA0: execpline2 (exec.c:1697)
==9680== by 0x427FD2: execpline (exec.c:1484)
==9680== by 0x427756: execlist (exec.c:1267)
==9680== by 0x42717C: execode (exec.c:1073)
==9680== by 0x431299: runshfunc (exec.c:5040)
==9680== by 0x430E76: doshfunc (exec.c:4920)
==9680== by 0x4302FB: execshfunc (exec.c:4557)
==9680== by 0x42D8C1: execcmd (exec.c:3373)
==9680==
==9680==
==9680== 2 errors in context 2 of 2:
==9680== Conditional jump or move depends on uninitialised value(s)
==9680== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9680== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9680== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9680== by 0x40EFC2: execbuiltin (builtin.c:450)
==9680== by 0x42D8E9: execcmd (exec.c:3378)
==9680== by 0x428CA0: execpline2 (exec.c:1697)
==9680== by 0x427FD2: execpline (exec.c:1484)
==9680== by 0x42779A: execlist (exec.c:1275)
==9680== by 0x42717C: execode (exec.c:1073)
==9680== by 0x431299: runshfunc (exec.c:5040)
==9680== by 0x430E76: doshfunc (exec.c:4920)
==9680== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9680==
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
client request: code 4d430005, addr 0xFFEFF5D5C, len 4
==9683== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9683-by-pythonnut-on-???
==9683== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9683-by-pythonnut-on-???
==9683== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9683-by-pythonnut-on-???
==9683==
==9683== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9683== don't want to do, unless you know exactly what you're doing,
==9683== or are doing some strange experiment):
==9683== /usr/lib/valgrind/../../bin/vgdb --pid=9683 ...command...
==9683==
==9683== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9683== /path/to/gdb ./zsh
==9683== and then give GDB the following command
==9683== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9683
==9683== --pid is optional if only one valgrind process is running
==9683==
==9684== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9684-by-pythonnut-on-???
==9684== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9684-by-pythonnut-on-???
==9684== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9684-by-pythonnut-on-???
==9684==
==9684== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9684== don't want to do, unless you know exactly what you're doing,
==9684== or are doing some strange experiment):
==9684== /usr/lib/valgrind/../../bin/vgdb --pid=9684 ...command...
==9684==
==9684== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9684== /path/to/gdb ./zsh
==9684== and then give GDB the following command
==9684== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9684
==9684== --pid is optional if only one valgrind process is running
==9684==
==9682== Checked 4,778,072 bytes
==9682==
--9684-- Caught __NR_exit; running __libc_freeres()
==9682== LEAK SUMMARY:
==9682== definitely lost: 2,181 bytes in 11 blocks
==9682== indirectly lost: 6,756 bytes in 7 blocks
==9682== possibly lost: 0 bytes in 0 blocks
==9682== still reachable: 3,112,285 bytes in 69,124 blocks
==9682== suppressed: 0 bytes in 0 blocks
==9682== Rerun with --leak-check=full to see details of leaked memory
==9682==
==9682== Use --track-origins=yes to see where uninitialised values come from
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9682==
==9682== 1 errors in context 1 of 2:
==9682== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9682== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9682== by 0x488CD0: stringsubst (subst.c:301)
==9682== by 0x48801B: prefork (subst.c:77)
==9682== by 0x42B318: execcmd (exec.c:2619)
==9682== by 0x428CA0: execpline2 (exec.c:1697)
==9682== by 0x427FD2: execpline (exec.c:1484)
==9682== by 0x427756: execlist (exec.c:1267)
==9682== by 0x42717C: execode (exec.c:1073)
==9682== by 0x431299: runshfunc (exec.c:5040)
==9682== by 0x430E76: doshfunc (exec.c:4920)
==9682== by 0x4302FB: execshfunc (exec.c:4557)
==9682== by 0x42D8C1: execcmd (exec.c:3373)
==9682==
==9682==
==9682== 2 errors in context 2 of 2:
==9682== Conditional jump or move depends on uninitialised value(s)
==9682== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9682== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9682== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9682== by 0x40EFC2: execbuiltin (builtin.c:450)
==9682== by 0x42D8E9: execcmd (exec.c:3378)
==9682== by 0x428CA0: execpline2 (exec.c:1697)
==9682== by 0x427FD2: execpline (exec.c:1484)
==9682== by 0x42779A: execlist (exec.c:1275)
==9682== by 0x42717C: execode (exec.c:1073)
==9682== by 0x431299: runshfunc (exec.c:5040)
==9682== by 0x430E76: doshfunc (exec.c:4920)
==9682== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9682==
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9684-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9684==
==9684== HEAP SUMMARY:
==9684== in use at exit: 3,166,244 bytes in 69,636 blocks
==9684== total heap usage: 1,468,385 allocs, 1,398,749 frees, 119,863,331 bytes allocated
==9684==
--9685-- Caught __NR_exit; running __libc_freeres()
==9685== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9685-by-pythonnut-on-???
==9685== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9685-by-pythonnut-on-???
==9685== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9685-by-pythonnut-on-???
==9685==
==9685== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9685== don't want to do, unless you know exactly what you're doing,
==9685== or are doing some strange experiment):
==9685== /usr/lib/valgrind/../../bin/vgdb --pid=9685 ...command...
==9685==
==9685== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9685== /path/to/gdb ./zsh
==9685== and then give GDB the following command
==9685== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9685
==9685== --pid is optional if only one valgrind process is running
==9685==
==9684== Searching for pointers to 69,636 not-freed blocks
--9684-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9684-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9684-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9684-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9684-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9684-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9684-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9684-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9684-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9684-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9684-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9684-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9684-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9684-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9684-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9684-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9684-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9684-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9684-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9684-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9684-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9684-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9684-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9684-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9684-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9684-- Scanning root segment: 0x701a000..0x701afff (4096)
--9684-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9684-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9684-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9684-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9684-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9684-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9684-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9684-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9684-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9685-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9685==
==9685== HEAP SUMMARY:
==9685== in use at exit: 3,121,318 bytes in 69,142 blocks
==9685== total heap usage: 1,464,075 allocs, 1,394,933 frees, 117,781,354 bytes allocated
==9685==
==9685== Searching for pointers to 69,142 not-freed blocks
--9685-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9685-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9685-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9685-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9685-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9685-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9685-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9685-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9685-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9685-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9685-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9685-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9685-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9685-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9685-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9685-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9685-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9685-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9685-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9685-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9685-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9685-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9685-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9685-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9685-- Scanning root segment: 0x701a000..0x701afff (4096)
--9685-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9685-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9685-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9685-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9685-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9685-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9685-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9685-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9685-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9684== Checked 4,884,504 bytes
==9684==
==9684== LEAK SUMMARY:
==9684== definitely lost: 2,181 bytes in 11 blocks
==9684== indirectly lost: 6,756 bytes in 7 blocks
==9684== possibly lost: 0 bytes in 0 blocks
==9684== still reachable: 3,157,307 bytes in 69,618 blocks
==9684== suppressed: 0 bytes in 0 blocks
==9684== Rerun with --leak-check=full to see details of leaked memory
==9684==
==9684== Use --track-origins=yes to see where uninitialised values come from
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9684==
==9684== 1 errors in context 1 of 2:
==9684== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9684== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9684== by 0x488CD0: stringsubst (subst.c:301)
==9684== by 0x48801B: prefork (subst.c:77)
==9684== by 0x42B318: execcmd (exec.c:2619)
==9684== by 0x428CA0: execpline2 (exec.c:1697)
==9684== by 0x427FD2: execpline (exec.c:1484)
==9684== by 0x427756: execlist (exec.c:1267)
==9684== by 0x42717C: execode (exec.c:1073)
==9684== by 0x431299: runshfunc (exec.c:5040)
==9684== by 0x430E76: doshfunc (exec.c:4920)
==9684== by 0x4302FB: execshfunc (exec.c:4557)
==9684== by 0x42D8C1: execcmd (exec.c:3373)
==9684==
==9684==
==9684== 2 errors in context 2 of 2:
==9684== Conditional jump or move depends on uninitialised value(s)
==9684== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9684== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9684== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9684== by 0x40EFC2: execbuiltin (builtin.c:450)
==9684== by 0x42D8E9: execcmd (exec.c:3378)
==9684== by 0x428CA0: execpline2 (exec.c:1697)
==9684== by 0x427FD2: execpline (exec.c:1484)
==9684== by 0x42779A: execlist (exec.c:1275)
==9684== by 0x42717C: execode (exec.c:1073)
==9684== by 0x431299: runshfunc (exec.c:5040)
==9684== by 0x430E76: doshfunc (exec.c:4920)
==9684== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9684==
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Caught __NR_exit; running __libc_freeres()
==9685== Checked 4,777,352 bytes
==9685==
==9685== LEAK SUMMARY:
==9685== definitely lost: 2,181 bytes in 11 blocks
==9685== indirectly lost: 6,756 bytes in 7 blocks
==9685== possibly lost: 0 bytes in 0 blocks
==9685== still reachable: 3,112,381 bytes in 69,124 blocks
==9685== suppressed: 0 bytes in 0 blocks
==9685== Rerun with --leak-check=full to see details of leaked memory
==9685==
==9685== Use --track-origins=yes to see where uninitialised values come from
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9685==
==9685== 1 errors in context 1 of 2:
==9685== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9685== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9685== by 0x488CD0: stringsubst (subst.c:301)
==9685== by 0x48801B: prefork (subst.c:77)
==9685== by 0x42B318: execcmd (exec.c:2619)
==9685== by 0x428CA0: execpline2 (exec.c:1697)
==9685== by 0x427FD2: execpline (exec.c:1484)
==9685== by 0x427756: execlist (exec.c:1267)
==9685== by 0x42717C: execode (exec.c:1073)
==9685== by 0x431299: runshfunc (exec.c:5040)
==9685== by 0x430E76: doshfunc (exec.c:4920)
==9685== by 0x4302FB: execshfunc (exec.c:4557)
==9685== by 0x42D8C1: execcmd (exec.c:3373)
==9685==
==9685==
==9685== 2 errors in context 2 of 2:
==9685== Conditional jump or move depends on uninitialised value(s)
==9685== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9685== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9685== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9685== by 0x40EFC2: execbuiltin (builtin.c:450)
==9685== by 0x42D8E9: execcmd (exec.c:3378)
==9685== by 0x428CA0: execpline2 (exec.c:1697)
==9685== by 0x427FD2: execpline (exec.c:1484)
==9685== by 0x42779A: execlist (exec.c:1275)
==9685== by 0x42717C: execode (exec.c:1073)
==9685== by 0x431299: runshfunc (exec.c:5040)
==9685== by 0x430E76: doshfunc (exec.c:4920)
==9685== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9685==
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9683==
==9683== HEAP SUMMARY:
==9683== in use at exit: 3,163,869 bytes in 69,555 blocks
==9683== total heap usage: 1,468,325 allocs, 1,398,770 frees, 119,633,433 bytes allocated
==9683==
==9686== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9686-by-pythonnut-on-???
==9686== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9686-by-pythonnut-on-???
==9686== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9686-by-pythonnut-on-???
==9686==
==9686== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9686== don't want to do, unless you know exactly what you're doing,
==9686== or are doing some strange experiment):
==9686== /usr/lib/valgrind/../../bin/vgdb --pid=9686 ...command...
==9686==
==9686== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9686== /path/to/gdb ./zsh
==9686== and then give GDB the following command
==9686== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9686
==9686== --pid is optional if only one valgrind process is running
==9686==
--9686-- Caught __NR_exit; running __libc_freeres()
==9683== Searching for pointers to 69,555 not-freed blocks
--9683-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9683-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9683-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9683-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9683-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9683-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9683-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9683-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9683-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9683-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9683-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9683-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9683-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9683-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9683-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9683-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9683-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9683-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9683-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9683-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9683-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9683-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9683-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9683-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9683-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9683-- Scanning root segment: 0x701a000..0x701afff (4096)
--9683-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9683-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9683-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9683-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9683-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9683-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9683-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9683-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9683-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9686-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9686==
==9686== HEAP SUMMARY:
==9686== in use at exit: 3,121,560 bytes in 69,148 blocks
==9686== total heap usage: 1,464,123 allocs, 1,394,975 frees, 117,790,370 bytes allocated
==9686==
==9686== Searching for pointers to 69,148 not-freed blocks
--9686-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9686-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9686-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9686-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9686-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9686-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9686-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9686-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9686-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9686-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9686-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9686-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9686-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9686-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9686-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9686-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9686-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9686-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9686-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9686-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9686-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9686-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9686-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9686-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9686-- Scanning root segment: 0x701a000..0x701afff (4096)
--9686-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9686-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9686-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9686-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9686-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9686-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9686-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9686-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9686-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9683== Checked 4,880,568 bytes
==9683==
==9683== LEAK SUMMARY:
==9683== definitely lost: 2,181 bytes in 11 blocks
==9683== indirectly lost: 6,756 bytes in 7 blocks
==9683== possibly lost: 0 bytes in 0 blocks
==9683== still reachable: 3,154,932 bytes in 69,537 blocks
==9683== suppressed: 0 bytes in 0 blocks
==9683== Rerun with --leak-check=full to see details of leaked memory
==9683==
==9683== Use --track-origins=yes to see where uninitialised values come from
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9683==
==9683== 1 errors in context 1 of 2:
==9683== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9683== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9683== by 0x488CD0: stringsubst (subst.c:301)
==9683== by 0x48801B: prefork (subst.c:77)
==9683== by 0x42B318: execcmd (exec.c:2619)
==9683== by 0x428CA0: execpline2 (exec.c:1697)
==9683== by 0x427FD2: execpline (exec.c:1484)
==9683== by 0x427756: execlist (exec.c:1267)
==9683== by 0x42717C: execode (exec.c:1073)
==9683== by 0x431299: runshfunc (exec.c:5040)
==9683== by 0x430E76: doshfunc (exec.c:4920)
==9683== by 0x4302FB: execshfunc (exec.c:4557)
==9683== by 0x42D8C1: execcmd (exec.c:3373)
==9683==
==9683==
==9683== 2 errors in context 2 of 2:
==9683== Conditional jump or move depends on uninitialised value(s)
==9683== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9683== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9683== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9683== by 0x40EFC2: execbuiltin (builtin.c:450)
==9683== by 0x42D8E9: execcmd (exec.c:3378)
==9683== by 0x428CA0: execpline2 (exec.c:1697)
==9683== by 0x427FD2: execpline (exec.c:1484)
==9683== by 0x42779A: execlist (exec.c:1275)
==9683== by 0x42717C: execode (exec.c:1073)
==9683== by 0x431299: runshfunc (exec.c:5040)
==9683== by 0x430E76: doshfunc (exec.c:4920)
==9683== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9683==
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF540C, len 4
client request: code 4d430005, addr 0xFFEFF540C, len 4
client request: code 4d430005, addr 0xFFEFF540C, len 4
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
client request: code 4d430005, addr 0xFFEFF4D8C, len 4
==9686== Checked 4,777,496 bytes
==9686==
client request: code 4d430005, addr 0xFFEFF3DBC, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
client request: code 4d430005, addr 0xFFEFF469C, len 4
==9686== LEAK SUMMARY:
==9686== definitely lost: 2,181 bytes in 11 blocks
==9686== indirectly lost: 6,756 bytes in 7 blocks
==9686== possibly lost: 0 bytes in 0 blocks
==9686== still reachable: 3,112,623 bytes in 69,130 blocks
==9686== suppressed: 0 bytes in 0 blocks
==9686== Rerun with --leak-check=full to see details of leaked memory
==9686==
==9686== Use --track-origins=yes to see where uninitialised values come from
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9686==
==9686== 1 errors in context 1 of 2:
==9686== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9686== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9686== by 0x488CD0: stringsubst (subst.c:301)
==9686== by 0x48801B: prefork (subst.c:77)
==9686== by 0x42B318: execcmd (exec.c:2619)
==9686== by 0x428CA0: execpline2 (exec.c:1697)
==9686== by 0x427FD2: execpline (exec.c:1484)
==9686== by 0x427756: execlist (exec.c:1267)
==9686== by 0x42717C: execode (exec.c:1073)
==9686== by 0x431299: runshfunc (exec.c:5040)
==9686== by 0x430E76: doshfunc (exec.c:4920)
==9686== by 0x4302FB: execshfunc (exec.c:4557)
==9686== by 0x42D8C1: execcmd (exec.c:3373)
==9686==
==9686==
==9686== 2 errors in context 2 of 2:
==9686== Conditional jump or move depends on uninitialised value(s)
==9686== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9686== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9686== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9686== by 0x40EFC2: execbuiltin (builtin.c:450)
==9686== by 0x42D8E9: execcmd (exec.c:3378)
==9686== by 0x428CA0: execpline2 (exec.c:1697)
==9686== by 0x427FD2: execpline (exec.c:1484)
==9686== by 0x42779A: execlist (exec.c:1275)
==9686== by 0x42717C: execode (exec.c:1073)
==9686== by 0x431299: runshfunc (exec.c:5040)
==9686== by 0x430E76: doshfunc (exec.c:4920)
==9686== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9686==
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFE992C, len 4
--9688-- Caught __NR_exit; running __libc_freeres()
==9688== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9688-by-pythonnut-on-???
==9688== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9688-by-pythonnut-on-???
==9688== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9688-by-pythonnut-on-???
==9688==
==9688== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9688== don't want to do, unless you know exactly what you're doing,
==9688== or are doing some strange experiment):
==9688== /usr/lib/valgrind/../../bin/vgdb --pid=9688 ...command...
==9688==
==9688== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9688== /path/to/gdb ./zsh
==9688== and then give GDB the following command
==9688== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9688
==9688== --pid is optional if only one valgrind process is running
==9688==
==9690== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9690-by-pythonnut-on-???
==9690== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9690-by-pythonnut-on-???
==9690== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9690-by-pythonnut-on-???
==9690==
==9690== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9690== don't want to do, unless you know exactly what you're doing,
==9690== or are doing some strange experiment):
==9690== /usr/lib/valgrind/../../bin/vgdb --pid=9690 ...command...
==9690==
==9690== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9690== /path/to/gdb ./zsh
==9690== and then give GDB the following command
==9690== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9690
==9690== --pid is optional if only one valgrind process is running
==9690==
client request: code 4d430005, addr 0xFFEFE87EC, len 4
--9688-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9688==
==9688== HEAP SUMMARY:
==9688== in use at exit: 3,121,496 bytes in 69,148 blocks
==9688== total heap usage: 1,464,103 allocs, 1,394,955 frees, 117,788,140 bytes allocated
==9688==
==9689== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9689-by-pythonnut-on-???
==9689== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9689-by-pythonnut-on-???
==9689== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9689-by-pythonnut-on-???
==9689==
==9689== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9689== don't want to do, unless you know exactly what you're doing,
==9689== or are doing some strange experiment):
==9689== /usr/lib/valgrind/../../bin/vgdb --pid=9689 ...command...
==9689==
==9689== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9689== /path/to/gdb ./zsh
==9689== and then give GDB the following command
==9689== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9689
==9689== --pid is optional if only one valgrind process is running
==9689==
--9689-- Caught __NR_exit; running __libc_freeres()
==9688== Searching for pointers to 69,148 not-freed blocks
--9688-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9688-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9688-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9688-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9688-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9688-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9688-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9688-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9688-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9688-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9688-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9688-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9688-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9688-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9688-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9688-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9688-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9688-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9688-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9688-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9688-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9688-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9688-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9688-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9688-- Scanning root segment: 0x701a000..0x701afff (4096)
--9688-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9688-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9688-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9688-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9688-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9688-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9688-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9688-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9688-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9689==
==9689== HEAP SUMMARY:
==9689== in use at exit: 3,172,620 bytes in 69,644 blocks
==9689== total heap usage: 1,468,650 allocs, 1,399,006 frees, 119,679,406 bytes allocated
==9689==
==9689== Searching for pointers to 69,644 not-freed blocks
--9689-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9689-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9689-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9689-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9689-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9689-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9689-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9689-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9689-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9689-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9689-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9689-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9689-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9689-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9689-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9689-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9689-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9689-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9689-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9689-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9689-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9689-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9689-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9689-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9689-- Scanning root segment: 0x701a000..0x701afff (4096)
--9689-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9689-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9689-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9689-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9689-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9689-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9689-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9689-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9689-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9688== Checked 4,777,448 bytes
==9688==
==9688== LEAK SUMMARY:
==9688== definitely lost: 2,181 bytes in 11 blocks
==9688== indirectly lost: 6,756 bytes in 7 blocks
==9688== possibly lost: 0 bytes in 0 blocks
==9688== still reachable: 3,112,559 bytes in 69,130 blocks
==9688== suppressed: 0 bytes in 0 blocks
==9688== Rerun with --leak-check=full to see details of leaked memory
==9688==
==9688== Use --track-origins=yes to see where uninitialised values come from
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9688==
==9688== 1 errors in context 1 of 2:
==9688== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9688== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9688== by 0x488CD0: stringsubst (subst.c:301)
==9688== by 0x48801B: prefork (subst.c:77)
==9688== by 0x42B318: execcmd (exec.c:2619)
==9688== by 0x428CA0: execpline2 (exec.c:1697)
==9688== by 0x427FD2: execpline (exec.c:1484)
==9688== by 0x427756: execlist (exec.c:1267)
==9688== by 0x42717C: execode (exec.c:1073)
==9688== by 0x431299: runshfunc (exec.c:5040)
==9688== by 0x430E76: doshfunc (exec.c:4920)
==9688== by 0x4302FB: execshfunc (exec.c:4557)
==9688== by 0x42D8C1: execcmd (exec.c:3373)
==9688==
==9688==
==9688== 2 errors in context 2 of 2:
==9688== Conditional jump or move depends on uninitialised value(s)
==9688== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9688== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9688== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9688== by 0x40EFC2: execbuiltin (builtin.c:450)
==9688== by 0x42D8E9: execcmd (exec.c:3378)
==9688== by 0x428CA0: execpline2 (exec.c:1697)
==9688== by 0x427FD2: execpline (exec.c:1484)
==9688== by 0x42779A: execlist (exec.c:1275)
==9688== by 0x42717C: execode (exec.c:1073)
==9688== by 0x431299: runshfunc (exec.c:5040)
==9688== by 0x430E76: doshfunc (exec.c:4920)
==9688== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9688==
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689== Checked 4,893,648 bytes
==9689==
==9693== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9693-by-pythonnut-on-???
==9693== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9693-by-pythonnut-on-???
==9693== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9693-by-pythonnut-on-???
==9693==
==9693== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9693== don't want to do, unless you know exactly what you're doing,
==9693== or are doing some strange experiment):
==9693== /usr/lib/valgrind/../../bin/vgdb --pid=9693 ...command...
==9693==
==9693== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9693== /path/to/gdb ./zsh
==9693== and then give GDB the following command
==9693== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9693
==9693== --pid is optional if only one valgrind process is running
==9693==
==9689== LEAK SUMMARY:
==9689== definitely lost: 2,181 bytes in 11 blocks
==9689== indirectly lost: 6,756 bytes in 7 blocks
==9689== possibly lost: 0 bytes in 0 blocks
==9689== still reachable: 3,163,683 bytes in 69,626 blocks
==9689== suppressed: 0 bytes in 0 blocks
==9689== Rerun with --leak-check=full to see details of leaked memory
==9689==
==9689== Use --track-origins=yes to see where uninitialised values come from
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689==
==9689== 1 errors in context 1 of 2:
==9689== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9689== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9689== by 0x488CD0: stringsubst (subst.c:301)
==9689== by 0x48801B: prefork (subst.c:77)
==9689== by 0x42B318: execcmd (exec.c:2619)
==9689== by 0x428CA0: execpline2 (exec.c:1697)
==9689== by 0x427FD2: execpline (exec.c:1484)
==9689== by 0x427756: execlist (exec.c:1267)
==9689== by 0x42717C: execode (exec.c:1073)
==9689== by 0x431299: runshfunc (exec.c:5040)
==9689== by 0x430E76: doshfunc (exec.c:4920)
==9689== by 0x4302FB: execshfunc (exec.c:4557)
==9689== by 0x42D8C1: execcmd (exec.c:3373)
==9689==
==9689==
==9689== 2 errors in context 2 of 2:
==9689== Conditional jump or move depends on uninitialised value(s)
==9689== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9689== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9689== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9689== by 0x40EFC2: execbuiltin (builtin.c:450)
==9689== by 0x42D8E9: execcmd (exec.c:3378)
==9689== by 0x428CA0: execpline2 (exec.c:1697)
==9689== by 0x427FD2: execpline (exec.c:1484)
==9689== by 0x42779A: execlist (exec.c:1275)
==9689== by 0x42717C: execode (exec.c:1073)
==9689== by 0x431299: runshfunc (exec.c:5040)
==9689== by 0x430E76: doshfunc (exec.c:4920)
==9689== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9689==
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9693-- Caught __NR_exit; running __libc_freeres()
--9695-- Caught __NR_exit; running __libc_freeres()
--9693-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFE7F8C, len 4
==9695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9695-by-pythonnut-on-???
==9695== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9695-by-pythonnut-on-???
==9695== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9695-by-pythonnut-on-???
==9695==
==9695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9695== don't want to do, unless you know exactly what you're doing,
==9695== or are doing some strange experiment):
==9695== /usr/lib/valgrind/../../bin/vgdb --pid=9695 ...command...
==9695==
==9695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9695== /path/to/gdb ./zsh
==9695== and then give GDB the following command
==9695== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9695
==9695== --pid is optional if only one valgrind process is running
==9695==
==9693==
==9693== HEAP SUMMARY:
==9693== in use at exit: 3,121,534 bytes in 69,149 blocks
==9693== total heap usage: 1,464,116 allocs, 1,394,967 frees, 117,790,837 bytes allocated
==9693==
--9695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9695==
==9695== HEAP SUMMARY:
==9695== in use at exit: 3,172,776 bytes in 69,650 blocks
==9695== total heap usage: 1,468,659 allocs, 1,399,009 frees, 119,681,402 bytes allocated
==9695==
==9693== Searching for pointers to 69,149 not-freed blocks
--9693-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9693-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9693-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9693-- Scanning root segment: 0x4037000..0x403afff (16384)
--9693-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9693-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9693-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9693-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9693-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9693-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9693-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9693-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9693-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9693-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9693-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9693-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9693-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9693-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9693-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9693-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9693-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9693-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9693-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9693-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9693-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9693-- Scanning root segment: 0x701a000..0x701afff (4096)
--9693-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9693-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9693-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9693-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9693-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9693-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9693-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9693-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9693-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9695== Searching for pointers to 69,650 not-freed blocks
--9695-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9695-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9695-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9695-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9695-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9695-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9695-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9695-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9695-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9695-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9695-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9695-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9695-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9695-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9695-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9695-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9695-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9695-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9695-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9695-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9695-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9695-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9695-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9695-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9695-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9695-- Scanning root segment: 0x701a000..0x701afff (4096)
--9695-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9695-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9695-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9695-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9695-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9695-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9695-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9695-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9695-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9693== Checked 4,793,352 bytes
==9693==
==9693== LEAK SUMMARY:
==9693== definitely lost: 2,181 bytes in 11 blocks
==9693== indirectly lost: 6,756 bytes in 7 blocks
==9693== possibly lost: 0 bytes in 0 blocks
==9693== still reachable: 3,112,597 bytes in 69,131 blocks
==9693== suppressed: 0 bytes in 0 blocks
==9693== Rerun with --leak-check=full to see details of leaked memory
==9693==
==9693== Use --track-origins=yes to see where uninitialised values come from
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9693==
==9693== 1 errors in context 1 of 2:
==9693== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9693== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9693== by 0x488CD0: stringsubst (subst.c:301)
==9693== by 0x48801B: prefork (subst.c:77)
==9693== by 0x42B318: execcmd (exec.c:2619)
==9693== by 0x428CA0: execpline2 (exec.c:1697)
==9693== by 0x427FD2: execpline (exec.c:1484)
==9693== by 0x427756: execlist (exec.c:1267)
==9693== by 0x42717C: execode (exec.c:1073)
==9693== by 0x431299: runshfunc (exec.c:5040)
==9693== by 0x430E76: doshfunc (exec.c:4920)
==9693== by 0x4302FB: execshfunc (exec.c:4557)
==9693== by 0x42D8C1: execcmd (exec.c:3373)
==9693==
==9693==
==9693== 2 errors in context 2 of 2:
==9693== Conditional jump or move depends on uninitialised value(s)
==9693== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9693== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9693== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9693== by 0x40EFC2: execbuiltin (builtin.c:450)
==9693== by 0x42D8E9: execcmd (exec.c:3378)
==9693== by 0x428CA0: execpline2 (exec.c:1697)
==9693== by 0x427FD2: execpline (exec.c:1484)
==9693== by 0x42779A: execlist (exec.c:1275)
==9693== by 0x42717C: execode (exec.c:1073)
==9693== by 0x431299: runshfunc (exec.c:5040)
==9693== by 0x430E76: doshfunc (exec.c:4920)
==9693== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9693==
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695== Checked 4,894,928 bytes
==9695==
==9695== LEAK SUMMARY:
==9695== definitely lost: 2,181 bytes in 11 blocks
==9695== indirectly lost: 6,756 bytes in 7 blocks
==9695== possibly lost: 0 bytes in 0 blocks
==9695== still reachable: 3,163,839 bytes in 69,632 blocks
==9695== suppressed: 0 bytes in 0 blocks
==9695== Rerun with --leak-check=full to see details of leaked memory
==9695==
==9695== Use --track-origins=yes to see where uninitialised values come from
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695==
==9695== 1 errors in context 1 of 2:
==9695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9695== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9695== by 0x488CD0: stringsubst (subst.c:301)
==9695== by 0x48801B: prefork (subst.c:77)
==9695== by 0x42B318: execcmd (exec.c:2619)
==9695== by 0x428CA0: execpline2 (exec.c:1697)
==9695== by 0x427FD2: execpline (exec.c:1484)
==9695== by 0x427756: execlist (exec.c:1267)
==9695== by 0x42717C: execode (exec.c:1073)
==9695== by 0x431299: runshfunc (exec.c:5040)
==9695== by 0x430E76: doshfunc (exec.c:4920)
==9695== by 0x4302FB: execshfunc (exec.c:4557)
==9695== by 0x42D8C1: execcmd (exec.c:3373)
==9695==
==9695==
==9695== 2 errors in context 2 of 2:
==9695== Conditional jump or move depends on uninitialised value(s)
==9695== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9695== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9695== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9695== by 0x40EFC2: execbuiltin (builtin.c:450)
==9695== by 0x42D8E9: execcmd (exec.c:3378)
==9695== by 0x428CA0: execpline2 (exec.c:1697)
==9695== by 0x427FD2: execpline (exec.c:1484)
==9695== by 0x42779A: execlist (exec.c:1275)
==9695== by 0x42717C: execode (exec.c:1073)
==9695== by 0x431299: runshfunc (exec.c:5040)
==9695== by 0x430E76: doshfunc (exec.c:4920)
==9695== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9695==
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9694-- Caught __NR_exit; running __libc_freeres()
==9694== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9694-by-pythonnut-on-???
==9694== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9694-by-pythonnut-on-???
==9694== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9694-by-pythonnut-on-???
==9694==
==9694== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9694== don't want to do, unless you know exactly what you're doing,
==9694== or are doing some strange experiment):
==9694== /usr/lib/valgrind/../../bin/vgdb --pid=9694 ...command...
==9694==
==9694== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9694== /path/to/gdb ./zsh
==9694== and then give GDB the following command
==9694== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9694
==9694== --pid is optional if only one valgrind process is running
==9694==
--9694-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9694==
==9694== HEAP SUMMARY:
==9694== in use at exit: 3,172,712 bytes in 69,647 blocks
==9694== total heap usage: 1,468,661 allocs, 1,399,014 frees, 119,681,946 bytes allocated
==9694==
==9694== Searching for pointers to 69,647 not-freed blocks
--9694-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9694-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9694-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9694-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9694-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9694-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9694-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9694-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9694-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9694-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9694-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9694-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9694-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9694-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9694-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9694-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9694-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9694-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9694-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9694-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9694-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9694-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9694-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9694-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9694-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9694-- Scanning root segment: 0x701a000..0x701afff (4096)
--9694-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9694-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9694-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9694-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9694-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9694-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9694-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9694-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9694-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/regex.so
--7806-- svma 0x0000000d70, avma 0x000bc84d70
==9694== Checked 4,894,240 bytes
==9694==
==9694== LEAK SUMMARY:
==9694== definitely lost: 2,181 bytes in 11 blocks
==9694== indirectly lost: 6,756 bytes in 7 blocks
==9694== possibly lost: 0 bytes in 0 blocks
==9694== still reachable: 3,163,775 bytes in 69,629 blocks
==9694== suppressed: 0 bytes in 0 blocks
==9694== Rerun with --leak-check=full to see details of leaked memory
==9694==
==9694== Use --track-origins=yes to see where uninitialised values come from
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9694==
==9694== 1 errors in context 1 of 2:
==9694== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9694== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9694== by 0x488CD0: stringsubst (subst.c:301)
==9694== by 0x48801B: prefork (subst.c:77)
==9694== by 0x42B318: execcmd (exec.c:2619)
==9694== by 0x428CA0: execpline2 (exec.c:1697)
==9694== by 0x427FD2: execpline (exec.c:1484)
==9694== by 0x427756: execlist (exec.c:1267)
==9694== by 0x42717C: execode (exec.c:1073)
==9694== by 0x431299: runshfunc (exec.c:5040)
==9694== by 0x430E76: doshfunc (exec.c:4920)
==9694== by 0x4302FB: execshfunc (exec.c:4557)
==9694== by 0x42D8C1: execcmd (exec.c:3373)
==9694==
==9694==
==9694== 2 errors in context 2 of 2:
==9694== Conditional jump or move depends on uninitialised value(s)
==9694== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9694== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9694== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9694== by 0x40EFC2: execbuiltin (builtin.c:450)
==9694== by 0x42D8E9: execcmd (exec.c:3378)
==9694== by 0x428CA0: execpline2 (exec.c:1697)
==9694== by 0x427FD2: execpline (exec.c:1484)
==9694== by 0x42779A: execlist (exec.c:1275)
==9694== by 0x42717C: execode (exec.c:1073)
==9694== by 0x431299: runshfunc (exec.c:5040)
==9694== by 0x430E76: doshfunc (exec.c:4920)
==9694== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9694==
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9697-by-pythonnut-on-???
==9697== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9697-by-pythonnut-on-???
==9697== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9697-by-pythonnut-on-???
==9697==
==9697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9697== don't want to do, unless you know exactly what you're doing,
==9697== or are doing some strange experiment):
==9697== /usr/lib/valgrind/../../bin/vgdb --pid=9697 ...command...
==9697==
==9697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9697== /path/to/gdb ./zsh
==9697== and then give GDB the following command
==9697== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9697
==9697== --pid is optional if only one valgrind process is running
==9697==
--9698-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFE77CC, len 4
==9698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9698-by-pythonnut-on-???
==9698== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9698-by-pythonnut-on-???
==9698== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9698-by-pythonnut-on-???
==9698==
==9698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9698== don't want to do, unless you know exactly what you're doing,
==9698== or are doing some strange experiment):
==9698== /usr/lib/valgrind/../../bin/vgdb --pid=9698 ...command...
==9698==
==9698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9698== /path/to/gdb ./zsh
==9698== and then give GDB the following command
==9698== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9698
==9698== --pid is optional if only one valgrind process is running
==9698==
--9698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9698==
==9698== HEAP SUMMARY:
==9698== in use at exit: 3,172,873 bytes in 69,653 blocks
==9698== total heap usage: 1,468,666 allocs, 1,399,013 frees, 119,683,611 bytes allocated
==9698==
==9698== Searching for pointers to 69,653 not-freed blocks
--9698-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9698-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9698-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9698-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9698-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9698-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9698-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9698-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9698-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9698-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9698-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9698-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9698-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9698-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9698-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9698-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9698-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9698-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9698-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9698-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9698-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9698-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9698-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9698-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9698-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9698-- Scanning root segment: 0x701a000..0x701afff (4096)
--9698-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9698-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9698-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9698-- Scanning root segment: 0xb054000..0xb054fff (4096)
==9700== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9700-by-pythonnut-on-???
==9700== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9700-by-pythonnut-on-???
==9700== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9700-by-pythonnut-on-???
==9700==
==9700== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9700== don't want to do, unless you know exactly what you're doing,
==9700== or are doing some strange experiment):
==9700== /usr/lib/valgrind/../../bin/vgdb --pid=9700 ...command...
==9700==
==9700== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9700== /path/to/gdb ./zsh
==9700== and then give GDB the following command
==9700== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9700
==9700== --pid is optional if only one valgrind process is running
--9698-- Scanning root segment: 0xb268000..0xb268fff (4096)
==9700==
--9698-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9698-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9698-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9698-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9700-- Caught __NR_exit; running __libc_freeres()
--9700-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700==
==9700== HEAP SUMMARY:
==9700== in use at exit: 3,140,020 bytes in 69,570 blocks
==9700== total heap usage: 1,465,843 allocs, 1,396,273 frees, 117,901,385 bytes allocated
==9700==
==9700== Searching for pointers to 69,570 not-freed blocks
--9700-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9700-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9700-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9700-- Scanning root segment: 0x4037000..0x403afff (16384)
--9700-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9700-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9700-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9700-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9700-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9700-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9700-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9700-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9700-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9700-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9700-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9700-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9700-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9700-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9700-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9700-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9700-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9700-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9700-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9700-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9700-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9700-- Scanning root segment: 0x701a000..0x701afff (4096)
--9700-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9700-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9700-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9700-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9700-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9700-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9700-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9700-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9700-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9700-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9698== Checked 4,895,528 bytes
==9698==
==9698== LEAK SUMMARY:
==9698== definitely lost: 2,181 bytes in 11 blocks
==9698== indirectly lost: 6,756 bytes in 7 blocks
==9698== possibly lost: 0 bytes in 0 blocks
==9698== still reachable: 3,163,936 bytes in 69,635 blocks
==9698== suppressed: 0 bytes in 0 blocks
==9698== Rerun with --leak-check=full to see details of leaked memory
==9698==
==9698== Use --track-origins=yes to see where uninitialised values come from
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9698==
==9698== 1 errors in context 1 of 2:
==9698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9698== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9698== by 0x488CD0: stringsubst (subst.c:301)
==9698== by 0x48801B: prefork (subst.c:77)
==9698== by 0x42B318: execcmd (exec.c:2619)
==9698== by 0x428CA0: execpline2 (exec.c:1697)
==9698== by 0x427FD2: execpline (exec.c:1484)
==9698== by 0x427756: execlist (exec.c:1267)
==9698== by 0x42717C: execode (exec.c:1073)
==9698== by 0x431299: runshfunc (exec.c:5040)
==9698== by 0x430E76: doshfunc (exec.c:4920)
==9698== by 0x4302FB: execshfunc (exec.c:4557)
==9698== by 0x42D8C1: execcmd (exec.c:3373)
==9698==
==9698==
==9698== 2 errors in context 2 of 2:
==9698== Conditional jump or move depends on uninitialised value(s)
==9698== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9698== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9698== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9698== by 0x40EFC2: execbuiltin (builtin.c:450)
==9698== by 0x42D8E9: execcmd (exec.c:3378)
==9698== by 0x428CA0: execpline2 (exec.c:1697)
==9698== by 0x427FD2: execpline (exec.c:1484)
==9698== by 0x42779A: execlist (exec.c:1275)
==9698== by 0x42717C: execode (exec.c:1073)
==9698== by 0x431299: runshfunc (exec.c:5040)
==9698== by 0x430E76: doshfunc (exec.c:4920)
==9698== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9698==
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9697-- Caught __NR_exit; running __libc_freeres()
--9697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700== Checked 4,832,216 bytes
==9700==
==9697==
==9697== HEAP SUMMARY:
==9697== in use at exit: 3,172,809 bytes in 69,650 blocks
==9697== total heap usage: 1,468,668 allocs, 1,399,018 frees, 119,684,155 bytes allocated
==9697==
==9700== LEAK SUMMARY:
==9700== definitely lost: 2,181 bytes in 11 blocks
==9700== indirectly lost: 6,756 bytes in 7 blocks
==9700== possibly lost: 0 bytes in 0 blocks
==9700== still reachable: 3,131,083 bytes in 69,552 blocks
==9700== suppressed: 0 bytes in 0 blocks
==9700== Rerun with --leak-check=full to see details of leaked memory
==9700==
==9700== Use --track-origins=yes to see where uninitialised values come from
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9700==
==9700== 1 errors in context 1 of 2:
==9700== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9700== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9700== by 0x488CD0: stringsubst (subst.c:301)
==9700== by 0x48801B: prefork (subst.c:77)
==9700== by 0x42B318: execcmd (exec.c:2619)
==9700== by 0x428CA0: execpline2 (exec.c:1697)
==9700== by 0x427FD2: execpline (exec.c:1484)
==9700== by 0x427756: execlist (exec.c:1267)
==9700== by 0x42717C: execode (exec.c:1073)
==9700== by 0x431299: runshfunc (exec.c:5040)
==9700== by 0x430E76: doshfunc (exec.c:4920)
==9700== by 0x4302FB: execshfunc (exec.c:4557)
==9700== by 0x42D8C1: execcmd (exec.c:3373)
==9700==
==9700==
==9700== 2 errors in context 2 of 2:
==9700== Conditional jump or move depends on uninitialised value(s)
==9700== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9700== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9700== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9700== by 0x40EFC2: execbuiltin (builtin.c:450)
==9700== by 0x42D8E9: execcmd (exec.c:3378)
==9700== by 0x428CA0: execpline2 (exec.c:1697)
==9700== by 0x427FD2: execpline (exec.c:1484)
==9700== by 0x42779A: execlist (exec.c:1275)
==9700== by 0x42717C: execode (exec.c:1073)
==9700== by 0x431299: runshfunc (exec.c:5040)
==9700== by 0x430E76: doshfunc (exec.c:4920)
==9700== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9700==
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== Searching for pointers to 69,650 not-freed blocks
--9697-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9697-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9697-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9697-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9697-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9697-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9697-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9697-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9697-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9697-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9697-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9697-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9697-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9697-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9697-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9697-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9697-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9697-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9697-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9697-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9697-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9697-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9697-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9697-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9697-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9697-- Scanning root segment: 0x701a000..0x701afff (4096)
--9697-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9697-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9697-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9697-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9697-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9697-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9697-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9697-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9697-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9697== Checked 4,894,848 bytes
==9697==
==9697== LEAK SUMMARY:
==9697== definitely lost: 2,181 bytes in 11 blocks
==9697== indirectly lost: 6,756 bytes in 7 blocks
==9697== possibly lost: 0 bytes in 0 blocks
==9697== still reachable: 3,163,872 bytes in 69,632 blocks
==9697== suppressed: 0 bytes in 0 blocks
==9697== Rerun with --leak-check=full to see details of leaked memory
==9697==
==9697== Use --track-origins=yes to see where uninitialised values come from
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697==
==9697== 1 errors in context 1 of 2:
==9697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9697== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9697== by 0x488CD0: stringsubst (subst.c:301)
==9697== by 0x48801B: prefork (subst.c:77)
==9697== by 0x42B318: execcmd (exec.c:2619)
==9697== by 0x428CA0: execpline2 (exec.c:1697)
==9697== by 0x427FD2: execpline (exec.c:1484)
==9697== by 0x427756: execlist (exec.c:1267)
==9697== by 0x42717C: execode (exec.c:1073)
==9697== by 0x431299: runshfunc (exec.c:5040)
==9697== by 0x430E76: doshfunc (exec.c:4920)
==9697== by 0x4302FB: execshfunc (exec.c:4557)
==9697== by 0x42D8C1: execcmd (exec.c:3373)
==9697==
==9697==
==9697== 2 errors in context 2 of 2:
==9697== Conditional jump or move depends on uninitialised value(s)
==9697== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9697== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9697== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9697== by 0x40EFC2: execbuiltin (builtin.c:450)
==9697== by 0x42D8E9: execcmd (exec.c:3378)
==9697== by 0x428CA0: execpline2 (exec.c:1697)
==9697== by 0x427FD2: execpline (exec.c:1484)
==9697== by 0x42779A: execlist (exec.c:1275)
==9697== by 0x42717C: execode (exec.c:1073)
==9697== by 0x431299: runshfunc (exec.c:5040)
==9697== by 0x430E76: doshfunc (exec.c:4920)
==9697== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9697==
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF757C, len 4
client request: code 4d430005, addr 0xFFEFF642C, len 4
client request: code 4d430005, addr 0xFFEFF933C, len 4
--9657-- Caught __NR_exit; running __libc_freeres()
--9657-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9657==
==9657== HEAP SUMMARY:
==9657== in use at exit: 3,151,130 bytes in 69,168 blocks
==9657== total heap usage: 1,468,759 allocs, 1,399,591 frees, 119,700,926 bytes allocated
==9657==
==9657== Searching for pointers to 69,168 not-freed blocks
--9657-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9657-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9657-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9657-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9657-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9657-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9657-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9657-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9657-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9657-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9657-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9657-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9657-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9657-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9657-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9657-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9657-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9657-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9657-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9657-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9657-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9657-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9657-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9657-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9657-- Scanning root segment: 0x701a000..0x701afff (4096)
--9657-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9657-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9657-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9657-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9657-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9657-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9657-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9657-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9657-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9657== Checked 4,796,992 bytes
==9657==
==9657== LEAK SUMMARY:
==9657== definitely lost: 2,181 bytes in 11 blocks
==9657== indirectly lost: 6,756 bytes in 7 blocks
==9657== possibly lost: 0 bytes in 0 blocks
==9657== still reachable: 3,142,193 bytes in 69,150 blocks
==9657== suppressed: 0 bytes in 0 blocks
==9657== Rerun with --leak-check=full to see details of leaked memory
==9657==
==9657== Use --track-origins=yes to see where uninitialised values come from
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9657==
==9657== 1 errors in context 1 of 2:
==9657== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9657== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9657== by 0x488CD0: stringsubst (subst.c:301)
==9657== by 0x48801B: prefork (subst.c:77)
==9657== by 0x42B318: execcmd (exec.c:2619)
==9657== by 0x428CA0: execpline2 (exec.c:1697)
==9657== by 0x427FD2: execpline (exec.c:1484)
==9657== by 0x427756: execlist (exec.c:1267)
==9657== by 0x42717C: execode (exec.c:1073)
==9657== by 0x431299: runshfunc (exec.c:5040)
==9657== by 0x430E76: doshfunc (exec.c:4920)
==9657== by 0x4302FB: execshfunc (exec.c:4557)
==9657== by 0x42D8C1: execcmd (exec.c:3373)
==9657==
==9657==
==9657== 2 errors in context 2 of 2:
==9657== Conditional jump or move depends on uninitialised value(s)
==9657== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9657== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9657== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9657== by 0x40EFC2: execbuiltin (builtin.c:450)
==9657== by 0x42D8E9: execcmd (exec.c:3378)
==9657== by 0x428CA0: execpline2 (exec.c:1697)
==9657== by 0x427FD2: execpline (exec.c:1484)
==9657== by 0x42779A: execlist (exec.c:1275)
==9657== by 0x42717C: execode (exec.c:1073)
==9657== by 0x431299: runshfunc (exec.c:5040)
==9657== by 0x430E76: doshfunc (exec.c:4920)
==9657== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9657==
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9653-- Caught __NR_exit; running __libc_freeres()
--9653-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9653==
==9653== HEAP SUMMARY:
==9653== in use at exit: 3,121,105 bytes in 68,939 blocks
==9653== total heap usage: 1,463,641 allocs, 1,394,702 frees, 117,967,639 bytes allocated
==9653==
==9653== Searching for pointers to 68,939 not-freed blocks
--9653-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9653-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9653-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9653-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9653-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9653-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9653-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9653-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9653-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9653-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9653-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9653-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9653-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9653-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9653-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9653-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9653-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9653-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9653-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9653-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9653-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9653-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9653-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9653-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9653-- Scanning root segment: 0x701a000..0x701afff (4096)
--9653-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9653-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9653-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9653-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9653-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9653-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9653-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9653-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9653-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9653== Checked 4,765,856 bytes
==9653==
==9653== LEAK SUMMARY:
==9653== definitely lost: 2,181 bytes in 11 blocks
==9653== indirectly lost: 6,756 bytes in 7 blocks
==9653== possibly lost: 0 bytes in 0 blocks
==9653== still reachable: 3,112,168 bytes in 68,921 blocks
==9653== suppressed: 0 bytes in 0 blocks
==9653== Rerun with --leak-check=full to see details of leaked memory
==9653==
==9653== Use --track-origins=yes to see where uninitialised values come from
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9653==
==9653== 1 errors in context 1 of 2:
==9653== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9653== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9653== by 0x488CD0: stringsubst (subst.c:301)
==9653== by 0x48801B: prefork (subst.c:77)
==9653== by 0x42B318: execcmd (exec.c:2619)
==9653== by 0x428CA0: execpline2 (exec.c:1697)
==9653== by 0x427FD2: execpline (exec.c:1484)
==9653== by 0x427756: execlist (exec.c:1267)
==9653== by 0x42717C: execode (exec.c:1073)
==9653== by 0x431299: runshfunc (exec.c:5040)
==9653== by 0x430E76: doshfunc (exec.c:4920)
==9653== by 0x4302FB: execshfunc (exec.c:4557)
==9653== by 0x42D8C1: execcmd (exec.c:3373)
==9653==
==9653==
==9653== 2 errors in context 2 of 2:
==9653== Conditional jump or move depends on uninitialised value(s)
==9653== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9653== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9653== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9653== by 0x40EFC2: execbuiltin (builtin.c:450)
==9653== by 0x42D8E9: execcmd (exec.c:3378)
==9653== by 0x428CA0: execpline2 (exec.c:1697)
==9653== by 0x427FD2: execpline (exec.c:1484)
==9653== by 0x42779A: execlist (exec.c:1275)
==9653== by 0x42717C: execode (exec.c:1073)
==9653== by 0x431299: runshfunc (exec.c:5040)
==9653== by 0x430E76: doshfunc (exec.c:4920)
==9653== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9653==
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9704-- Caught __NR_exit; running __libc_freeres()
==9704== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9704-by-pythonnut-on-???
==9704== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9704-by-pythonnut-on-???
==9704== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9704-by-pythonnut-on-???
==9704==
==9704== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9704== don't want to do, unless you know exactly what you're doing,
==9704== or are doing some strange experiment):
==9704== /usr/lib/valgrind/../../bin/vgdb --pid=9704 ...command...
==9704==
==9704== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9704== /path/to/gdb ./zsh
==9704== and then give GDB the following command
==9704== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9704
==9704== --pid is optional if only one valgrind process is running
==9704==
==9705== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9705-by-pythonnut-on-???
==9705== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9705-by-pythonnut-on-???
==9705== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9705-by-pythonnut-on-???
==9705==
==9705== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9705== don't want to do, unless you know exactly what you're doing,
==9705== or are doing some strange experiment):
==9705== /usr/lib/valgrind/../../bin/vgdb --pid=9705 ...command...
==9705==
==9705== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9705== /path/to/gdb ./zsh
==9705== and then give GDB the following command
==9705== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9705
==9705== --pid is optional if only one valgrind process is running
==9705==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--9704-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9704==
==9704== HEAP SUMMARY:
==9704== in use at exit: 3,122,749 bytes in 68,991 blocks
==9704== total heap usage: 1,463,700 allocs, 1,394,709 frees, 117,972,407 bytes allocated
==9704==
==9704== Searching for pointers to 68,991 not-freed blocks
--9704-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9704-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9704-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9704-- Scanning root segment: 0x4037000..0x403afff (16384)
--9704-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9704-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9704-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9704-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9704-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9704-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9704-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9704-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9704-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9704-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9704-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9704-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9704-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9704-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9704-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9704-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9704-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9704-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9704-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9704-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9704-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9704-- Scanning root segment: 0x701a000..0x701afff (4096)
--9704-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9704-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9704-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9704-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9704-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9704-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9704-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9704-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9704-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9704== Checked 4,784,424 bytes
==9704==
==9704== LEAK SUMMARY:
==9704== definitely lost: 2,181 bytes in 11 blocks
==9704== indirectly lost: 6,756 bytes in 7 blocks
==9704== possibly lost: 0 bytes in 0 blocks
==9704== still reachable: 3,113,812 bytes in 68,973 blocks
==9704== suppressed: 0 bytes in 0 blocks
==9704== Rerun with --leak-check=full to see details of leaked memory
==9704==
==9704== Use --track-origins=yes to see where uninitialised values come from
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9704==
==9704== 1 errors in context 1 of 2:
==9704== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9704== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9704== by 0x488CD0: stringsubst (subst.c:301)
==9704== by 0x48801B: prefork (subst.c:77)
==9704== by 0x42B318: execcmd (exec.c:2619)
==9704== by 0x428CA0: execpline2 (exec.c:1697)
==9704== by 0x427FD2: execpline (exec.c:1484)
==9704== by 0x427756: execlist (exec.c:1267)
==9704== by 0x42717C: execode (exec.c:1073)
==9704== by 0x431299: runshfunc (exec.c:5040)
==9704== by 0x430E76: doshfunc (exec.c:4920)
==9704== by 0x4302FB: execshfunc (exec.c:4557)
==9704== by 0x42D8C1: execcmd (exec.c:3373)
==9704==
==9704==
==9704== 2 errors in context 2 of 2:
==9704== Conditional jump or move depends on uninitialised value(s)
==9704== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9704== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9704== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9704== by 0x40EFC2: execbuiltin (builtin.c:450)
==9704== by 0x42D8E9: execcmd (exec.c:3378)
==9704== by 0x428CA0: execpline2 (exec.c:1697)
==9704== by 0x427FD2: execpline (exec.c:1484)
==9704== by 0x42779A: execlist (exec.c:1275)
==9704== by 0x42717C: execode (exec.c:1073)
==9704== by 0x431299: runshfunc (exec.c:5040)
==9704== by 0x430E76: doshfunc (exec.c:4920)
==9704== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9704==
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9703-by-pythonnut-on-???
==9703== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9703-by-pythonnut-on-???
==9703== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9703-by-pythonnut-on-???
==9703==
==9703== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9703== don't want to do, unless you know exactly what you're doing,
==9703== or are doing some strange experiment):
==9703== /usr/lib/valgrind/../../bin/vgdb --pid=9703 ...command...
==9703==
==9703== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9703== /path/to/gdb ./zsh
==9703== and then give GDB the following command
==9703== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9703
==9703== --pid is optional if only one valgrind process is running
==9703==
--9703-- Caught __NR_exit; running __libc_freeres()
--9703-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9703==
==9703== HEAP SUMMARY:
==9703== in use at exit: 3,122,685 bytes in 68,988 blocks
==9703== total heap usage: 1,463,702 allocs, 1,394,714 frees, 117,972,951 bytes allocated
==9703==
==9703== Searching for pointers to 68,988 not-freed blocks
--9703-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9703-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9703-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9703-- Scanning root segment: 0x4037000..0x403afff (16384)
--9703-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9703-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9703-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9703-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9703-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9703-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9703-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9703-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9703-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9703-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9703-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9703-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9703-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9703-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9703-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9703-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9703-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9703-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9703-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9703-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9703-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9703-- Scanning root segment: 0x701a000..0x701afff (4096)
--9703-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9703-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9703-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9703-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9703-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9703-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9703-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9703-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9703-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9703== Checked 4,783,736 bytes
==9703==
==9703== LEAK SUMMARY:
==9703== definitely lost: 2,181 bytes in 11 blocks
==9703== indirectly lost: 6,756 bytes in 7 blocks
==9703== possibly lost: 0 bytes in 0 blocks
==9703== still reachable: 3,113,748 bytes in 68,970 blocks
==9703== suppressed: 0 bytes in 0 blocks
==9703== Rerun with --leak-check=full to see details of leaked memory
==9703==
==9703== Use --track-origins=yes to see where uninitialised values come from
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703==
==9703== 1 errors in context 1 of 2:
==9703== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9703== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9703== by 0x488CD0: stringsubst (subst.c:301)
==9703== by 0x48801B: prefork (subst.c:77)
==9703== by 0x42B318: execcmd (exec.c:2619)
==9703== by 0x428CA0: execpline2 (exec.c:1697)
==9703== by 0x427FD2: execpline (exec.c:1484)
==9703== by 0x427756: execlist (exec.c:1267)
==9703== by 0x42717C: execode (exec.c:1073)
==9703== by 0x431299: runshfunc (exec.c:5040)
==9703== by 0x430E76: doshfunc (exec.c:4920)
==9703== by 0x4302FB: execshfunc (exec.c:4557)
==9703== by 0x42D8C1: execcmd (exec.c:3373)
==9703==
==9703==
==9703== 2 errors in context 2 of 2:
==9703== Conditional jump or move depends on uninitialised value(s)
==9703== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9703== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9703== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9703== by 0x40EFC2: execbuiltin (builtin.c:450)
==9703== by 0x42D8E9: execcmd (exec.c:3378)
==9703== by 0x428CA0: execpline2 (exec.c:1697)
==9703== by 0x427FD2: execpline (exec.c:1484)
==9703== by 0x42779A: execlist (exec.c:1275)
==9703== by 0x42717C: execode (exec.c:1073)
==9703== by 0x431299: runshfunc (exec.c:5040)
==9703== by 0x430E76: doshfunc (exec.c:4920)
==9703== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9703==
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9706-by-pythonnut-on-???
==9706== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9706-by-pythonnut-on-???
==9706== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9706-by-pythonnut-on-???
==9706==
==9706== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9706== don't want to do, unless you know exactly what you're doing,
==9706== or are doing some strange experiment):
==9706== /usr/lib/valgrind/../../bin/vgdb --pid=9706 ...command...
==9706==
==9706== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9706== /path/to/gdb ./zsh
==9706== and then give GDB the following command
==9706== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9706
==9706== --pid is optional if only one valgrind process is running
==9706==
--9706-- Caught __NR_exit; running __libc_freeres()
--9706-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9706==
==9706== HEAP SUMMARY:
==9706== in use at exit: 3,122,685 bytes in 68,988 blocks
==9706== total heap usage: 1,463,717 allocs, 1,394,729 frees, 117,977,935 bytes allocated
==9706==
==9706== Searching for pointers to 68,988 not-freed blocks
--9706-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9706-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9706-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9706-- Scanning root segment: 0x4037000..0x403afff (16384)
--9706-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9706-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9706-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9706-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9706-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9706-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9706-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9706-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9706-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9706-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9706-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9706-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9706-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9706-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9706-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9706-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9706-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9706-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9706-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9706-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9706-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9706-- Scanning root segment: 0x701a000..0x701afff (4096)
--9706-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9706-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9706-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9706-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9706-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9706-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9706-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9706-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9706-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9706== Checked 4,783,736 bytes
==9706==
==9706== LEAK SUMMARY:
==9706== definitely lost: 2,181 bytes in 11 blocks
==9706== indirectly lost: 6,756 bytes in 7 blocks
==9706== possibly lost: 0 bytes in 0 blocks
==9706== still reachable: 3,113,748 bytes in 68,970 blocks
==9706== suppressed: 0 bytes in 0 blocks
==9706== Rerun with --leak-check=full to see details of leaked memory
==9706==
==9706== Use --track-origins=yes to see where uninitialised values come from
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706==
==9706== 1 errors in context 1 of 2:
==9706== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9706== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9706== by 0x488CD0: stringsubst (subst.c:301)
==9706== by 0x48801B: prefork (subst.c:77)
==9706== by 0x42B318: execcmd (exec.c:2619)
==9706== by 0x428CA0: execpline2 (exec.c:1697)
==9706== by 0x427FD2: execpline (exec.c:1484)
==9706== by 0x427756: execlist (exec.c:1267)
==9706== by 0x42717C: execode (exec.c:1073)
==9706== by 0x431299: runshfunc (exec.c:5040)
==9706== by 0x430E76: doshfunc (exec.c:4920)
==9706== by 0x4302FB: execshfunc (exec.c:4557)
==9706== by 0x42D8C1: execcmd (exec.c:3373)
==9706==
==9706==
==9706== 2 errors in context 2 of 2:
==9706== Conditional jump or move depends on uninitialised value(s)
==9706== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9706== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9706== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9706== by 0x40EFC2: execbuiltin (builtin.c:450)
==9706== by 0x42D8E9: execcmd (exec.c:3378)
==9706== by 0x428CA0: execpline2 (exec.c:1697)
==9706== by 0x427FD2: execpline (exec.c:1484)
==9706== by 0x42779A: execlist (exec.c:1275)
==9706== by 0x42717C: execode (exec.c:1073)
==9706== by 0x431299: runshfunc (exec.c:5040)
==9706== by 0x430E76: doshfunc (exec.c:4920)
==9706== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9706==
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9707-by-pythonnut-on-???
==9707== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9707-by-pythonnut-on-???
==9707== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9707-by-pythonnut-on-???
==9707==
==9707== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9707== don't want to do, unless you know exactly what you're doing,
==9707== or are doing some strange experiment):
==9707== /usr/lib/valgrind/../../bin/vgdb --pid=9707 ...command...
==9707==
==9707== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9707== /path/to/gdb ./zsh
==9707== and then give GDB the following command
==9707== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9707
==9707== --pid is optional if only one valgrind process is running
==9707==
--9707-- Caught __NR_exit; running __libc_freeres()
--9707-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9707==
==9707== HEAP SUMMARY:
==9707== in use at exit: 3,122,685 bytes in 68,988 blocks
==9707== total heap usage: 1,463,722 allocs, 1,394,734 frees, 117,980,048 bytes allocated
==9707==
==9707== Searching for pointers to 68,988 not-freed blocks
--9707-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9707-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9707-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9707-- Scanning root segment: 0x4037000..0x403afff (16384)
--9707-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9707-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9707-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9707-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9707-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9707-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9707-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9707-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9707-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9707-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9707-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9707-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9707-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9707-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9707-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9707-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9707-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9707-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9707-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9707-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9707-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9707-- Scanning root segment: 0x701a000..0x701afff (4096)
--9707-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9707-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9707-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9707-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9707-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9707-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9707-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9707-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9707-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9707== Checked 4,783,736 bytes
==9707==
==9707== LEAK SUMMARY:
==9707== definitely lost: 2,181 bytes in 11 blocks
==9707== indirectly lost: 6,756 bytes in 7 blocks
==9707== possibly lost: 0 bytes in 0 blocks
==9707== still reachable: 3,113,748 bytes in 68,970 blocks
==9707== suppressed: 0 bytes in 0 blocks
==9707== Rerun with --leak-check=full to see details of leaked memory
==9707==
==9707== Use --track-origins=yes to see where uninitialised values come from
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707==
==9707== 1 errors in context 1 of 2:
==9707== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9707== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9707== by 0x488CD0: stringsubst (subst.c:301)
==9707== by 0x48801B: prefork (subst.c:77)
==9707== by 0x42B318: execcmd (exec.c:2619)
==9707== by 0x428CA0: execpline2 (exec.c:1697)
==9707== by 0x427FD2: execpline (exec.c:1484)
==9707== by 0x427756: execlist (exec.c:1267)
==9707== by 0x42717C: execode (exec.c:1073)
==9707== by 0x431299: runshfunc (exec.c:5040)
==9707== by 0x430E76: doshfunc (exec.c:4920)
==9707== by 0x4302FB: execshfunc (exec.c:4557)
==9707== by 0x42D8C1: execcmd (exec.c:3373)
==9707==
==9707==
==9707== 2 errors in context 2 of 2:
==9707== Conditional jump or move depends on uninitialised value(s)
==9707== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9707== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9707== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9707== by 0x40EFC2: execbuiltin (builtin.c:450)
==9707== by 0x42D8E9: execcmd (exec.c:3378)
==9707== by 0x428CA0: execpline2 (exec.c:1697)
==9707== by 0x427FD2: execpline (exec.c:1484)
==9707== by 0x42779A: execlist (exec.c:1275)
==9707== by 0x42717C: execode (exec.c:1073)
==9707== by 0x431299: runshfunc (exec.c:5040)
==9707== by 0x430E76: doshfunc (exec.c:4920)
==9707== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9707==
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9708-- Caught __NR_exit; running __libc_freeres()
==9708== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9708-by-pythonnut-on-???
==9708== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9708-by-pythonnut-on-???
==9708== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9708-by-pythonnut-on-???
==9708==
==9708== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9708== don't want to do, unless you know exactly what you're doing,
==9708== or are doing some strange experiment):
==9708== /usr/lib/valgrind/../../bin/vgdb --pid=9708 ...command...
==9708==
==9708== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9708== /path/to/gdb ./zsh
==9708== and then give GDB the following command
==9708== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9708
==9708== --pid is optional if only one valgrind process is running
==9708==
--9708-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9708==
==9708== HEAP SUMMARY:
==9708== in use at exit: 3,122,685 bytes in 68,988 blocks
==9708== total heap usage: 1,463,727 allocs, 1,394,739 frees, 117,982,161 bytes allocated
==9708==
==9708== Searching for pointers to 68,988 not-freed blocks
--9708-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9708-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9708-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9708-- Scanning root segment: 0x4037000..0x403afff (16384)
--9708-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9708-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9708-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9708-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9708-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9708-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9708-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9708-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9708-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9708-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9708-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9708-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9708-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9708-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9708-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9708-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9708-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9708-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9708-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9708-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9708-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9708-- Scanning root segment: 0x701a000..0x701afff (4096)
--9708-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9708-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9708-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9708-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9708-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9708-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9708-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9708-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9708-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9708== Checked 4,783,736 bytes
==9708==
==9708== LEAK SUMMARY:
==9708== definitely lost: 2,181 bytes in 11 blocks
==9708== indirectly lost: 6,756 bytes in 7 blocks
==9708== possibly lost: 0 bytes in 0 blocks
==9708== still reachable: 3,113,748 bytes in 68,970 blocks
==9708== suppressed: 0 bytes in 0 blocks
==9708== Rerun with --leak-check=full to see details of leaked memory
==9708==
==9708== Use --track-origins=yes to see where uninitialised values come from
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9708==
==9708== 1 errors in context 1 of 2:
==9708== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9708== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9708== by 0x488CD0: stringsubst (subst.c:301)
==9708== by 0x48801B: prefork (subst.c:77)
==9708== by 0x42B318: execcmd (exec.c:2619)
==9708== by 0x428CA0: execpline2 (exec.c:1697)
==9708== by 0x427FD2: execpline (exec.c:1484)
==9708== by 0x427756: execlist (exec.c:1267)
==9708== by 0x42717C: execode (exec.c:1073)
==9708== by 0x431299: runshfunc (exec.c:5040)
==9708== by 0x430E76: doshfunc (exec.c:4920)
==9708== by 0x4302FB: execshfunc (exec.c:4557)
==9708== by 0x42D8C1: execcmd (exec.c:3373)
==9708==
==9708==
==9708== 2 errors in context 2 of 2:
==9708== Conditional jump or move depends on uninitialised value(s)
==9708== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9708== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9708== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9708== by 0x40EFC2: execbuiltin (builtin.c:450)
==9708== by 0x42D8E9: execcmd (exec.c:3378)
==9708== by 0x428CA0: execpline2 (exec.c:1697)
==9708== by 0x427FD2: execpline (exec.c:1484)
==9708== by 0x42779A: execlist (exec.c:1275)
==9708== by 0x42717C: execode (exec.c:1073)
==9708== by 0x431299: runshfunc (exec.c:5040)
==9708== by 0x430E76: doshfunc (exec.c:4920)
==9708== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9708==
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9709-by-pythonnut-on-???
==9709== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9709-by-pythonnut-on-???
==9709== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9709-by-pythonnut-on-???
==9709==
==9709== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9709== don't want to do, unless you know exactly what you're doing,
==9709== or are doing some strange experiment):
==9709== /usr/lib/valgrind/../../bin/vgdb --pid=9709 ...command...
==9709==
==9709== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9709== /path/to/gdb ./zsh
==9709== and then give GDB the following command
==9709== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9709
==9709== --pid is optional if only one valgrind process is running
==9709==
--9709-- Caught __NR_exit; running __libc_freeres()
--9709-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9709==
==9709== HEAP SUMMARY:
==9709== in use at exit: 3,122,685 bytes in 68,988 blocks
==9709== total heap usage: 1,463,732 allocs, 1,394,744 frees, 117,984,274 bytes allocated
==9709==
==9709== Searching for pointers to 68,988 not-freed blocks
--9709-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9709-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9709-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9709-- Scanning root segment: 0x4037000..0x403afff (16384)
--9709-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9709-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9709-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9709-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9709-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9709-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9709-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9709-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9709-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9709-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9709-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9709-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9709-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9709-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9709-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9709-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9709-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9709-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9709-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9709-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9709-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9709-- Scanning root segment: 0x701a000..0x701afff (4096)
--9709-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9709-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9709-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9709-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9709-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9709-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9709-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9709-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9709-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9709== Checked 4,783,736 bytes
==9709==
==9709== LEAK SUMMARY:
==9709== definitely lost: 2,181 bytes in 11 blocks
==9709== indirectly lost: 6,756 bytes in 7 blocks
==9709== possibly lost: 0 bytes in 0 blocks
==9709== still reachable: 3,113,748 bytes in 68,970 blocks
==9709== suppressed: 0 bytes in 0 blocks
==9709== Rerun with --leak-check=full to see details of leaked memory
==9709==
==9709== Use --track-origins=yes to see where uninitialised values come from
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709==
==9709== 1 errors in context 1 of 2:
==9709== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9709== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9709== by 0x488CD0: stringsubst (subst.c:301)
==9709== by 0x48801B: prefork (subst.c:77)
==9709== by 0x42B318: execcmd (exec.c:2619)
==9709== by 0x428CA0: execpline2 (exec.c:1697)
==9709== by 0x427FD2: execpline (exec.c:1484)
==9709== by 0x427756: execlist (exec.c:1267)
==9709== by 0x42717C: execode (exec.c:1073)
==9709== by 0x431299: runshfunc (exec.c:5040)
==9709== by 0x430E76: doshfunc (exec.c:4920)
==9709== by 0x4302FB: execshfunc (exec.c:4557)
==9709== by 0x42D8C1: execcmd (exec.c:3373)
==9709==
==9709==
==9709== 2 errors in context 2 of 2:
==9709== Conditional jump or move depends on uninitialised value(s)
==9709== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9709== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9709== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9709== by 0x40EFC2: execbuiltin (builtin.c:450)
==9709== by 0x42D8E9: execcmd (exec.c:3378)
==9709== by 0x428CA0: execpline2 (exec.c:1697)
==9709== by 0x427FD2: execpline (exec.c:1484)
==9709== by 0x42779A: execlist (exec.c:1275)
==9709== by 0x42717C: execode (exec.c:1073)
==9709== by 0x431299: runshfunc (exec.c:5040)
==9709== by 0x430E76: doshfunc (exec.c:4920)
==9709== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9709==
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9712-by-pythonnut-on-???
==9712== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9712-by-pythonnut-on-???
==9712== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9712-by-pythonnut-on-???
==9712==
==9712== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9712== don't want to do, unless you know exactly what you're doing,
==9712== or are doing some strange experiment):
==9712== /usr/lib/valgrind/../../bin/vgdb --pid=9712 ...command...
==9712==
==9712== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9712== /path/to/gdb ./zsh
==9712== and then give GDB the following command
==9712== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9712
==9712== --pid is optional if only one valgrind process is running
==9712==
--9712-- Caught __NR_exit; running __libc_freeres()
--9712-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9712==
==9712== HEAP SUMMARY:
==9712== in use at exit: 3,122,685 bytes in 68,988 blocks
==9712== total heap usage: 1,463,737 allocs, 1,394,749 frees, 117,986,387 bytes allocated
==9712==
==9712== Searching for pointers to 68,988 not-freed blocks
--9712-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9712-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9712-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9712-- Scanning root segment: 0x4037000..0x403afff (16384)
--9712-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9712-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9712-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9712-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9712-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9712-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9712-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9712-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9712-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9712-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9712-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9712-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9712-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9712-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9712-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9712-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9712-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9712-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9712-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9712-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9712-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9712-- Scanning root segment: 0x701a000..0x701afff (4096)
--9712-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9712-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9712-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9712-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9712-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9712-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9712-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9712-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9712-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9712== Checked 4,783,736 bytes
==9712==
==9712== LEAK SUMMARY:
==9712== definitely lost: 2,181 bytes in 11 blocks
==9712== indirectly lost: 6,756 bytes in 7 blocks
==9712== possibly lost: 0 bytes in 0 blocks
==9712== still reachable: 3,113,748 bytes in 68,970 blocks
==9712== suppressed: 0 bytes in 0 blocks
==9712== Rerun with --leak-check=full to see details of leaked memory
==9712==
==9712== Use --track-origins=yes to see where uninitialised values come from
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712==
==9712== 1 errors in context 1 of 2:
==9712== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9712== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9712== by 0x488CD0: stringsubst (subst.c:301)
==9712== by 0x48801B: prefork (subst.c:77)
==9712== by 0x42B318: execcmd (exec.c:2619)
==9712== by 0x428CA0: execpline2 (exec.c:1697)
==9712== by 0x427FD2: execpline (exec.c:1484)
==9712== by 0x427756: execlist (exec.c:1267)
==9712== by 0x42717C: execode (exec.c:1073)
==9712== by 0x431299: runshfunc (exec.c:5040)
==9712== by 0x430E76: doshfunc (exec.c:4920)
==9712== by 0x4302FB: execshfunc (exec.c:4557)
==9712== by 0x42D8C1: execcmd (exec.c:3373)
==9712==
==9712==
==9712== 2 errors in context 2 of 2:
==9712== Conditional jump or move depends on uninitialised value(s)
==9712== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9712== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9712== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9712== by 0x40EFC2: execbuiltin (builtin.c:450)
==9712== by 0x42D8E9: execcmd (exec.c:3378)
==9712== by 0x428CA0: execpline2 (exec.c:1697)
==9712== by 0x427FD2: execpline (exec.c:1484)
==9712== by 0x42779A: execlist (exec.c:1275)
==9712== by 0x42717C: execode (exec.c:1073)
==9712== by 0x431299: runshfunc (exec.c:5040)
==9712== by 0x430E76: doshfunc (exec.c:4920)
==9712== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9712==
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9713-by-pythonnut-on-???
==9713== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9713-by-pythonnut-on-???
==9713== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9713-by-pythonnut-on-???
==9713==
==9713== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9713== don't want to do, unless you know exactly what you're doing,
==9713== or are doing some strange experiment):
==9713== /usr/lib/valgrind/../../bin/vgdb --pid=9713 ...command...
==9713==
==9713== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9713== /path/to/gdb ./zsh
==9713== and then give GDB the following command
==9713== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9713
==9713== --pid is optional if only one valgrind process is running
==9713==
--9713-- Caught __NR_exit; running __libc_freeres()
--9713-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9713==
==9713== HEAP SUMMARY:
==9713== in use at exit: 3,122,685 bytes in 68,988 blocks
==9713== total heap usage: 1,463,742 allocs, 1,394,754 frees, 117,988,496 bytes allocated
==9713==
==9713== Searching for pointers to 68,988 not-freed blocks
--9713-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9713-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9713-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9713-- Scanning root segment: 0x4037000..0x403afff (16384)
--9713-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9713-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9713-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9713-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9713-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9713-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9713-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9713-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9713-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9713-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9713-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9713-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9713-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9713-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9713-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9713-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9713-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9713-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9713-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9713-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9713-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9713-- Scanning root segment: 0x701a000..0x701afff (4096)
--9713-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9713-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9713-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9713-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9713-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9713-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9713-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9713-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9713-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9713== Checked 4,783,736 bytes
==9713==
==9713== LEAK SUMMARY:
==9713== definitely lost: 2,181 bytes in 11 blocks
==9713== indirectly lost: 6,756 bytes in 7 blocks
==9713== possibly lost: 0 bytes in 0 blocks
==9713== still reachable: 3,113,748 bytes in 68,970 blocks
==9713== suppressed: 0 bytes in 0 blocks
==9713== Rerun with --leak-check=full to see details of leaked memory
==9713==
==9713== Use --track-origins=yes to see where uninitialised values come from
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713==
==9713== 1 errors in context 1 of 2:
==9713== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9713== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9713== by 0x488CD0: stringsubst (subst.c:301)
==9713== by 0x48801B: prefork (subst.c:77)
==9713== by 0x42B318: execcmd (exec.c:2619)
==9713== by 0x428CA0: execpline2 (exec.c:1697)
==9713== by 0x427FD2: execpline (exec.c:1484)
==9713== by 0x427756: execlist (exec.c:1267)
==9713== by 0x42717C: execode (exec.c:1073)
==9713== by 0x431299: runshfunc (exec.c:5040)
==9713== by 0x430E76: doshfunc (exec.c:4920)
==9713== by 0x4302FB: execshfunc (exec.c:4557)
==9713== by 0x42D8C1: execcmd (exec.c:3373)
==9713==
==9713==
==9713== 2 errors in context 2 of 2:
==9713== Conditional jump or move depends on uninitialised value(s)
==9713== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9713== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9713== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9713== by 0x40EFC2: execbuiltin (builtin.c:450)
==9713== by 0x42D8E9: execcmd (exec.c:3378)
==9713== by 0x428CA0: execpline2 (exec.c:1697)
==9713== by 0x427FD2: execpline (exec.c:1484)
==9713== by 0x42779A: execlist (exec.c:1275)
==9713== by 0x42717C: execode (exec.c:1073)
==9713== by 0x431299: runshfunc (exec.c:5040)
==9713== by 0x430E76: doshfunc (exec.c:4920)
==9713== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9713==
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9714-by-pythonnut-on-???
==9714== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9714-by-pythonnut-on-???
==9714== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9714-by-pythonnut-on-???
==9714==
==9714== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9714== don't want to do, unless you know exactly what you're doing,
==9714== or are doing some strange experiment):
==9714== /usr/lib/valgrind/../../bin/vgdb --pid=9714 ...command...
==9714==
==9714== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9714== /path/to/gdb ./zsh
==9714== and then give GDB the following command
==9714== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9714
==9714== --pid is optional if only one valgrind process is running
==9714==
--9714-- Caught __NR_exit; running __libc_freeres()
--9714-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9714==
==9714== HEAP SUMMARY:
==9714== in use at exit: 3,122,685 bytes in 68,988 blocks
==9714== total heap usage: 1,463,747 allocs, 1,394,759 frees, 117,990,613 bytes allocated
==9714==
==9714== Searching for pointers to 68,988 not-freed blocks
--9714-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9714-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9714-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9714-- Scanning root segment: 0x4037000..0x403afff (16384)
--9714-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9714-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9714-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9714-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9714-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9714-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9714-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9714-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9714-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9714-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9714-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9714-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9714-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9714-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9714-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9714-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9714-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9714-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9714-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9714-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9714-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9714-- Scanning root segment: 0x701a000..0x701afff (4096)
--9714-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9714-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9714-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9714-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9714-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9714-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9714-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9714-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9714-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9714== Checked 4,783,736 bytes
==9714==
==9714== LEAK SUMMARY:
==9714== definitely lost: 2,181 bytes in 11 blocks
==9714== indirectly lost: 6,756 bytes in 7 blocks
==9714== possibly lost: 0 bytes in 0 blocks
==9714== still reachable: 3,113,748 bytes in 68,970 blocks
==9714== suppressed: 0 bytes in 0 blocks
==9714== Rerun with --leak-check=full to see details of leaked memory
==9714==
==9714== Use --track-origins=yes to see where uninitialised values come from
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714==
==9714== 1 errors in context 1 of 2:
==9714== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9714== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9714== by 0x488CD0: stringsubst (subst.c:301)
==9714== by 0x48801B: prefork (subst.c:77)
==9714== by 0x42B318: execcmd (exec.c:2619)
==9714== by 0x428CA0: execpline2 (exec.c:1697)
==9714== by 0x427FD2: execpline (exec.c:1484)
==9714== by 0x427756: execlist (exec.c:1267)
==9714== by 0x42717C: execode (exec.c:1073)
==9714== by 0x431299: runshfunc (exec.c:5040)
==9714== by 0x430E76: doshfunc (exec.c:4920)
==9714== by 0x4302FB: execshfunc (exec.c:4557)
==9714== by 0x42D8C1: execcmd (exec.c:3373)
==9714==
==9714==
==9714== 2 errors in context 2 of 2:
==9714== Conditional jump or move depends on uninitialised value(s)
==9714== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9714== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9714== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9714== by 0x40EFC2: execbuiltin (builtin.c:450)
==9714== by 0x42D8E9: execcmd (exec.c:3378)
==9714== by 0x428CA0: execpline2 (exec.c:1697)
==9714== by 0x427FD2: execpline (exec.c:1484)
==9714== by 0x42779A: execlist (exec.c:1275)
==9714== by 0x42717C: execode (exec.c:1073)
==9714== by 0x431299: runshfunc (exec.c:5040)
==9714== by 0x430E76: doshfunc (exec.c:4920)
==9714== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9714==
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9716-- Caught __NR_exit; running __libc_freeres()
==9717== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9717-by-pythonnut-on-???
==9717== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9717-by-pythonnut-on-???
==9717== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9717-by-pythonnut-on-???
==9717==
==9717== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9717== don't want to do, unless you know exactly what you're doing,
==9717== or are doing some strange experiment):
==9717== /usr/lib/valgrind/../../bin/vgdb --pid=9717 ...command...
==9717==
==9717== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9717== /path/to/gdb ./zsh
==9717== and then give GDB the following command
==9717== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9717
==9717== --pid is optional if only one valgrind process is running
==9717==
==9716== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9716-by-pythonnut-on-???
==9716== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9716-by-pythonnut-on-???
==9716== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9716-by-pythonnut-on-???
==9716==
==9716== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9716== don't want to do, unless you know exactly what you're doing,
==9716== or are doing some strange experiment):
==9716== /usr/lib/valgrind/../../bin/vgdb --pid=9716 ...command...
==9716==
==9716== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9716== /path/to/gdb ./zsh
==9716== and then give GDB the following command
==9716== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9716
==9716== --pid is optional if only one valgrind process is running
==9716==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--9716-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9716==
==9716== HEAP SUMMARY:
==9716== in use at exit: 3,122,841 bytes in 68,993 blocks
==9716== total heap usage: 1,463,751 allocs, 1,394,758 frees, 117,994,035 bytes allocated
==9716==
==9716== Searching for pointers to 68,993 not-freed blocks
--9716-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9716-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9716-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9716-- Scanning root segment: 0x4037000..0x403afff (16384)
--9716-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9716-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9716-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9716-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9716-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9716-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9716-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9716-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9716-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9716-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9716-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9716-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9716-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9716-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9716-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9716-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9716-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9716-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9716-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9716-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9716-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9716-- Scanning root segment: 0x701a000..0x701afff (4096)
--9716-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9716-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9716-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9716-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9716-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9716-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9716-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9716-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9716-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9716== Checked 4,784,512 bytes
==9716==
==9716== LEAK SUMMARY:
==9716== definitely lost: 2,181 bytes in 11 blocks
==9716== indirectly lost: 6,756 bytes in 7 blocks
==9716== possibly lost: 0 bytes in 0 blocks
==9716== still reachable: 3,113,904 bytes in 68,975 blocks
==9716== suppressed: 0 bytes in 0 blocks
==9716== Rerun with --leak-check=full to see details of leaked memory
==9716==
==9716== Use --track-origins=yes to see where uninitialised values come from
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9716==
==9716== 1 errors in context 1 of 2:
==9716== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9716== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9716== by 0x488CD0: stringsubst (subst.c:301)
==9716== by 0x48801B: prefork (subst.c:77)
==9716== by 0x42B318: execcmd (exec.c:2619)
==9716== by 0x428CA0: execpline2 (exec.c:1697)
==9716== by 0x427FD2: execpline (exec.c:1484)
==9716== by 0x427756: execlist (exec.c:1267)
==9716== by 0x42717C: execode (exec.c:1073)
==9716== by 0x431299: runshfunc (exec.c:5040)
==9716== by 0x430E76: doshfunc (exec.c:4920)
==9716== by 0x4302FB: execshfunc (exec.c:4557)
==9716== by 0x42D8C1: execcmd (exec.c:3373)
==9716==
==9716==
==9716== 2 errors in context 2 of 2:
==9716== Conditional jump or move depends on uninitialised value(s)
==9716== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9716== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9716== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9716== by 0x40EFC2: execbuiltin (builtin.c:450)
==9716== by 0x42D8E9: execcmd (exec.c:3378)
==9716== by 0x428CA0: execpline2 (exec.c:1697)
==9716== by 0x427FD2: execpline (exec.c:1484)
==9716== by 0x42779A: execlist (exec.c:1275)
==9716== by 0x42717C: execode (exec.c:1073)
==9716== by 0x431299: runshfunc (exec.c:5040)
==9716== by 0x430E76: doshfunc (exec.c:4920)
==9716== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9716==
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9715-by-pythonnut-on-???
==9715== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9715-by-pythonnut-on-???
==9715== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9715-by-pythonnut-on-???
==9715==
==9715== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9715== don't want to do, unless you know exactly what you're doing,
==9715== or are doing some strange experiment):
==9715== /usr/lib/valgrind/../../bin/vgdb --pid=9715 ...command...
==9715==
==9715== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9715== /path/to/gdb ./zsh
==9715== and then give GDB the following command
==9715== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9715
==9715== --pid is optional if only one valgrind process is running
==9715==
--9715-- Caught __NR_exit; running __libc_freeres()
--9715-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9715==
==9715== HEAP SUMMARY:
==9715== in use at exit: 3,122,777 bytes in 68,990 blocks
==9715== total heap usage: 1,463,753 allocs, 1,394,763 frees, 117,994,579 bytes allocated
==9715==
==9715== Searching for pointers to 68,990 not-freed blocks
--9715-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9715-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9715-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9715-- Scanning root segment: 0x4037000..0x403afff (16384)
--9715-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9715-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9715-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9715-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9715-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9715-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9715-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9715-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9715-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9715-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9715-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9715-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9715-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9715-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9715-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9715-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9715-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9715-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9715-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9715-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9715-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9715-- Scanning root segment: 0x701a000..0x701afff (4096)
--9715-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9715-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9715-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9715-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9715-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9715-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9715-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9715-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9715-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9715== Checked 4,783,824 bytes
==9715==
==9715== LEAK SUMMARY:
==9715== definitely lost: 2,181 bytes in 11 blocks
==9715== indirectly lost: 6,756 bytes in 7 blocks
==9715== possibly lost: 0 bytes in 0 blocks
==9715== still reachable: 3,113,840 bytes in 68,972 blocks
==9715== suppressed: 0 bytes in 0 blocks
==9715== Rerun with --leak-check=full to see details of leaked memory
==9715==
==9715== Use --track-origins=yes to see where uninitialised values come from
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715==
==9715== 1 errors in context 1 of 2:
==9715== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9715== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9715== by 0x488CD0: stringsubst (subst.c:301)
==9715== by 0x48801B: prefork (subst.c:77)
==9715== by 0x42B318: execcmd (exec.c:2619)
==9715== by 0x428CA0: execpline2 (exec.c:1697)
==9715== by 0x427FD2: execpline (exec.c:1484)
==9715== by 0x427756: execlist (exec.c:1267)
==9715== by 0x42717C: execode (exec.c:1073)
==9715== by 0x431299: runshfunc (exec.c:5040)
==9715== by 0x430E76: doshfunc (exec.c:4920)
==9715== by 0x4302FB: execshfunc (exec.c:4557)
==9715== by 0x42D8C1: execcmd (exec.c:3373)
==9715==
==9715==
==9715== 2 errors in context 2 of 2:
==9715== Conditional jump or move depends on uninitialised value(s)
==9715== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9715== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9715== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9715== by 0x40EFC2: execbuiltin (builtin.c:450)
==9715== by 0x42D8E9: execcmd (exec.c:3378)
==9715== by 0x428CA0: execpline2 (exec.c:1697)
==9715== by 0x427FD2: execpline (exec.c:1484)
==9715== by 0x42779A: execlist (exec.c:1275)
==9715== by 0x42717C: execode (exec.c:1073)
==9715== by 0x431299: runshfunc (exec.c:5040)
==9715== by 0x430E76: doshfunc (exec.c:4920)
==9715== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9715==
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9651-- Caught __NR_exit; running __libc_freeres()
--9651-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9651==
==9651== HEAP SUMMARY:
==9651== in use at exit: 3,120,309 bytes in 68,923 blocks
==9651== total heap usage: 1,463,752 allocs, 1,394,829 frees, 117,996,163 bytes allocated
==9651==
==9651== Searching for pointers to 68,923 not-freed blocks
--9651-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9651-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9651-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9651-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9651-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9651-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9651-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9651-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9651-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9651-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9651-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9651-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9651-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9651-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9651-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9651-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9651-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9651-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9651-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9651-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9651-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9651-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9651-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9651-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9651-- Scanning root segment: 0x701a000..0x701afff (4096)
--9651-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9651-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9651-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9651-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9651-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9651-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9651-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9651-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9651-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9651== Checked 4,761,952 bytes
==9651==
==9651== LEAK SUMMARY:
==9651== definitely lost: 2,181 bytes in 11 blocks
==9651== indirectly lost: 6,756 bytes in 7 blocks
==9651== possibly lost: 0 bytes in 0 blocks
==9651== still reachable: 3,111,372 bytes in 68,905 blocks
==9651== suppressed: 0 bytes in 0 blocks
==9651== Rerun with --leak-check=full to see details of leaked memory
==9651==
==9651== Use --track-origins=yes to see where uninitialised values come from
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9651==
==9651== 1 errors in context 1 of 2:
==9651== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9651== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9651== by 0x488CD0: stringsubst (subst.c:301)
==9651== by 0x48801B: prefork (subst.c:77)
==9651== by 0x42B318: execcmd (exec.c:2619)
==9651== by 0x428CA0: execpline2 (exec.c:1697)
==9651== by 0x427FD2: execpline (exec.c:1484)
==9651== by 0x427756: execlist (exec.c:1267)
==9651== by 0x42717C: execode (exec.c:1073)
==9651== by 0x431299: runshfunc (exec.c:5040)
==9651== by 0x430E76: doshfunc (exec.c:4920)
==9651== by 0x4302FB: execshfunc (exec.c:4557)
==9651== by 0x42D8C1: execcmd (exec.c:3373)
==9651==
==9651==
==9651== 2 errors in context 2 of 2:
==9651== Conditional jump or move depends on uninitialised value(s)
==9651== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9651== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9651== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9651== by 0x40EFC2: execbuiltin (builtin.c:450)
==9651== by 0x42D8E9: execcmd (exec.c:3378)
==9651== by 0x428CA0: execpline2 (exec.c:1697)
==9651== by 0x427FD2: execpline (exec.c:1484)
==9651== by 0x42779A: execlist (exec.c:1275)
==9651== by 0x42717C: execode (exec.c:1073)
==9651== by 0x431299: runshfunc (exec.c:5040)
==9651== by 0x430E76: doshfunc (exec.c:4920)
==9651== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9651==
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9720-by-pythonnut-on-???
==9720== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9720-by-pythonnut-on-???
==9720== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9720-by-pythonnut-on-???
==9720==
==9720== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9720== don't want to do, unless you know exactly what you're doing,
==9720== or are doing some strange experiment):
==9720== /usr/lib/valgrind/../../bin/vgdb --pid=9720 ...command...
==9720==
==9720== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9720== /path/to/gdb ./zsh
==9720== and then give GDB the following command
==9720== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9720
==9720== --pid is optional if only one valgrind process is running
==9720==
==9722== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9722-by-pythonnut-on-???
==9722== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9722-by-pythonnut-on-???
==9722== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9722-by-pythonnut-on-???
==9722==
==9722== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9722== don't want to do, unless you know exactly what you're doing,
==9722== or are doing some strange experiment):
==9722== /usr/lib/valgrind/../../bin/vgdb --pid=9722 ...command...
==9722==
==9722== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9722== /path/to/gdb ./zsh
==9722== and then give GDB the following command
==9722== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9722
==9722== --pid is optional if only one valgrind process is running
==9722==
client request: code 4d430005, addr 0xFFEFF263C, len 4
==9721== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9721-by-pythonnut-on-???
==9721== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9721-by-pythonnut-on-???
==9721== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9721-by-pythonnut-on-???
==9721==
==9721== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9721== don't want to do, unless you know exactly what you're doing,
==9721== or are doing some strange experiment):
==9721== /usr/lib/valgrind/../../bin/vgdb --pid=9721 ...command...
==9721==
==9721== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9721== /path/to/gdb ./zsh
==9721== and then give GDB the following command
==9721== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9721
==9721== --pid is optional if only one valgrind process is running
==9721==
--9721-- Caught __NR_exit; running __libc_freeres()
--9721-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9721==
==9721== HEAP SUMMARY:
==9721== in use at exit: 3,120,813 bytes in 68,935 blocks
==9721== total heap usage: 1,463,596 allocs, 1,394,661 frees, 117,953,095 bytes allocated
==9721==
==9721== Searching for pointers to 68,935 not-freed blocks
--9721-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9721-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9721-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9721-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9721-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9721-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9721-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9721-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9721-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9721-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9721-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9721-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9721-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9721-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9721-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9721-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9721-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9721-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9721-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9721-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9721-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9721-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9721-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9721-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9721-- Scanning root segment: 0x701a000..0x701afff (4096)
--9721-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9721-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9721-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9721-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9721-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9721-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9721-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9721-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9721-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9721== Checked 4,764,504 bytes
==9721==
==9721== LEAK SUMMARY:
==9721== definitely lost: 2,181 bytes in 11 blocks
==9721== indirectly lost: 6,756 bytes in 7 blocks
==9721== possibly lost: 0 bytes in 0 blocks
==9721== still reachable: 3,111,876 bytes in 68,917 blocks
==9721== suppressed: 0 bytes in 0 blocks
==9721== Rerun with --leak-check=full to see details of leaked memory
==9721==
==9721== Use --track-origins=yes to see where uninitialised values come from
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9721==
==9721== 1 errors in context 1 of 2:
==9721== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9721== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9721== by 0x488CD0: stringsubst (subst.c:301)
==9721== by 0x48801B: prefork (subst.c:77)
==9721== by 0x42B318: execcmd (exec.c:2619)
==9721== by 0x428CA0: execpline2 (exec.c:1697)
==9721== by 0x427FD2: execpline (exec.c:1484)
==9721== by 0x427756: execlist (exec.c:1267)
==9721== by 0x42717C: execode (exec.c:1073)
==9721== by 0x431299: runshfunc (exec.c:5040)
==9721== by 0x430E76: doshfunc (exec.c:4920)
==9721== by 0x4302FB: execshfunc (exec.c:4557)
==9721== by 0x42D8C1: execcmd (exec.c:3373)
==9721==
==9721==
==9721== 2 errors in context 2 of 2:
==9721== Conditional jump or move depends on uninitialised value(s)
==9721== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9721== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9721== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9721== by 0x40EFC2: execbuiltin (builtin.c:450)
==9721== by 0x42D8E9: execcmd (exec.c:3378)
==9721== by 0x428CA0: execpline2 (exec.c:1697)
==9721== by 0x427FD2: execpline (exec.c:1484)
==9721== by 0x42779A: execlist (exec.c:1275)
==9721== by 0x42717C: execode (exec.c:1073)
==9721== by 0x431299: runshfunc (exec.c:5040)
==9721== by 0x430E76: doshfunc (exec.c:4920)
==9721== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9721==
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9723-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9723== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9723-by-pythonnut-on-???
==9723== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9723-by-pythonnut-on-???
==9723== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9723-by-pythonnut-on-???
==9723==
==9723== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9723== don't want to do, unless you know exactly what you're doing,
==9723== or are doing some strange experiment):
==9723== /usr/lib/valgrind/../../bin/vgdb --pid=9723 ...command...
==9723==
==9723== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9723== /path/to/gdb ./zsh
==9723== and then give GDB the following command
==9723== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9723
==9723== --pid is optional if only one valgrind process is running
==9723==
client request: code 4d430005, addr 0xFFEFFB37C, len 4
client request: code 4d430005, addr 0xFFEFF836C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFFA04C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF907C, len 4
client request: code 4d430005, addr 0xFFEFF895C, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
client request: code 4d430005, addr 0xFFEFEEBFC, len 4
client request: code 4d430005, addr 0xFFEFF9AEC, len 4
==9725== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9725-by-pythonnut-on-???
==9725== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9725-by-pythonnut-on-???
==9725== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9725-by-pythonnut-on-???
==9725==
==9725== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9725== don't want to do, unless you know exactly what you're doing,
==9725== or are doing some strange experiment):
==9725== /usr/lib/valgrind/../../bin/vgdb --pid=9725 ...command...
==9725==
==9725== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9725== /path/to/gdb ./zsh
==9725== and then give GDB the following command
==9725== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9725
==9725== --pid is optional if only one valgrind process is running
==9725==
client request: code 4d430005, addr 0xFFEFF562C, len 4
client request: code 4d430005, addr 0xFFEFF562C, len 4
==9726== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9726-by-pythonnut-on-???
==9726== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9726-by-pythonnut-on-???
==9726== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9726-by-pythonnut-on-???
==9726==
==9726== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9726== don't want to do, unless you know exactly what you're doing,
==9726== or are doing some strange experiment):
==9726== /usr/lib/valgrind/../../bin/vgdb --pid=9726 ...command...
==9726==
==9726== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9726== /path/to/gdb ./zsh
==9726== and then give GDB the following command
==9726== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9726
==9726== --pid is optional if only one valgrind process is running
==9726==
--9726-- Caught __NR_exit; running __libc_freeres()
--9726-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9726==
==9726== HEAP SUMMARY:
==9726== in use at exit: 3,152,460 bytes in 69,433 blocks
==9726== total heap usage: 1,467,367 allocs, 1,397,934 frees, 119,723,070 bytes allocated
==9726==
==9726== Searching for pointers to 69,433 not-freed blocks
--9726-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9726-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9726-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9726-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9726-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9726-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9726-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9726-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9726-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9726-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9726-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9726-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9726-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9726-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9726-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9726-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9726-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9726-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9726-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9726-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9726-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9726-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9726-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9726-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9726-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9726-- Scanning root segment: 0x701a000..0x701afff (4096)
--9726-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9726-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9726-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9726-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9726-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9726-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9726-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9726-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9726-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9726== Checked 4,852,528 bytes
==9726==
==9726== LEAK SUMMARY:
==9726== definitely lost: 2,181 bytes in 11 blocks
==9726== indirectly lost: 6,756 bytes in 7 blocks
==9726== possibly lost: 0 bytes in 0 blocks
==9726== still reachable: 3,143,523 bytes in 69,415 blocks
==9726== suppressed: 0 bytes in 0 blocks
==9726== Rerun with --leak-check=full to see details of leaked memory
==9726==
==9726== Use --track-origins=yes to see where uninitialised values come from
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9726==
==9726== 1 errors in context 1 of 2:
==9726== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9726== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9726== by 0x488CD0: stringsubst (subst.c:301)
==9726== by 0x48801B: prefork (subst.c:77)
==9726== by 0x42B318: execcmd (exec.c:2619)
==9726== by 0x428CA0: execpline2 (exec.c:1697)
==9726== by 0x427FD2: execpline (exec.c:1484)
==9726== by 0x427756: execlist (exec.c:1267)
==9726== by 0x42717C: execode (exec.c:1073)
==9726== by 0x431299: runshfunc (exec.c:5040)
==9726== by 0x430E76: doshfunc (exec.c:4920)
==9726== by 0x4302FB: execshfunc (exec.c:4557)
==9726== by 0x42D8C1: execcmd (exec.c:3373)
==9726==
==9726==
==9726== 2 errors in context 2 of 2:
==9726== Conditional jump or move depends on uninitialised value(s)
==9726== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9726== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9726== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9726== by 0x40EFC2: execbuiltin (builtin.c:450)
==9726== by 0x42D8E9: execcmd (exec.c:3378)
==9726== by 0x428CA0: execpline2 (exec.c:1697)
==9726== by 0x427FD2: execpline (exec.c:1484)
==9726== by 0x42779A: execlist (exec.c:1275)
==9726== by 0x42717C: execode (exec.c:1073)
==9726== by 0x431299: runshfunc (exec.c:5040)
==9726== by 0x430E76: doshfunc (exec.c:4920)
==9726== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9726==
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9725-- Caught __NR_exit; running __libc_freeres()
--9725-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9725==
==9725== HEAP SUMMARY:
==9725== in use at exit: 3,150,178 bytes in 69,353 blocks
==9725== total heap usage: 1,467,272 allocs, 1,397,919 frees, 119,491,131 bytes allocated
==9725==
==9725== Searching for pointers to 69,353 not-freed blocks
--9725-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9725-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9725-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9725-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9725-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9725-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9725-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9725-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9725-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9725-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9725-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9725-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9725-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9725-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9725-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9725-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9725-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9725-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9725-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9725-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9725-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9725-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9725-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9725-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9725-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9725-- Scanning root segment: 0x701a000..0x701afff (4096)
--9725-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9725-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9725-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9725-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9725-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9725-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9725-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9725-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9725-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9725== Checked 4,848,552 bytes
==9725==
==9725== LEAK SUMMARY:
==9725== definitely lost: 2,181 bytes in 11 blocks
==9725== indirectly lost: 6,756 bytes in 7 blocks
==9725== possibly lost: 0 bytes in 0 blocks
==9725== still reachable: 3,141,241 bytes in 69,335 blocks
==9725== suppressed: 0 bytes in 0 blocks
==9725== Rerun with --leak-check=full to see details of leaked memory
==9725==
==9725== Use --track-origins=yes to see where uninitialised values come from
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9725==
==9725== 1 errors in context 1 of 2:
==9725== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9725== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9725== by 0x488CD0: stringsubst (subst.c:301)
==9725== by 0x48801B: prefork (subst.c:77)
==9725== by 0x42B318: execcmd (exec.c:2619)
==9725== by 0x428CA0: execpline2 (exec.c:1697)
==9725== by 0x427FD2: execpline (exec.c:1484)
==9725== by 0x427756: execlist (exec.c:1267)
==9725== by 0x42717C: execode (exec.c:1073)
==9725== by 0x431299: runshfunc (exec.c:5040)
==9725== by 0x430E76: doshfunc (exec.c:4920)
==9725== by 0x4302FB: execshfunc (exec.c:4557)
==9725== by 0x42D8C1: execcmd (exec.c:3373)
==9725==
==9725==
==9725== 2 errors in context 2 of 2:
==9725== Conditional jump or move depends on uninitialised value(s)
==9725== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9725== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9725== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9725== by 0x40EFC2: execbuiltin (builtin.c:450)
==9725== by 0x42D8E9: execcmd (exec.c:3378)
==9725== by 0x428CA0: execpline2 (exec.c:1697)
==9725== by 0x427FD2: execpline (exec.c:1484)
==9725== by 0x42779A: execlist (exec.c:1275)
==9725== by 0x42717C: execode (exec.c:1073)
==9725== by 0x431299: runshfunc (exec.c:5040)
==9725== by 0x430E76: doshfunc (exec.c:4920)
==9725== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9725==
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9727-by-pythonnut-on-???
==9727== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9727-by-pythonnut-on-???
==9727== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9727-by-pythonnut-on-???
==9727==
==9727== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9727== don't want to do, unless you know exactly what you're doing,
==9727== or are doing some strange experiment):
==9727== /usr/lib/valgrind/../../bin/vgdb --pid=9727 ...command...
==9727==
==9727== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9727== /path/to/gdb ./zsh
==9727== and then give GDB the following command
==9727== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9727
==9727== --pid is optional if only one valgrind process is running
==9727==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==9728== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9728-by-pythonnut-on-???
==9728== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9728-by-pythonnut-on-???
==9728== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9728-by-pythonnut-on-???
==9728==
==9728== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9728== don't want to do, unless you know exactly what you're doing,
==9728== or are doing some strange experiment):
==9728== /usr/lib/valgrind/../../bin/vgdb --pid=9728 ...command...
==9728==
==9728== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9728== /path/to/gdb ./zsh
==9728== and then give GDB the following command
==9728== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9728
==9728== --pid is optional if only one valgrind process is running
==9728==
--9728-- Caught __NR_exit; running __libc_freeres()
--9728-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9728==
==9728== HEAP SUMMARY:
==9728== in use at exit: 3,152,707 bytes in 69,441 blocks
==9728== total heap usage: 1,467,384 allocs, 1,397,943 frees, 119,693,241 bytes allocated
==9728==
==9728== Searching for pointers to 69,441 not-freed blocks
--9728-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9728-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9728-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9728-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9728-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9728-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9728-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9728-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9728-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9728-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9728-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9728-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9728-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9728-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9728-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9728-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9728-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9728-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9728-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9728-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9728-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9728-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9728-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9728-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9728-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9728-- Scanning root segment: 0x701a000..0x701afff (4096)
--9728-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9728-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9728-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9728-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9728-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9728-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9728-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9728-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9728-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9728== Checked 4,853,256 bytes
==9728==
==9728== LEAK SUMMARY:
==9728== definitely lost: 2,181 bytes in 11 blocks
==9728== indirectly lost: 6,756 bytes in 7 blocks
==9728== possibly lost: 0 bytes in 0 blocks
==9728== still reachable: 3,143,770 bytes in 69,423 blocks
==9728== suppressed: 0 bytes in 0 blocks
==9728== Rerun with --leak-check=full to see details of leaked memory
==9728==
==9728== Use --track-origins=yes to see where uninitialised values come from
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9728==
==9728== 1 errors in context 1 of 2:
==9728== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9728== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9728== by 0x488CD0: stringsubst (subst.c:301)
==9728== by 0x48801B: prefork (subst.c:77)
==9728== by 0x42B318: execcmd (exec.c:2619)
==9728== by 0x428CA0: execpline2 (exec.c:1697)
==9728== by 0x427FD2: execpline (exec.c:1484)
==9728== by 0x427756: execlist (exec.c:1267)
==9728== by 0x42717C: execode (exec.c:1073)
==9728== by 0x431299: runshfunc (exec.c:5040)
==9728== by 0x430E76: doshfunc (exec.c:4920)
==9728== by 0x4302FB: execshfunc (exec.c:4557)
==9728== by 0x42D8C1: execcmd (exec.c:3373)
==9728==
==9728==
==9728== 2 errors in context 2 of 2:
==9728== Conditional jump or move depends on uninitialised value(s)
==9728== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9728== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9728== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9728== by 0x40EFC2: execbuiltin (builtin.c:450)
==9728== by 0x42D8E9: execcmd (exec.c:3378)
==9728== by 0x428CA0: execpline2 (exec.c:1697)
==9728== by 0x427FD2: execpline (exec.c:1484)
==9728== by 0x42779A: execlist (exec.c:1275)
==9728== by 0x42717C: execode (exec.c:1073)
==9728== by 0x431299: runshfunc (exec.c:5040)
==9728== by 0x430E76: doshfunc (exec.c:4920)
==9728== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9728==
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9727-- Caught __NR_exit; running __libc_freeres()
--9727-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9727==
==9727== HEAP SUMMARY:
==9727== in use at exit: 3,150,451 bytes in 69,361 blocks
==9727== total heap usage: 1,467,287 allocs, 1,397,926 frees, 119,494,044 bytes allocated
==9727==
==9727== Searching for pointers to 69,361 not-freed blocks
--9727-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9727-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9727-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9727-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9727-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9727-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9727-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9727-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9727-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9727-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9727-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9727-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9727-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9727-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9727-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9727-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9727-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9727-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9727-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9727-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9727-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9727-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9727-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9727-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9727-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9727-- Scanning root segment: 0x701a000..0x701afff (4096)
--9727-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9727-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9727-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9727-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9727-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9727-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9727-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9727-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9727-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9727== Checked 4,849,312 bytes
==9727==
==9727== LEAK SUMMARY:
==9727== definitely lost: 2,181 bytes in 11 blocks
==9727== indirectly lost: 6,756 bytes in 7 blocks
==9727== possibly lost: 0 bytes in 0 blocks
==9727== still reachable: 3,141,514 bytes in 69,343 blocks
==9727== suppressed: 0 bytes in 0 blocks
==9727== Rerun with --leak-check=full to see details of leaked memory
==9727==
==9727== Use --track-origins=yes to see where uninitialised values come from
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727==
==9727== 1 errors in context 1 of 2:
==9727== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9727== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9727== by 0x488CD0: stringsubst (subst.c:301)
==9727== by 0x48801B: prefork (subst.c:77)
==9727== by 0x42B318: execcmd (exec.c:2619)
==9727== by 0x428CA0: execpline2 (exec.c:1697)
==9727== by 0x427FD2: execpline (exec.c:1484)
==9727== by 0x427756: execlist (exec.c:1267)
==9727== by 0x42717C: execode (exec.c:1073)
==9727== by 0x431299: runshfunc (exec.c:5040)
==9727== by 0x430E76: doshfunc (exec.c:4920)
==9727== by 0x4302FB: execshfunc (exec.c:4557)
==9727== by 0x42D8C1: execcmd (exec.c:3373)
==9727==
==9727==
==9727== 2 errors in context 2 of 2:
==9727== Conditional jump or move depends on uninitialised value(s)
==9727== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9727== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9727== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9727== by 0x40EFC2: execbuiltin (builtin.c:450)
==9727== by 0x42D8E9: execcmd (exec.c:3378)
==9727== by 0x428CA0: execpline2 (exec.c:1697)
==9727== by 0x427FD2: execpline (exec.c:1484)
==9727== by 0x42779A: execlist (exec.c:1275)
==9727== by 0x42717C: execode (exec.c:1073)
==9727== by 0x431299: runshfunc (exec.c:5040)
==9727== by 0x430E76: doshfunc (exec.c:4920)
==9727== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9727==
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF975C, len 4
client request: code 4d430005, addr 0xFFEFF975C, len 4
client request: code 4d430005, addr 0xFFEFF975C, len 4
client request: code 4d430005, addr 0xFFEFEE74C, len 4
--9731-- Caught __NR_exit; running __libc_freeres()
==9731== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9731-by-pythonnut-on-???
==9731== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9731-by-pythonnut-on-???
==9731== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9731-by-pythonnut-on-???
==9731==
==9731== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9731== don't want to do, unless you know exactly what you're doing,
==9731== or are doing some strange experiment):
==9731== /usr/lib/valgrind/../../bin/vgdb --pid=9731 ...command...
==9731==
==9731== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9731== /path/to/gdb ./zsh
==9731== and then give GDB the following command
==9731== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9731
==9731== --pid is optional if only one valgrind process is running
==9731==
--9731-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9731==
==9731== HEAP SUMMARY:
==9731== in use at exit: 3,152,278 bytes in 69,352 blocks
==9731== total heap usage: 1,467,400 allocs, 1,398,048 frees, 119,509,507 bytes allocated
==9731==
==9731== Searching for pointers to 69,352 not-freed blocks
--9731-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9731-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9731-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9731-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9731-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9731-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9731-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9731-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9731-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9731-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9731-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9731-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9731-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9731-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9731-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9731-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9731-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9731-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9731-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9731-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9731-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9731-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9731-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9731-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9731-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9731-- Scanning root segment: 0x701a000..0x701afff (4096)
--9731-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9731-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9731-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9731-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9731-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9731-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9731-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9731-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9731-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9731== Checked 4,849,544 bytes
==9731==
==9731== LEAK SUMMARY:
==9731== definitely lost: 2,181 bytes in 11 blocks
==9731== indirectly lost: 6,756 bytes in 7 blocks
==9731== possibly lost: 0 bytes in 0 blocks
==9731== still reachable: 3,143,341 bytes in 69,334 blocks
==9731== suppressed: 0 bytes in 0 blocks
==9731== Rerun with --leak-check=full to see details of leaked memory
==9731==
==9731== Use --track-origins=yes to see where uninitialised values come from
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9731==
==9731== 1 errors in context 1 of 2:
==9731== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9731== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9731== by 0x488CD0: stringsubst (subst.c:301)
==9731== by 0x48801B: prefork (subst.c:77)
==9731== by 0x42B318: execcmd (exec.c:2619)
==9731== by 0x428CA0: execpline2 (exec.c:1697)
==9731== by 0x427FD2: execpline (exec.c:1484)
==9731== by 0x427756: execlist (exec.c:1267)
==9731== by 0x42717C: execode (exec.c:1073)
==9731== by 0x431299: runshfunc (exec.c:5040)
==9731== by 0x430E76: doshfunc (exec.c:4920)
==9731== by 0x4302FB: execshfunc (exec.c:4557)
==9731== by 0x42D8C1: execcmd (exec.c:3373)
==9731==
==9731==
==9731== 2 errors in context 2 of 2:
==9731== Conditional jump or move depends on uninitialised value(s)
==9731== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9731== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9731== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9731== by 0x40EFC2: execbuiltin (builtin.c:450)
==9731== by 0x42D8E9: execcmd (exec.c:3378)
==9731== by 0x428CA0: execpline2 (exec.c:1697)
==9731== by 0x427FD2: execpline (exec.c:1484)
==9731== by 0x42779A: execlist (exec.c:1275)
==9731== by 0x42717C: execode (exec.c:1073)
==9731== by 0x431299: runshfunc (exec.c:5040)
==9731== by 0x430E76: doshfunc (exec.c:4920)
==9731== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9731==
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9733-by-pythonnut-on-???
==9733== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9733-by-pythonnut-on-???
==9733== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9733-by-pythonnut-on-???
==9733==
==9733== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9733== don't want to do, unless you know exactly what you're doing,
==9733== or are doing some strange experiment):
==9733== /usr/lib/valgrind/../../bin/vgdb --pid=9733 ...command...
==9733==
==9733== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9733== /path/to/gdb ./zsh
==9733== and then give GDB the following command
==9733== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9733
==9733== --pid is optional if only one valgrind process is running
==9733==
--9733-- Caught __NR_exit; running __libc_freeres()
--9733-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9733==
==9733== HEAP SUMMARY:
==9733== in use at exit: 3,151,462 bytes in 69,308 blocks
==9733== total heap usage: 1,467,357 allocs, 1,398,049 frees, 119,508,989 bytes allocated
==9733==
==9733== Searching for pointers to 69,308 not-freed blocks
--9733-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9733-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9733-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9733-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9733-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9733-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9733-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9733-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9733-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9733-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9733-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9733-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9733-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9733-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9733-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9733-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9733-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9733-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9733-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9733-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9733-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9733-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9733-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9733-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9733-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9733-- Scanning root segment: 0x701a000..0x701afff (4096)
--9733-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9733-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9733-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9733-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9733-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9733-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9733-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9733-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9733-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9733== Checked 4,848,224 bytes
==9733==
==9733== LEAK SUMMARY:
==9733== definitely lost: 2,181 bytes in 11 blocks
==9733== indirectly lost: 6,756 bytes in 7 blocks
==9733== possibly lost: 0 bytes in 0 blocks
==9733== still reachable: 3,142,525 bytes in 69,290 blocks
==9733== suppressed: 0 bytes in 0 blocks
==9733== Rerun with --leak-check=full to see details of leaked memory
==9733==
==9733== Use --track-origins=yes to see where uninitialised values come from
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733==
==9733== 1 errors in context 1 of 2:
==9733== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9733== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9733== by 0x488CD0: stringsubst (subst.c:301)
==9733== by 0x48801B: prefork (subst.c:77)
==9733== by 0x42B318: execcmd (exec.c:2619)
==9733== by 0x428CA0: execpline2 (exec.c:1697)
==9733== by 0x427FD2: execpline (exec.c:1484)
==9733== by 0x427756: execlist (exec.c:1267)
==9733== by 0x42717C: execode (exec.c:1073)
==9733== by 0x431299: runshfunc (exec.c:5040)
==9733== by 0x430E76: doshfunc (exec.c:4920)
==9733== by 0x4302FB: execshfunc (exec.c:4557)
==9733== by 0x42D8C1: execcmd (exec.c:3373)
==9733==
==9733==
==9733== 2 errors in context 2 of 2:
==9733== Conditional jump or move depends on uninitialised value(s)
==9733== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9733== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9733== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9733== by 0x40EFC2: execbuiltin (builtin.c:450)
==9733== by 0x42D8E9: execcmd (exec.c:3378)
==9733== by 0x428CA0: execpline2 (exec.c:1697)
==9733== by 0x427FD2: execpline (exec.c:1484)
==9733== by 0x42779A: execlist (exec.c:1275)
==9733== by 0x42717C: execode (exec.c:1073)
==9733== by 0x431299: runshfunc (exec.c:5040)
==9733== by 0x430E76: doshfunc (exec.c:4920)
==9733== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9733==
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF2EC, len 4
==9736== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9736-by-pythonnut-on-???
==9736== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9736-by-pythonnut-on-???
==9736== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9736-by-pythonnut-on-???
==9736==
==9736== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9736== don't want to do, unless you know exactly what you're doing,
==9736== or are doing some strange experiment):
==9736== /usr/lib/valgrind/../../bin/vgdb --pid=9736 ...command...
==9736==
==9736== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9736== /path/to/gdb ./zsh
==9736== and then give GDB the following command
==9736== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9736
==9736== --pid is optional if only one valgrind process is running
==9736==
client request: code 4d430005, addr 0xFFEFF6CEC, len 4
==9737== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9737-by-pythonnut-on-???
==9737== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9737-by-pythonnut-on-???
==9737== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9737-by-pythonnut-on-???
==9737==
==9737== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9737== don't want to do, unless you know exactly what you're doing,
==9737== or are doing some strange experiment):
==9737== /usr/lib/valgrind/../../bin/vgdb --pid=9737 ...command...
==9737==
==9737== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9737== /path/to/gdb ./zsh
==9737== and then give GDB the following command
==9737== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9737
==9737== --pid is optional if only one valgrind process is running
==9737==
client request: code 4d430005, addr 0xFFEFF6CEC, len 4
--9737-- Caught __NR_exit; running __libc_freeres()
--9737-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9737==
==9737== HEAP SUMMARY:
==9737== in use at exit: 3,159,266 bytes in 69,532 blocks
==9737== total heap usage: 1,468,133 allocs, 1,398,601 frees, 119,795,165 bytes allocated
==9737==
==9737== Searching for pointers to 69,532 not-freed blocks
--9737-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9737-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9737-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9737-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9737-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9737-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9737-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9737-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9737-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9737-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9737-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9737-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9737-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9737-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9737-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9737-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9737-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9737-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9737-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9737-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9737-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9737-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9737-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9737-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9737-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9737-- Scanning root segment: 0x701a000..0x701afff (4096)
--9737-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9737-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9737-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9737-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9737-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9737-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9737-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9737-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9737-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9737== Checked 4,856,912 bytes
==9737==
==9737== LEAK SUMMARY:
==9737== definitely lost: 2,181 bytes in 11 blocks
==9737== indirectly lost: 6,756 bytes in 7 blocks
==9737== possibly lost: 0 bytes in 0 blocks
==9737== still reachable: 3,150,329 bytes in 69,514 blocks
==9737== suppressed: 0 bytes in 0 blocks
==9737== Rerun with --leak-check=full to see details of leaked memory
==9737==
==9737== Use --track-origins=yes to see where uninitialised values come from
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9737==
==9737== 1 errors in context 1 of 2:
==9737== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9737== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9737== by 0x488CD0: stringsubst (subst.c:301)
==9737== by 0x48801B: prefork (subst.c:77)
==9737== by 0x42B318: execcmd (exec.c:2619)
==9737== by 0x428CA0: execpline2 (exec.c:1697)
==9737== by 0x427FD2: execpline (exec.c:1484)
==9737== by 0x427756: execlist (exec.c:1267)
==9737== by 0x42717C: execode (exec.c:1073)
==9737== by 0x431299: runshfunc (exec.c:5040)
==9737== by 0x430E76: doshfunc (exec.c:4920)
==9737== by 0x4302FB: execshfunc (exec.c:4557)
==9737== by 0x42D8C1: execcmd (exec.c:3373)
==9737==
==9737==
==9737== 2 errors in context 2 of 2:
==9737== Conditional jump or move depends on uninitialised value(s)
==9737== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9737== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9737== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9737== by 0x40EFC2: execbuiltin (builtin.c:450)
==9737== by 0x42D8E9: execcmd (exec.c:3378)
==9737== by 0x428CA0: execpline2 (exec.c:1697)
==9737== by 0x427FD2: execpline (exec.c:1484)
==9737== by 0x42779A: execlist (exec.c:1275)
==9737== by 0x42717C: execode (exec.c:1073)
==9737== by 0x431299: runshfunc (exec.c:5040)
==9737== by 0x430E76: doshfunc (exec.c:4920)
==9737== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9737==
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9736-- Caught __NR_exit; running __libc_freeres()
--9736-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9736==
==9736== HEAP SUMMARY:
==9736== in use at exit: 3,156,914 bytes in 69,452 blocks
==9736== total heap usage: 1,468,039 allocs, 1,398,587 frees, 119,595,970 bytes allocated
==9736==
==9736== Searching for pointers to 69,452 not-freed blocks
--9736-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9736-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9736-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9736-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9736-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9736-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9736-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9736-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9736-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9736-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9736-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9736-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9736-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9736-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9736-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9736-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9736-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9736-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9736-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9736-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9736-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9736-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9736-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9736-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9736-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9736-- Scanning root segment: 0x701a000..0x701afff (4096)
--9736-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9736-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9736-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9736-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9736-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9736-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9736-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9736-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9736-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9736== Checked 4,852,864 bytes
==9736==
==9736== LEAK SUMMARY:
==9736== definitely lost: 2,181 bytes in 11 blocks
==9736== indirectly lost: 6,756 bytes in 7 blocks
==9736== possibly lost: 0 bytes in 0 blocks
==9736== still reachable: 3,147,977 bytes in 69,434 blocks
==9736== suppressed: 0 bytes in 0 blocks
==9736== Rerun with --leak-check=full to see details of leaked memory
==9736==
==9736== Use --track-origins=yes to see where uninitialised values come from
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9736==
==9736== 1 errors in context 1 of 2:
==9736== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9736== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9736== by 0x488CD0: stringsubst (subst.c:301)
==9736== by 0x48801B: prefork (subst.c:77)
==9736== by 0x42B318: execcmd (exec.c:2619)
==9736== by 0x428CA0: execpline2 (exec.c:1697)
==9736== by 0x427FD2: execpline (exec.c:1484)
==9736== by 0x427756: execlist (exec.c:1267)
==9736== by 0x42717C: execode (exec.c:1073)
==9736== by 0x431299: runshfunc (exec.c:5040)
==9736== by 0x430E76: doshfunc (exec.c:4920)
==9736== by 0x4302FB: execshfunc (exec.c:4557)
==9736== by 0x42D8C1: execcmd (exec.c:3373)
==9736==
==9736==
==9736== 2 errors in context 2 of 2:
==9736== Conditional jump or move depends on uninitialised value(s)
==9736== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9736== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9736== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9736== by 0x40EFC2: execbuiltin (builtin.c:450)
==9736== by 0x42D8E9: execcmd (exec.c:3378)
==9736== by 0x428CA0: execpline2 (exec.c:1697)
==9736== by 0x427FD2: execpline (exec.c:1484)
==9736== by 0x42779A: execlist (exec.c:1275)
==9736== by 0x42717C: execode (exec.c:1073)
==9736== by 0x431299: runshfunc (exec.c:5040)
==9736== by 0x430E76: doshfunc (exec.c:4920)
==9736== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9736==
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF810C, len 4
client request: code 4d430005, addr 0xFFEFF810C, len 4
client request: code 4d430005, addr 0xFFEFF810C, len 4
==9743== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9743-by-pythonnut-on-???
==9743== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9743-by-pythonnut-on-???
==9743== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9743-by-pythonnut-on-???
==9743==
==9743== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9743== don't want to do, unless you know exactly what you're doing,
==9743== or are doing some strange experiment):
==9743== /usr/lib/valgrind/../../bin/vgdb --pid=9743 ...command...
==9743==
==9743== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9743== /path/to/gdb ./zsh
==9743== and then give GDB the following command
==9743== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9743
==9743== --pid is optional if only one valgrind process is running
==9743==
==9744== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9744-by-pythonnut-on-???
==9744== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9744-by-pythonnut-on-???
==9744== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9744-by-pythonnut-on-???
==9744==
==9744== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9744== don't want to do, unless you know exactly what you're doing,
==9744== or are doing some strange experiment):
==9744== /usr/lib/valgrind/../../bin/vgdb --pid=9744 ...command...
==9744==
==9744== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9744== /path/to/gdb ./zsh
==9744== and then give GDB the following command
==9744== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9744
==9744== --pid is optional if only one valgrind process is running
==9744==
--9744-- Caught __NR_exit; running __libc_freeres()
--9744-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9744==
==9744== HEAP SUMMARY:
==9744== in use at exit: 3,165,425 bytes in 69,620 blocks
==9744== total heap usage: 1,468,351 allocs, 1,398,731 frees, 119,856,736 bytes allocated
==9744==
==9744== Searching for pointers to 69,620 not-freed blocks
--9744-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9744-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9744-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9744-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9744-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9744-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9744-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9744-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9744-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9744-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9744-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9744-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9744-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9744-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9744-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9744-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9744-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9744-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9744-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9744-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9744-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9744-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9744-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9744-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9744-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9744-- Scanning root segment: 0x701a000..0x701afff (4096)
--9744-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9744-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9744-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9744-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9744-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9744-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9744-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9744-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9744-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9744== Checked 4,880,560 bytes
==9744==
==9744== LEAK SUMMARY:
==9744== definitely lost: 2,181 bytes in 11 blocks
==9744== indirectly lost: 6,756 bytes in 7 blocks
==9744== possibly lost: 0 bytes in 0 blocks
==9744== still reachable: 3,156,488 bytes in 69,602 blocks
==9744== suppressed: 0 bytes in 0 blocks
==9744== Rerun with --leak-check=full to see details of leaked memory
==9744==
==9744== Use --track-origins=yes to see where uninitialised values come from
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9744==
==9744== 1 errors in context 1 of 2:
==9744== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9744== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9744== by 0x488CD0: stringsubst (subst.c:301)
==9744== by 0x48801B: prefork (subst.c:77)
==9744== by 0x42B318: execcmd (exec.c:2619)
==9744== by 0x428CA0: execpline2 (exec.c:1697)
==9744== by 0x427FD2: execpline (exec.c:1484)
==9744== by 0x427756: execlist (exec.c:1267)
==9744== by 0x42717C: execode (exec.c:1073)
==9744== by 0x431299: runshfunc (exec.c:5040)
==9744== by 0x430E76: doshfunc (exec.c:4920)
==9744== by 0x4302FB: execshfunc (exec.c:4557)
==9744== by 0x42D8C1: execcmd (exec.c:3373)
==9744==
==9744==
==9744== 2 errors in context 2 of 2:
==9744== Conditional jump or move depends on uninitialised value(s)
==9744== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9744== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9744== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9744== by 0x40EFC2: execbuiltin (builtin.c:450)
==9744== by 0x42D8E9: execcmd (exec.c:3378)
==9744== by 0x428CA0: execpline2 (exec.c:1697)
==9744== by 0x427FD2: execpline (exec.c:1484)
==9744== by 0x42779A: execlist (exec.c:1275)
==9744== by 0x42717C: execode (exec.c:1073)
==9744== by 0x431299: runshfunc (exec.c:5040)
==9744== by 0x430E76: doshfunc (exec.c:4920)
==9744== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9744==
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9743-- Caught __NR_exit; running __libc_freeres()
--9743-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9743==
==9743== HEAP SUMMARY:
==9743== in use at exit: 3,163,074 bytes in 69,540 blocks
==9743== total heap usage: 1,468,291 allocs, 1,398,751 frees, 119,626,838 bytes allocated
==9743==
==9743== Searching for pointers to 69,540 not-freed blocks
--9743-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9743-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9743-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9743-- Scanning root segment: 0x4037000..0x4042fff (49152)
--9743-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9743-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9743-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9743-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9743-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9743-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9743-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9743-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9743-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9743-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9743-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9743-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9743-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9743-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9743-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9743-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9743-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9743-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9743-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9743-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9743-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9743-- Scanning root segment: 0x701a000..0x701afff (4096)
--9743-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9743-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9743-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9743-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9743-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9743-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9743-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9743-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9743-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9743== Checked 4,860,256 bytes
==9743==
==9743== LEAK SUMMARY:
==9743== definitely lost: 2,181 bytes in 11 blocks
==9743== indirectly lost: 6,756 bytes in 7 blocks
==9743== possibly lost: 0 bytes in 0 blocks
==9743== still reachable: 3,154,137 bytes in 69,522 blocks
==9743== suppressed: 0 bytes in 0 blocks
==9743== Rerun with --leak-check=full to see details of leaked memory
==9743==
==9743== Use --track-origins=yes to see where uninitialised values come from
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9743==
==9743== 1 errors in context 1 of 2:
==9743== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9743== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9743== by 0x488CD0: stringsubst (subst.c:301)
==9743== by 0x48801B: prefork (subst.c:77)
==9743== by 0x42B318: execcmd (exec.c:2619)
==9743== by 0x428CA0: execpline2 (exec.c:1697)
==9743== by 0x427FD2: execpline (exec.c:1484)
==9743== by 0x427756: execlist (exec.c:1267)
==9743== by 0x42717C: execode (exec.c:1073)
==9743== by 0x431299: runshfunc (exec.c:5040)
==9743== by 0x430E76: doshfunc (exec.c:4920)
==9743== by 0x4302FB: execshfunc (exec.c:4557)
==9743== by 0x42D8C1: execcmd (exec.c:3373)
==9743==
==9743==
==9743== 2 errors in context 2 of 2:
==9743== Conditional jump or move depends on uninitialised value(s)
==9743== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9743== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9743== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9743== by 0x40EFC2: execbuiltin (builtin.c:450)
==9743== by 0x42D8E9: execcmd (exec.c:3378)
==9743== by 0x428CA0: execpline2 (exec.c:1697)
==9743== by 0x427FD2: execpline (exec.c:1484)
==9743== by 0x42779A: execlist (exec.c:1275)
==9743== by 0x42717C: execode (exec.c:1073)
==9743== by 0x431299: runshfunc (exec.c:5040)
==9743== by 0x430E76: doshfunc (exec.c:4920)
==9743== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9743==
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF77BC, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF713C, len 4
client request: code 4d430005, addr 0xFFEFF616C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFF6A4C, len 4
client request: code 4d430005, addr 0xFFEFEBCDC, len 4
==9749== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9749-by-pythonnut-on-???
==9749== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9749-by-pythonnut-on-???
==9749== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9749-by-pythonnut-on-???
==9749==
==9749== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9749== don't want to do, unless you know exactly what you're doing,
==9749== or are doing some strange experiment):
==9749== /usr/lib/valgrind/../../bin/vgdb --pid=9749 ...command...
==9749==
==9749== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9749== /path/to/gdb ./zsh
==9749== and then give GDB the following command
==9749== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9749
==9749== --pid is optional if only one valgrind process is running
==9749==
client request: code 4d430005, addr 0xFFEFEAB9C, len 4
==9748== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9748-by-pythonnut-on-???
==9748== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9748-by-pythonnut-on-???
==9748== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9748-by-pythonnut-on-???
==9748==
==9748== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9748== don't want to do, unless you know exactly what you're doing,
==9748== or are doing some strange experiment):
==9748== /usr/lib/valgrind/../../bin/vgdb --pid=9748 ...command...
==9748==
==9748== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9748== /path/to/gdb ./zsh
==9748== and then give GDB the following command
==9748== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9748
==9748== --pid is optional if only one valgrind process is running
==9748==
--9748-- Caught __NR_exit; running __libc_freeres()
--9748-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9748==
==9748== HEAP SUMMARY:
==9748== in use at exit: 3,171,825 bytes in 69,629 blocks
==9748== total heap usage: 1,468,617 allocs, 1,398,988 frees, 119,672,835 bytes allocated
==9748==
==9748== Searching for pointers to 69,629 not-freed blocks
--9748-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9748-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9748-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9748-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9748-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9748-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9748-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9748-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9748-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9748-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9748-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9748-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9748-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9748-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9748-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9748-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9748-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9748-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9748-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9748-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9748-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9748-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9748-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9748-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9748-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9748-- Scanning root segment: 0x701a000..0x701afff (4096)
--9748-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9748-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9748-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9748-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9748-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9748-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9748-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9748-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9748-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9748== Checked 4,889,720 bytes
==9748==
==9748== LEAK SUMMARY:
==9748== definitely lost: 2,181 bytes in 11 blocks
==9748== indirectly lost: 6,756 bytes in 7 blocks
==9748== possibly lost: 0 bytes in 0 blocks
==9748== still reachable: 3,162,888 bytes in 69,611 blocks
==9748== suppressed: 0 bytes in 0 blocks
==9748== Rerun with --leak-check=full to see details of leaked memory
==9748==
==9748== Use --track-origins=yes to see where uninitialised values come from
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9748==
==9748== 1 errors in context 1 of 2:
==9748== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9748== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9748== by 0x488CD0: stringsubst (subst.c:301)
==9748== by 0x48801B: prefork (subst.c:77)
==9748== by 0x42B318: execcmd (exec.c:2619)
==9748== by 0x428CA0: execpline2 (exec.c:1697)
==9748== by 0x427FD2: execpline (exec.c:1484)
==9748== by 0x427756: execlist (exec.c:1267)
==9748== by 0x42717C: execode (exec.c:1073)
==9748== by 0x431299: runshfunc (exec.c:5040)
==9748== by 0x430E76: doshfunc (exec.c:4920)
==9748== by 0x4302FB: execshfunc (exec.c:4557)
==9748== by 0x42D8C1: execcmd (exec.c:3373)
==9748==
==9748==
==9748== 2 errors in context 2 of 2:
==9748== Conditional jump or move depends on uninitialised value(s)
==9748== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9748== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9748== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9748== by 0x40EFC2: execbuiltin (builtin.c:450)
==9748== by 0x42D8E9: execcmd (exec.c:3378)
==9748== by 0x428CA0: execpline2 (exec.c:1697)
==9748== by 0x427FD2: execpline (exec.c:1484)
==9748== by 0x42779A: execlist (exec.c:1275)
==9748== by 0x42717C: execode (exec.c:1073)
==9748== by 0x431299: runshfunc (exec.c:5040)
==9748== by 0x430E76: doshfunc (exec.c:4920)
==9748== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9748==
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9751-- Caught __NR_exit; running __libc_freeres()
==9751== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9751-by-pythonnut-on-???
==9751== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9751-by-pythonnut-on-???
==9751== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9751-by-pythonnut-on-???
==9751==
==9751== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9751== don't want to do, unless you know exactly what you're doing,
==9751== or are doing some strange experiment):
==9751== /usr/lib/valgrind/../../bin/vgdb --pid=9751 ...command...
==9751==
==9751== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9751== /path/to/gdb ./zsh
==9751== and then give GDB the following command
==9751== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9751
==9751== --pid is optional if only one valgrind process is running
==9751==
client request: code 4d430005, addr 0xFFEFEA33C, len 4
--9751-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9751==
==9751== HEAP SUMMARY:
==9751== in use at exit: 3,171,981 bytes in 69,635 blocks
==9751== total heap usage: 1,468,626 allocs, 1,398,991 frees, 119,674,831 bytes allocated
==9751==
==9751== Searching for pointers to 69,635 not-freed blocks
--9751-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9751-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9751-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9751-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9751-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9751-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9751-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9751-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9751-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9751-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9751-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9751-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9751-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9751-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9751-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9751-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9751-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9751-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9751-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9751-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9751-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9751-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9751-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9751-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9751-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9751-- Scanning root segment: 0x701a000..0x701afff (4096)
--9751-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9751-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9751-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9751-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9751-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9751-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9751-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9751-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9751-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9751== Checked 4,891,000 bytes
==9751==
==9751== LEAK SUMMARY:
==9751== definitely lost: 2,181 bytes in 11 blocks
==9751== indirectly lost: 6,756 bytes in 7 blocks
==9751== possibly lost: 0 bytes in 0 blocks
==9751== still reachable: 3,163,044 bytes in 69,617 blocks
==9751== suppressed: 0 bytes in 0 blocks
==9751== Rerun with --leak-check=full to see details of leaked memory
==9751==
==9751== Use --track-origins=yes to see where uninitialised values come from
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9751==
==9751== 1 errors in context 1 of 2:
==9751== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9751== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9751== by 0x488CD0: stringsubst (subst.c:301)
==9751== by 0x48801B: prefork (subst.c:77)
==9751== by 0x42B318: execcmd (exec.c:2619)
==9751== by 0x428CA0: execpline2 (exec.c:1697)
==9751== by 0x427FD2: execpline (exec.c:1484)
==9751== by 0x427756: execlist (exec.c:1267)
==9751== by 0x42717C: execode (exec.c:1073)
==9751== by 0x431299: runshfunc (exec.c:5040)
==9751== by 0x430E76: doshfunc (exec.c:4920)
==9751== by 0x4302FB: execshfunc (exec.c:4557)
==9751== by 0x42D8C1: execcmd (exec.c:3373)
==9751==
==9751==
==9751== 2 errors in context 2 of 2:
==9751== Conditional jump or move depends on uninitialised value(s)
==9751== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9751== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9751== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9751== by 0x40EFC2: execbuiltin (builtin.c:450)
==9751== by 0x42D8E9: execcmd (exec.c:3378)
==9751== by 0x428CA0: execpline2 (exec.c:1697)
==9751== by 0x427FD2: execpline (exec.c:1484)
==9751== by 0x42779A: execlist (exec.c:1275)
==9751== by 0x42717C: execode (exec.c:1073)
==9751== by 0x431299: runshfunc (exec.c:5040)
==9751== by 0x430E76: doshfunc (exec.c:4920)
==9751== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9751==
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9750-- Caught __NR_exit; running __libc_freeres()
==9750== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9750-by-pythonnut-on-???
==9750== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9750-by-pythonnut-on-???
==9750== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9750-by-pythonnut-on-???
==9750==
==9750== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9750== don't want to do, unless you know exactly what you're doing,
==9750== or are doing some strange experiment):
==9750== /usr/lib/valgrind/../../bin/vgdb --pid=9750 ...command...
==9750==
==9750== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9750== /path/to/gdb ./zsh
==9750== and then give GDB the following command
==9750== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9750
==9750== --pid is optional if only one valgrind process is running
==9750==
--9750-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9750==
==9750== HEAP SUMMARY:
==9750== in use at exit: 3,171,917 bytes in 69,632 blocks
==9750== total heap usage: 1,468,628 allocs, 1,398,996 frees, 119,675,375 bytes allocated
==9750==
==9750== Searching for pointers to 69,632 not-freed blocks
--9750-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9750-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9750-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9750-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9750-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9750-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9750-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9750-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9750-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9750-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9750-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9750-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9750-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9750-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9750-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9750-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9750-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9750-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9750-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9750-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9750-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9750-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9750-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9750-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9750-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9750-- Scanning root segment: 0x701a000..0x701afff (4096)
--9750-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9750-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9750-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9750-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9750-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9750-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9750-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9750-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9750-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9750== Checked 4,890,312 bytes
==9750==
==9750== LEAK SUMMARY:
==9750== definitely lost: 2,181 bytes in 11 blocks
==9750== indirectly lost: 6,756 bytes in 7 blocks
==9750== possibly lost: 0 bytes in 0 blocks
==9750== still reachable: 3,162,980 bytes in 69,614 blocks
==9750== suppressed: 0 bytes in 0 blocks
==9750== Rerun with --leak-check=full to see details of leaked memory
==9750==
==9750== Use --track-origins=yes to see where uninitialised values come from
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9750==
==9750== 1 errors in context 1 of 2:
==9750== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9750== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9750== by 0x488CD0: stringsubst (subst.c:301)
==9750== by 0x48801B: prefork (subst.c:77)
==9750== by 0x42B318: execcmd (exec.c:2619)
==9750== by 0x428CA0: execpline2 (exec.c:1697)
==9750== by 0x427FD2: execpline (exec.c:1484)
==9750== by 0x427756: execlist (exec.c:1267)
==9750== by 0x42717C: execode (exec.c:1073)
==9750== by 0x431299: runshfunc (exec.c:5040)
==9750== by 0x430E76: doshfunc (exec.c:4920)
==9750== by 0x4302FB: execshfunc (exec.c:4557)
==9750== by 0x42D8C1: execcmd (exec.c:3373)
==9750==
==9750==
==9750== 2 errors in context 2 of 2:
==9750== Conditional jump or move depends on uninitialised value(s)
==9750== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9750== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9750== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9750== by 0x40EFC2: execbuiltin (builtin.c:450)
==9750== by 0x42D8E9: execcmd (exec.c:3378)
==9750== by 0x428CA0: execpline2 (exec.c:1697)
==9750== by 0x427FD2: execpline (exec.c:1484)
==9750== by 0x42779A: execlist (exec.c:1275)
==9750== by 0x42717C: execode (exec.c:1073)
==9750== by 0x431299: runshfunc (exec.c:5040)
==9750== by 0x430E76: doshfunc (exec.c:4920)
==9750== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9750==
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9753-by-pythonnut-on-???
==9753== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9753-by-pythonnut-on-???
==9753== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9753-by-pythonnut-on-???
==9753==
==9753== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9753== don't want to do, unless you know exactly what you're doing,
==9753== or are doing some strange experiment):
==9753== /usr/lib/valgrind/../../bin/vgdb --pid=9753 ...command...
==9753==
==9753== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9753== /path/to/gdb ./zsh
==9753== and then give GDB the following command
==9753== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9753
==9753== --pid is optional if only one valgrind process is running
==9753==
--9754-- Caught __NR_exit; running __libc_freeres()
==9754== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9754-by-pythonnut-on-???
==9754== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9754-by-pythonnut-on-???
==9754== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9754-by-pythonnut-on-???
==9754==
==9754== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9754== don't want to do, unless you know exactly what you're doing,
==9754== or are doing some strange experiment):
==9754== /usr/lib/valgrind/../../bin/vgdb --pid=9754 ...command...
==9754==
==9754== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9754== /path/to/gdb ./zsh
==9754== and then give GDB the following command
==9754== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9754
==9754== --pid is optional if only one valgrind process is running
==9754==
client request: code 4d430005, addr 0xFFEFE9B7C, len 4
--9754-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9754==
==9754== HEAP SUMMARY:
==9754== in use at exit: 3,172,078 bytes in 69,638 blocks
==9754== total heap usage: 1,468,633 allocs, 1,398,995 frees, 119,677,040 bytes allocated
==9754==
==9754== Searching for pointers to 69,638 not-freed blocks
--9754-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9754-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9754-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9754-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9754-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9754-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9754-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9754-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9754-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9754-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9754-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9754-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9754-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9754-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9754-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9754-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9754-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9754-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9754-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9754-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9754-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9754-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9754-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9754-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9754-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9754-- Scanning root segment: 0x701a000..0x701afff (4096)
--9754-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9754-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9754-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9754-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9754-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9754-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9754-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9754-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9754-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9754== Checked 4,891,600 bytes
==9754==
==9754== LEAK SUMMARY:
==9754== definitely lost: 2,181 bytes in 11 blocks
==9754== indirectly lost: 6,756 bytes in 7 blocks
==9754== possibly lost: 0 bytes in 0 blocks
==9754== still reachable: 3,163,141 bytes in 69,620 blocks
==9754== suppressed: 0 bytes in 0 blocks
==9754== Rerun with --leak-check=full to see details of leaked memory
==9754==
==9754== Use --track-origins=yes to see where uninitialised values come from
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9754==
==9754== 1 errors in context 1 of 2:
==9754== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9754== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9754== by 0x488CD0: stringsubst (subst.c:301)
==9754== by 0x48801B: prefork (subst.c:77)
==9754== by 0x42B318: execcmd (exec.c:2619)
==9754== by 0x428CA0: execpline2 (exec.c:1697)
==9754== by 0x427FD2: execpline (exec.c:1484)
==9754== by 0x427756: execlist (exec.c:1267)
==9754== by 0x42717C: execode (exec.c:1073)
==9754== by 0x431299: runshfunc (exec.c:5040)
==9754== by 0x430E76: doshfunc (exec.c:4920)
==9754== by 0x4302FB: execshfunc (exec.c:4557)
==9754== by 0x42D8C1: execcmd (exec.c:3373)
==9754==
==9754==
==9754== 2 errors in context 2 of 2:
==9754== Conditional jump or move depends on uninitialised value(s)
==9754== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9754== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9754== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9754== by 0x40EFC2: execbuiltin (builtin.c:450)
==9754== by 0x42D8E9: execcmd (exec.c:3378)
==9754== by 0x428CA0: execpline2 (exec.c:1697)
==9754== by 0x427FD2: execpline (exec.c:1484)
==9754== by 0x42779A: execlist (exec.c:1275)
==9754== by 0x42717C: execode (exec.c:1073)
==9754== by 0x431299: runshfunc (exec.c:5040)
==9754== by 0x430E76: doshfunc (exec.c:4920)
==9754== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9754==
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9753-- Caught __NR_exit; running __libc_freeres()
--9753-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9753==
==9753== HEAP SUMMARY:
==9753== in use at exit: 3,172,014 bytes in 69,635 blocks
==9753== total heap usage: 1,468,635 allocs, 1,399,000 frees, 119,677,584 bytes allocated
==9753==
==9753== Searching for pointers to 69,635 not-freed blocks
--9753-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9753-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9753-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9753-- Scanning root segment: 0x4037000..0x4046fff (65536)
--9753-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9753-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9753-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9753-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9753-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9753-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9753-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9753-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9753-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9753-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9753-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9753-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9753-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9753-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9753-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9753-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9753-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9753-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9753-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9753-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9753-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9753-- Scanning root segment: 0x701a000..0x701afff (4096)
--9753-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9753-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9753-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9753-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9753-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9753-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9753-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9753-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9753-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9753== Checked 4,890,920 bytes
==9753==
==9753== LEAK SUMMARY:
==9753== definitely lost: 2,181 bytes in 11 blocks
==9753== indirectly lost: 6,756 bytes in 7 blocks
==9753== possibly lost: 0 bytes in 0 blocks
==9753== still reachable: 3,163,077 bytes in 69,617 blocks
==9753== suppressed: 0 bytes in 0 blocks
==9753== Rerun with --leak-check=full to see details of leaked memory
==9753==
==9753== Use --track-origins=yes to see where uninitialised values come from
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753==
==9753== 1 errors in context 1 of 2:
==9753== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9753== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9753== by 0x488CD0: stringsubst (subst.c:301)
==9753== by 0x48801B: prefork (subst.c:77)
==9753== by 0x42B318: execcmd (exec.c:2619)
==9753== by 0x428CA0: execpline2 (exec.c:1697)
==9753== by 0x427FD2: execpline (exec.c:1484)
==9753== by 0x427756: execlist (exec.c:1267)
==9753== by 0x42717C: execode (exec.c:1073)
==9753== by 0x431299: runshfunc (exec.c:5040)
==9753== by 0x430E76: doshfunc (exec.c:4920)
==9753== by 0x4302FB: execshfunc (exec.c:4557)
==9753== by 0x42D8C1: execcmd (exec.c:3373)
==9753==
==9753==
==9753== 2 errors in context 2 of 2:
==9753== Conditional jump or move depends on uninitialised value(s)
==9753== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9753== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9753== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9753== by 0x40EFC2: execbuiltin (builtin.c:450)
==9753== by 0x42D8E9: execcmd (exec.c:3378)
==9753== by 0x428CA0: execpline2 (exec.c:1697)
==9753== by 0x427FD2: execpline (exec.c:1484)
==9753== by 0x42779A: execlist (exec.c:1275)
==9753== by 0x42717C: execode (exec.c:1073)
==9753== by 0x431299: runshfunc (exec.c:5040)
==9753== by 0x430E76: doshfunc (exec.c:4920)
==9753== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9753==
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF992C, len 4
client request: code 4d430005, addr 0xFFEFF87DC, len 4
client request: code 4d430005, addr 0xFFEFFB6EC, len 4
--9723-- Caught __NR_exit; running __libc_freeres()
--9723-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9723==
==9723== HEAP SUMMARY:
==9723== in use at exit: 3,150,335 bytes in 69,153 blocks
==9723== total heap usage: 1,468,723 allocs, 1,399,570 frees, 119,694,283 bytes allocated
==9723==
==9723== Searching for pointers to 69,153 not-freed blocks
--9723-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9723-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9723-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9723-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9723-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9723-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9723-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9723-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9723-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9723-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9723-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9723-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9723-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9723-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9723-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9723-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9723-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9723-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9723-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9723-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9723-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9723-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9723-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9723-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9723-- Scanning root segment: 0x701a000..0x701afff (4096)
--9723-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9723-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9723-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9723-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9723-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9723-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9723-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9723-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9723-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806-- new: 0x05a3c8e0 (__GI_strcpy ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806-- old: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806-- new: 0x05a3b000 (__GI_strcat ) R-> (2003.0) 0x04c2d1c0 strcat
==9723== Checked 4,793,088 bytes
==9723==
==9723== LEAK SUMMARY:
==9723== definitely lost: 2,181 bytes in 11 blocks
==9723== indirectly lost: 6,756 bytes in 7 blocks
==9723== possibly lost: 0 bytes in 0 blocks
==9723== still reachable: 3,141,398 bytes in 69,135 blocks
==9723== suppressed: 0 bytes in 0 blocks
==9723== Rerun with --leak-check=full to see details of leaked memory
==9723==
==9723== Use --track-origins=yes to see where uninitialised values come from
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9723==
==9723== 1 errors in context 1 of 2:
==9723== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9723== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9723== by 0x488CD0: stringsubst (subst.c:301)
==9723== by 0x48801B: prefork (subst.c:77)
==9723== by 0x42B318: execcmd (exec.c:2619)
==9723== by 0x428CA0: execpline2 (exec.c:1697)
==9723== by 0x427FD2: execpline (exec.c:1484)
==9723== by 0x427756: execlist (exec.c:1267)
==9723== by 0x42717C: execode (exec.c:1073)
==9723== by 0x431299: runshfunc (exec.c:5040)
==9723== by 0x430E76: doshfunc (exec.c:4920)
==9723== by 0x4302FB: execshfunc (exec.c:4557)
==9723== by 0x42D8C1: execcmd (exec.c:3373)
==9723==
==9723==
==9723== 2 errors in context 2 of 2:
==9723== Conditional jump or move depends on uninitialised value(s)
==9723== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9723== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9723== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9723== by 0x40EFC2: execbuiltin (builtin.c:450)
==9723== by 0x42D8E9: execcmd (exec.c:3378)
==9723== by 0x428CA0: execpline2 (exec.c:1697)
==9723== by 0x427FD2: execpline (exec.c:1484)
==9723== by 0x42779A: execlist (exec.c:1275)
==9723== by 0x42717C: execode (exec.c:1073)
==9723== by 0x431299: runshfunc (exec.c:5040)
==9723== by 0x430E76: doshfunc (exec.c:4920)
==9723== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9723==
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--7806-- memcheck GC: 1000 nodes, 929 survivors ( 92.9%)
--7806-- memcheck GC: 1414 new table size (stepup)
--9720-- Caught __NR_exit; running __libc_freeres()
--9720-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9720==
==9720== HEAP SUMMARY:
==9720== in use at exit: 3,120,310 bytes in 68,924 blocks
==9720== total heap usage: 1,463,615 allocs, 1,394,691 frees, 117,961,236 bytes allocated
==9720==
==9720== Searching for pointers to 68,924 not-freed blocks
--9720-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9720-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9720-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9720-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9720-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9720-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9720-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9720-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9720-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9720-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9720-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9720-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9720-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9720-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9720-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9720-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9720-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9720-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9720-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9720-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9720-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9720-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9720-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9720-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9720-- Scanning root segment: 0x701a000..0x701afff (4096)
--9720-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9720-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9720-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9720-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9720-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9720-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9720-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9720-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9720-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9758== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9758-by-pythonnut-on-???
==9758== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9758-by-pythonnut-on-???
==9758== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9758-by-pythonnut-on-???
==9758==
==9758== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9758== don't want to do, unless you know exactly what you're doing,
==9758== or are doing some strange experiment):
==9758== /usr/lib/valgrind/../../bin/vgdb --pid=9758 ...command...
==9758==
==9758== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9758== /path/to/gdb ./zsh
==9758== and then give GDB the following command
==9758== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9758
==9758== --pid is optional if only one valgrind process is running
==9758==
--9759-- Caught __NR_exit; running __libc_freeres()
==9759== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9759-by-pythonnut-on-???
==9759== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9759-by-pythonnut-on-???
==9759== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9759-by-pythonnut-on-???
==9759==
==9759== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9759== don't want to do, unless you know exactly what you're doing,
==9759== or are doing some strange experiment):
==9759== /usr/lib/valgrind/../../bin/vgdb --pid=9759 ...command...
==9759==
==9759== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9759== /path/to/gdb ./zsh
==9759== and then give GDB the following command
==9759== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9759
==9759== --pid is optional if only one valgrind process is running
==9759==
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
--9759-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9759==
==9759== HEAP SUMMARY:
==9759== in use at exit: 3,124,574 bytes in 69,166 blocks
==9759== total heap usage: 1,582,709 allocs, 1,513,543 frees, 127,430,363 bytes allocated
==9759==
==9720== Checked 4,761,952 bytes
==9720==
==9759== Searching for pointers to 69,166 not-freed blocks
--9759-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9759-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9759-- Scanning root segment: 0x4022000..0x4026fff (20480)
==9720== LEAK SUMMARY:
==9720== definitely lost: 2,181 bytes in 11 blocks
==9720== indirectly lost: 6,756 bytes in 7 blocks
==9720== possibly lost: 0 bytes in 0 blocks
==9720== still reachable: 3,111,373 bytes in 68,906 blocks
==9720== suppressed: 0 bytes in 0 blocks
==9720== Rerun with --leak-check=full to see details of leaked memory
==9720==
--9759-- Scanning root segment: 0x4049000..0x404cfff (16384)
==9720== Use --track-origins=yes to see where uninitialised values come from
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720==
==9720== 1 errors in context 1 of 2:
==9720== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9720== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9720== by 0x488CD0: stringsubst (subst.c:301)
==9720== by 0x48801B: prefork (subst.c:77)
==9720== by 0x42B318: execcmd (exec.c:2619)
--9759-- Scanning root segment: 0x4222000..0x4222fff (4096)
==9720== by 0x428CA0: execpline2 (exec.c:1697)
==9720== by 0x427FD2: execpline (exec.c:1484)
==9720== by 0x427756: execlist (exec.c:1267)
==9720== by 0x42717C: execode (exec.c:1073)
--9759-- Scanning root segment: 0x4223000..0x4223fff (4096)
==9720== by 0x431299: runshfunc (exec.c:5040)
==9720== by 0x430E76: doshfunc (exec.c:4920)
==9720== by 0x4302FB: execshfunc (exec.c:4557)
==9720== by 0x42D8C1: execcmd (exec.c:3373)
==9720==
--9759-- Scanning root segment: 0x4224000..0x4224fff (4096)
==9720==
==9720== 2 errors in context 2 of 2:
==9720== Conditional jump or move depends on uninitialised value(s)
==9720== at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9759-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9720== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9720== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9720== by 0x40EFC2: execbuiltin (builtin.c:450)
==9720== by 0x42D8E9: execcmd (exec.c:3378)
--9759-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9720== by 0x428CA0: execpline2 (exec.c:1697)
==9720== by 0x427FD2: execpline (exec.c:1484)
==9720== by 0x42779A: execlist (exec.c:1275)
==9720== by 0x42717C: execode (exec.c:1073)
==9720== by 0x431299: runshfunc (exec.c:5040)
--9759-- Scanning root segment: 0x5041000..0x5041fff (4096)
==9720== by 0x430E76: doshfunc (exec.c:4920)
==9720== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9720==
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9759-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9759-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9759-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9759-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9759-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9759-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9759-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9759-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9759-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9759-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9759-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9759-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9759-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9759-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9759-- Scanning root segment: 0x701a000..0x701afff (4096)
--9759-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9759-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9759-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9759-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9759-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9759-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9759-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9759-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9759-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9759-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9649-- Caught __NR_exit; running __libc_freeres()
--9649-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9649==
==9649== HEAP SUMMARY:
==9649== in use at exit: 3,119,648 bytes in 68,911 blocks
==9649== total heap usage: 1,463,655 allocs, 1,394,744 frees, 117,956,621 bytes allocated
==9649==
==9649== Searching for pointers to 68,911 not-freed blocks
--9649-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9649-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9649-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9649-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9649-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9649-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9649-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9649-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9649-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9649-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9649-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9649-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9649-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9649-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9649-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9649-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9649-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9649-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9649-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9649-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9649-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9649-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9649-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9649-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9649-- Scanning root segment: 0x701a000..0x701afff (4096)
--9649-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9649-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9649-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9649-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9649-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9649-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9649-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9649-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9649-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9759== Checked 4,785,792 bytes
==9759==
==9759== LEAK SUMMARY:
==9759== definitely lost: 2,189 bytes in 12 blocks
==9759== indirectly lost: 6,756 bytes in 7 blocks
==9759== possibly lost: 0 bytes in 0 blocks
==9759== still reachable: 3,115,629 bytes in 69,147 blocks
==9759== suppressed: 0 bytes in 0 blocks
==9759== Rerun with --leak-check=full to see details of leaked memory
==9759==
==9759== Use --track-origins=yes to see where uninitialised values come from
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9759==
==9759== 1 errors in context 1 of 2:
==9759== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9759== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9759== by 0x488CD0: stringsubst (subst.c:301)
==9759== by 0x48801B: prefork (subst.c:77)
==9759== by 0x42B318: execcmd (exec.c:2619)
==9759== by 0x428CA0: execpline2 (exec.c:1697)
==9759== by 0x427FD2: execpline (exec.c:1484)
==9759== by 0x427756: execlist (exec.c:1267)
==9759== by 0x42717C: execode (exec.c:1073)
==9759== by 0x431299: runshfunc (exec.c:5040)
==9759== by 0x430E76: doshfunc (exec.c:4920)
==9759== by 0x4302FB: execshfunc (exec.c:4557)
==9759== by 0x42D8C1: execcmd (exec.c:3373)
==9759==
==9759==
==9759== 2 errors in context 2 of 2:
==9759== Conditional jump or move depends on uninitialised value(s)
==9759== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9759== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9759== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9759== by 0x40EFC2: execbuiltin (builtin.c:450)
==9759== by 0x42D8E9: execcmd (exec.c:3378)
==9759== by 0x428CA0: execpline2 (exec.c:1697)
==9759== by 0x427FD2: execpline (exec.c:1484)
==9759== by 0x42779A: execlist (exec.c:1275)
==9759== by 0x42717C: execode (exec.c:1073)
==9759== by 0x431299: runshfunc (exec.c:5040)
==9759== by 0x430E76: doshfunc (exec.c:4920)
==9759== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9759==
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9758-- Caught __NR_exit; running __libc_freeres()
--9758-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9758==
client request: code 4d430005, addr 0xFFEFEBF0C, len 4
==9758== HEAP SUMMARY:
==9758== in use at exit: 3,124,510 bytes in 69,163 blocks
==9758== total heap usage: 1,582,707 allocs, 1,513,544 frees, 127,430,122 bytes allocated
==9758==
==9649== Checked 4,760,648 bytes
==9649==
==9758== Searching for pointers to 69,163 not-freed blocks
--9758-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9758-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9758-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9758-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9758-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9758-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9758-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9758-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9758-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9758-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9758-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9758-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9758-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9758-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9758-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9758-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9758-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9758-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9758-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9758-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9758-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9758-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9758-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9758-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9758-- Scanning root segment: 0x701a000..0x701afff (4096)
--9758-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9758-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9758-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9758-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9758-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9758-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9758-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9758-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9758-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9758-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9649== LEAK SUMMARY:
==9649== definitely lost: 2,181 bytes in 11 blocks
==9649== indirectly lost: 6,756 bytes in 7 blocks
==9649== possibly lost: 0 bytes in 0 blocks
==9649== still reachable: 3,110,711 bytes in 68,893 blocks
==9649== suppressed: 0 bytes in 0 blocks
==9649== Rerun with --leak-check=full to see details of leaked memory
==9649==
==9649== Use --track-origins=yes to see where uninitialised values come from
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9649==
==9649== 1 errors in context 1 of 2:
==9649== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9649== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9649== by 0x488CD0: stringsubst (subst.c:301)
==9649== by 0x48801B: prefork (subst.c:77)
==9649== by 0x42B318: execcmd (exec.c:2619)
==9649== by 0x428CA0: execpline2 (exec.c:1697)
==9649== by 0x427FD2: execpline (exec.c:1484)
==9649== by 0x427756: execlist (exec.c:1267)
==9649== by 0x42717C: execode (exec.c:1073)
==9649== by 0x431299: runshfunc (exec.c:5040)
==9649== by 0x430E76: doshfunc (exec.c:4920)
==9649== by 0x4302FB: execshfunc (exec.c:4557)
==9649== by 0x42D8C1: execcmd (exec.c:3373)
==9649==
==9649==
==9649== 2 errors in context 2 of 2:
==9649== Conditional jump or move depends on uninitialised value(s)
==9649== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9649== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9649== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9649== by 0x40EFC2: execbuiltin (builtin.c:450)
==9649== by 0x42D8E9: execcmd (exec.c:3378)
==9649== by 0x428CA0: execpline2 (exec.c:1697)
==9649== by 0x427FD2: execpline (exec.c:1484)
==9649== by 0x42779A: execlist (exec.c:1275)
==9649== by 0x42717C: execode (exec.c:1073)
==9649== by 0x431299: runshfunc (exec.c:5040)
==9649== by 0x430E76: doshfunc (exec.c:4920)
==9649== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9649==
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758== Checked 4,785,104 bytes
==9758==
==9758== LEAK SUMMARY:
==9758== definitely lost: 2,189 bytes in 12 blocks
==9758== indirectly lost: 6,756 bytes in 7 blocks
==9758== possibly lost: 0 bytes in 0 blocks
==9758== still reachable: 3,115,565 bytes in 69,144 blocks
==9758== suppressed: 0 bytes in 0 blocks
==9758== Rerun with --leak-check=full to see details of leaked memory
==9758==
==9758== Use --track-origins=yes to see where uninitialised values come from
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758==
==9758== 1 errors in context 1 of 2:
==9758== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9758== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9758== by 0x488CD0: stringsubst (subst.c:301)
==9758== by 0x48801B: prefork (subst.c:77)
==9758== by 0x42B318: execcmd (exec.c:2619)
==9758== by 0x428CA0: execpline2 (exec.c:1697)
==9758== by 0x427FD2: execpline (exec.c:1484)
==9758== by 0x427756: execlist (exec.c:1267)
==9758== by 0x42717C: execode (exec.c:1073)
==9758== by 0x431299: runshfunc (exec.c:5040)
==9758== by 0x430E76: doshfunc (exec.c:4920)
==9758== by 0x4302FB: execshfunc (exec.c:4557)
==9758== by 0x42D8C1: execcmd (exec.c:3373)
==9758==
==9758==
==9758== 2 errors in context 2 of 2:
==9758== Conditional jump or move depends on uninitialised value(s)
==9758== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9758== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9758== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9758== by 0x40EFC2: execbuiltin (builtin.c:450)
==9758== by 0x42D8E9: execcmd (exec.c:3378)
==9758== by 0x428CA0: execpline2 (exec.c:1697)
==9758== by 0x427FD2: execpline (exec.c:1484)
==9758== by 0x42779A: execlist (exec.c:1275)
==9758== by 0x42717C: execode (exec.c:1073)
==9758== by 0x431299: runshfunc (exec.c:5040)
==9758== by 0x430E76: doshfunc (exec.c:4920)
==9758== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9758==
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9762-by-pythonnut-on-???
==9762== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9762-by-pythonnut-on-???
==9762== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9762-by-pythonnut-on-???
==9762==
==9762== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9762== don't want to do, unless you know exactly what you're doing,
==9762== or are doing some strange experiment):
==9762== /usr/lib/valgrind/../../bin/vgdb --pid=9762 ...command...
==9762==
==9762== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9762== /path/to/gdb ./zsh
==9762== and then give GDB the following command
==9762== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9762
==9762== --pid is optional if only one valgrind process is running
==9762==
--9762-- Caught __NR_exit; running __libc_freeres()
--9762-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9762==
==9762== HEAP SUMMARY:
==9762== in use at exit: 3,124,517 bytes in 69,163 blocks
==9762== total heap usage: 1,583,166 allocs, 1,514,003 frees, 127,705,186 bytes allocated
==9762==
==9762== Searching for pointers to 69,163 not-freed blocks
--9762-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9762-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9762-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9762-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9762-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9762-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9762-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9762-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9762-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9762-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9762-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9762-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9762-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9762-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9762-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9762-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9762-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9762-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9762-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9762-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9762-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9762-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9762-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9762-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9762-- Scanning root segment: 0x701a000..0x701afff (4096)
--9762-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9762-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9762-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9762-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9762-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9762-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9762-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9762-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9762-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9762-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9762== Checked 4,785,144 bytes
==9762==
==9762== LEAK SUMMARY:
==9762== definitely lost: 2,189 bytes in 12 blocks
==9762== indirectly lost: 6,756 bytes in 7 blocks
==9762== possibly lost: 0 bytes in 0 blocks
==9762== still reachable: 3,115,572 bytes in 69,144 blocks
==9762== suppressed: 0 bytes in 0 blocks
==9762== Rerun with --leak-check=full to see details of leaked memory
==9762==
==9762== Use --track-origins=yes to see where uninitialised values come from
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762==
==9762== 1 errors in context 1 of 2:
==9762== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9762== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9762== by 0x488CD0: stringsubst (subst.c:301)
==9762== by 0x48801B: prefork (subst.c:77)
==9762== by 0x42B318: execcmd (exec.c:2619)
==9762== by 0x428CA0: execpline2 (exec.c:1697)
==9762== by 0x427FD2: execpline (exec.c:1484)
==9762== by 0x427756: execlist (exec.c:1267)
==9762== by 0x42717C: execode (exec.c:1073)
==9762== by 0x431299: runshfunc (exec.c:5040)
==9762== by 0x430E76: doshfunc (exec.c:4920)
==9762== by 0x4302FB: execshfunc (exec.c:4557)
==9762== by 0x42D8C1: execcmd (exec.c:3373)
==9762==
==9762==
==9762== 2 errors in context 2 of 2:
==9762== Conditional jump or move depends on uninitialised value(s)
==9762== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9762== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9762== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9762== by 0x40EFC2: execbuiltin (builtin.c:450)
==9762== by 0x42D8E9: execcmd (exec.c:3378)
==9762== by 0x428CA0: execpline2 (exec.c:1697)
==9762== by 0x427FD2: execpline (exec.c:1484)
==9762== by 0x42779A: execlist (exec.c:1275)
==9762== by 0x42717C: execode (exec.c:1073)
==9762== by 0x431299: runshfunc (exec.c:5040)
==9762== by 0x430E76: doshfunc (exec.c:4920)
==9762== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9762==
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9763-- Caught __NR_exit; running __libc_freeres()
==9763== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9763-by-pythonnut-on-???
==9763== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9763-by-pythonnut-on-???
==9763== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9763-by-pythonnut-on-???
==9763==
==9763== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9763== don't want to do, unless you know exactly what you're doing,
==9763== or are doing some strange experiment):
==9763== /usr/lib/valgrind/../../bin/vgdb --pid=9763 ...command...
==9763==
==9763== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9763== /path/to/gdb ./zsh
==9763== and then give GDB the following command
==9763== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9763
==9763== --pid is optional if only one valgrind process is running
==9763==
--9763-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9763==
==9763== HEAP SUMMARY:
==9763== in use at exit: 3,124,613 bytes in 69,163 blocks
==9763== total heap usage: 1,583,182 allocs, 1,514,019 frees, 127,709,973 bytes allocated
==9763==
==9763== Searching for pointers to 69,163 not-freed blocks
--9763-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9763-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9763-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9763-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9763-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9763-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9763-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9763-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9763-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9763-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9763-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9763-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9763-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9763-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9763-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9763-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9763-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9763-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9763-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9763-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9763-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9763-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9763-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9763-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9763-- Scanning root segment: 0x701a000..0x701afff (4096)
--9763-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9763-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9763-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9763-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9763-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9763-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9763-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9763-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9763-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9763-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9763== Checked 4,784,424 bytes
==9763==
==9763== LEAK SUMMARY:
==9763== definitely lost: 2,189 bytes in 12 blocks
==9763== indirectly lost: 6,756 bytes in 7 blocks
==9763== possibly lost: 0 bytes in 0 blocks
==9763== still reachable: 3,115,668 bytes in 69,144 blocks
==9763== suppressed: 0 bytes in 0 blocks
==9763== Rerun with --leak-check=full to see details of leaked memory
==9763==
==9763== Use --track-origins=yes to see where uninitialised values come from
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9763==
==9763== 1 errors in context 1 of 2:
==9763== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9763== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9763== by 0x488CD0: stringsubst (subst.c:301)
==9763== by 0x48801B: prefork (subst.c:77)
==9763== by 0x42B318: execcmd (exec.c:2619)
==9763== by 0x428CA0: execpline2 (exec.c:1697)
==9763== by 0x427FD2: execpline (exec.c:1484)
==9763== by 0x427756: execlist (exec.c:1267)
==9763== by 0x42717C: execode (exec.c:1073)
==9763== by 0x431299: runshfunc (exec.c:5040)
==9763== by 0x430E76: doshfunc (exec.c:4920)
==9763== by 0x4302FB: execshfunc (exec.c:4557)
==9763== by 0x42D8C1: execcmd (exec.c:3373)
==9763==
==9763==
==9763== 2 errors in context 2 of 2:
==9763== Conditional jump or move depends on uninitialised value(s)
==9763== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9763== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9763== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9763== by 0x40EFC2: execbuiltin (builtin.c:450)
==9763== by 0x42D8E9: execcmd (exec.c:3378)
==9763== by 0x428CA0: execpline2 (exec.c:1697)
==9763== by 0x427FD2: execpline (exec.c:1484)
==9763== by 0x42779A: execlist (exec.c:1275)
==9763== by 0x42717C: execode (exec.c:1073)
==9763== by 0x431299: runshfunc (exec.c:5040)
==9763== by 0x430E76: doshfunc (exec.c:4920)
==9763== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9763==
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9766-by-pythonnut-on-???
==9766== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9766-by-pythonnut-on-???
==9766== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9766-by-pythonnut-on-???
==9766==
==9766== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9766== don't want to do, unless you know exactly what you're doing,
==9766== or are doing some strange experiment):
==9766== /usr/lib/valgrind/../../bin/vgdb --pid=9766 ...command...
==9766==
==9766== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9766== /path/to/gdb ./zsh
==9766== and then give GDB the following command
==9766== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9766
==9766== --pid is optional if only one valgrind process is running
==9766==
--9766-- Caught __NR_exit; running __libc_freeres()
--9766-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9766==
==9766== HEAP SUMMARY:
==9766== in use at exit: 3,124,859 bytes in 69,169 blocks
==9766== total heap usage: 1,583,230 allocs, 1,514,061 frees, 127,718,997 bytes allocated
==9766==
==9766== Searching for pointers to 69,169 not-freed blocks
--9766-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9766-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9766-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9766-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9766-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9766-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9766-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9766-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9766-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9766-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9766-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9766-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9766-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9766-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9766-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9766-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9766-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9766-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9766-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9766-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9766-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9766-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9766-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9766-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9766-- Scanning root segment: 0x701a000..0x701afff (4096)
--9766-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9766-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9766-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9766-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9766-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9766-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9766-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9766-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9766-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9766-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9766== Checked 4,784,584 bytes
==9766==
==9766== LEAK SUMMARY:
==9766== definitely lost: 2,189 bytes in 12 blocks
==9766== indirectly lost: 6,756 bytes in 7 blocks
==9766== possibly lost: 0 bytes in 0 blocks
==9766== still reachable: 3,115,914 bytes in 69,150 blocks
==9766== suppressed: 0 bytes in 0 blocks
==9766== Rerun with --leak-check=full to see details of leaked memory
==9766==
==9766== Use --track-origins=yes to see where uninitialised values come from
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766==
==9766== 1 errors in context 1 of 2:
==9766== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9766== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9766== by 0x488CD0: stringsubst (subst.c:301)
==9766== by 0x48801B: prefork (subst.c:77)
==9766== by 0x42B318: execcmd (exec.c:2619)
==9766== by 0x428CA0: execpline2 (exec.c:1697)
==9766== by 0x427FD2: execpline (exec.c:1484)
==9766== by 0x427756: execlist (exec.c:1267)
==9766== by 0x42717C: execode (exec.c:1073)
==9766== by 0x431299: runshfunc (exec.c:5040)
==9766== by 0x430E76: doshfunc (exec.c:4920)
==9766== by 0x4302FB: execshfunc (exec.c:4557)
==9766== by 0x42D8C1: execcmd (exec.c:3373)
==9766==
==9766==
==9766== 2 errors in context 2 of 2:
==9766== Conditional jump or move depends on uninitialised value(s)
==9766== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9766== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9766== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9766== by 0x40EFC2: execbuiltin (builtin.c:450)
==9766== by 0x42D8E9: execcmd (exec.c:3378)
==9766== by 0x428CA0: execpline2 (exec.c:1697)
==9766== by 0x427FD2: execpline (exec.c:1484)
==9766== by 0x42779A: execlist (exec.c:1275)
==9766== by 0x42717C: execode (exec.c:1073)
==9766== by 0x431299: runshfunc (exec.c:5040)
==9766== by 0x430E76: doshfunc (exec.c:4920)
==9766== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9766==
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9767-- Caught __NR_exit; running __libc_freeres()
==9767== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9767-by-pythonnut-on-???
==9767== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9767-by-pythonnut-on-???
==9767== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9767-by-pythonnut-on-???
==9767==
==9767== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9767== don't want to do, unless you know exactly what you're doing,
==9767== or are doing some strange experiment):
==9767== /usr/lib/valgrind/../../bin/vgdb --pid=9767 ...command...
==9767==
==9767== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9767== /path/to/gdb ./zsh
==9767== and then give GDB the following command
==9767== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9767
==9767== --pid is optional if only one valgrind process is running
==9767==
--9767-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9767==
==9767== HEAP SUMMARY:
==9767== in use at exit: 3,124,795 bytes in 69,169 blocks
==9767== total heap usage: 1,583,210 allocs, 1,514,041 frees, 127,716,767 bytes allocated
==9767==
==9767== Searching for pointers to 69,169 not-freed blocks
--9767-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9767-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9767-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9767-- Scanning root segment: 0x4037000..0x403afff (16384)
--9767-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9767-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9767-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9767-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9767-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9767-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9767-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9767-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9767-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9767-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9767-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9767-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9767-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9767-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9767-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9767-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9767-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9767-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9767-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9767-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9767-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9767-- Scanning root segment: 0x701a000..0x701afff (4096)
--9767-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9767-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9767-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9767-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9767-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9767-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9767-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9767-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9767-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9767-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9767== Checked 4,800,904 bytes
==9767==
==9767== LEAK SUMMARY:
==9767== definitely lost: 2,189 bytes in 12 blocks
==9767== indirectly lost: 6,756 bytes in 7 blocks
==9767== possibly lost: 0 bytes in 0 blocks
==9767== still reachable: 3,115,850 bytes in 69,150 blocks
==9767== suppressed: 0 bytes in 0 blocks
==9767== Rerun with --leak-check=full to see details of leaked memory
==9767==
==9767== Use --track-origins=yes to see where uninitialised values come from
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9767==
==9767== 1 errors in context 1 of 2:
==9767== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9767== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9767== by 0x488CD0: stringsubst (subst.c:301)
==9767== by 0x48801B: prefork (subst.c:77)
==9767== by 0x42B318: execcmd (exec.c:2619)
==9767== by 0x428CA0: execpline2 (exec.c:1697)
==9767== by 0x427FD2: execpline (exec.c:1484)
==9767== by 0x427756: execlist (exec.c:1267)
==9767== by 0x42717C: execode (exec.c:1073)
==9767== by 0x431299: runshfunc (exec.c:5040)
==9767== by 0x430E76: doshfunc (exec.c:4920)
==9767== by 0x4302FB: execshfunc (exec.c:4557)
==9767== by 0x42D8C1: execcmd (exec.c:3373)
==9767==
==9767==
==9767== 2 errors in context 2 of 2:
==9767== Conditional jump or move depends on uninitialised value(s)
==9767== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9767== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9767== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9767== by 0x40EFC2: execbuiltin (builtin.c:450)
==9767== by 0x42D8E9: execcmd (exec.c:3378)
==9767== by 0x428CA0: execpline2 (exec.c:1697)
==9767== by 0x427FD2: execpline (exec.c:1484)
==9767== by 0x42779A: execlist (exec.c:1275)
==9767== by 0x42717C: execode (exec.c:1073)
==9767== by 0x431299: runshfunc (exec.c:5040)
==9767== by 0x430E76: doshfunc (exec.c:4920)
==9767== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9767==
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9769-by-pythonnut-on-???
==9769== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9769-by-pythonnut-on-???
==9769== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9769-by-pythonnut-on-???
==9769==
==9769== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9769== don't want to do, unless you know exactly what you're doing,
==9769== or are doing some strange experiment):
==9769== /usr/lib/valgrind/../../bin/vgdb --pid=9769 ...command...
==9769==
==9769== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9769== /path/to/gdb ./zsh
==9769== and then give GDB the following command
==9769== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9769
==9769== --pid is optional if only one valgrind process is running
==9769==
--9769-- Caught __NR_exit; running __libc_freeres()
--9769-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9769==
==9769== HEAP SUMMARY:
==9769== in use at exit: 3,124,833 bytes in 69,170 blocks
==9769== total heap usage: 1,583,223 allocs, 1,514,053 frees, 127,719,464 bytes allocated
==9769==
==9769== Searching for pointers to 69,170 not-freed blocks
--9769-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9769-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9769-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9769-- Scanning root segment: 0x4037000..0x403afff (16384)
--9769-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9769-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9769-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9769-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9769-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9769-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9769-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9769-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9769-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9769-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9769-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9769-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9769-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9769-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9769-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9769-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9769-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9769-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9769-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9769-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9769-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9769-- Scanning root segment: 0x701a000..0x701afff (4096)
--9769-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9769-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9769-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9769-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9769-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9769-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9769-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9769-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9769-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9769-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9769== Checked 4,800,424 bytes
==9769==
==9769== LEAK SUMMARY:
==9769== definitely lost: 2,189 bytes in 12 blocks
==9769== indirectly lost: 6,756 bytes in 7 blocks
==9769== possibly lost: 0 bytes in 0 blocks
==9769== still reachable: 3,115,888 bytes in 69,151 blocks
==9769== suppressed: 0 bytes in 0 blocks
==9769== Rerun with --leak-check=full to see details of leaked memory
==9769==
==9769== Use --track-origins=yes to see where uninitialised values come from
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769==
==9769== 1 errors in context 1 of 2:
==9769== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9769== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9769== by 0x488CD0: stringsubst (subst.c:301)
==9769== by 0x48801B: prefork (subst.c:77)
==9769== by 0x42B318: execcmd (exec.c:2619)
==9769== by 0x428CA0: execpline2 (exec.c:1697)
==9769== by 0x427FD2: execpline (exec.c:1484)
==9769== by 0x427756: execlist (exec.c:1267)
==9769== by 0x42717C: execode (exec.c:1073)
==9769== by 0x431299: runshfunc (exec.c:5040)
==9769== by 0x430E76: doshfunc (exec.c:4920)
==9769== by 0x4302FB: execshfunc (exec.c:4557)
==9769== by 0x42D8C1: execcmd (exec.c:3373)
==9769==
==9769==
==9769== 2 errors in context 2 of 2:
==9769== Conditional jump or move depends on uninitialised value(s)
==9769== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9769== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9769== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9769== by 0x40EFC2: execbuiltin (builtin.c:450)
==9769== by 0x42D8E9: execcmd (exec.c:3378)
==9769== by 0x428CA0: execpline2 (exec.c:1697)
==9769== by 0x427FD2: execpline (exec.c:1484)
==9769== by 0x42779A: execlist (exec.c:1275)
==9769== by 0x42717C: execode (exec.c:1073)
==9769== by 0x431299: runshfunc (exec.c:5040)
==9769== by 0x430E76: doshfunc (exec.c:4920)
==9769== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9769==
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9770-by-pythonnut-on-???
==9770== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9770-by-pythonnut-on-???
==9770== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9770-by-pythonnut-on-???
==9770==
==9770== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9770== don't want to do, unless you know exactly what you're doing,
==9770== or are doing some strange experiment):
==9770== /usr/lib/valgrind/../../bin/vgdb --pid=9770 ...command...
==9770==
==9770== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9770== /path/to/gdb ./zsh
==9770== and then give GDB the following command
==9770== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9770
==9770== --pid is optional if only one valgrind process is running
==9770==
--9770-- Caught __NR_exit; running __libc_freeres()
--9770-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9770==
==9770== HEAP SUMMARY:
==9770== in use at exit: 3,124,052 bytes in 69,171 blocks
==9770== total heap usage: 1,584,533 allocs, 1,515,362 frees, 127,789,264 bytes allocated
==9770==
==9770== Searching for pointers to 69,171 not-freed blocks
--9770-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9770-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9770-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9770-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9770-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9770-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9770-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9770-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9770-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9770-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9770-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9770-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9770-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9770-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9770-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9770-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9770-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9770-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9770-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9770-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9770-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9770-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9770-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9770-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9770-- Scanning root segment: 0x701a000..0x701afff (4096)
--9770-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9770-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9770-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9770-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9770-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9770-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9770-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9770-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9770-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9770-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9770== Checked 4,785,920 bytes
==9770==
==9770== LEAK SUMMARY:
==9770== definitely lost: 2,189 bytes in 12 blocks
==9770== indirectly lost: 6,756 bytes in 7 blocks
==9770== possibly lost: 0 bytes in 0 blocks
==9770== still reachable: 3,115,107 bytes in 69,152 blocks
==9770== suppressed: 0 bytes in 0 blocks
==9770== Rerun with --leak-check=full to see details of leaked memory
==9770==
==9770== Use --track-origins=yes to see where uninitialised values come from
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770==
==9770== 1 errors in context 1 of 2:
==9770== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9770== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9770== by 0x488CD0: stringsubst (subst.c:301)
==9770== by 0x48801B: prefork (subst.c:77)
==9770== by 0x42B318: execcmd (exec.c:2619)
==9770== by 0x428CA0: execpline2 (exec.c:1697)
==9770== by 0x427FD2: execpline (exec.c:1484)
==9770== by 0x427756: execlist (exec.c:1267)
==9770== by 0x42717C: execode (exec.c:1073)
==9770== by 0x431299: runshfunc (exec.c:5040)
==9770== by 0x430E76: doshfunc (exec.c:4920)
==9770== by 0x4302FB: execshfunc (exec.c:4557)
==9770== by 0x42D8C1: execcmd (exec.c:3373)
==9770==
==9770==
==9770== 2 errors in context 2 of 2:
==9770== Conditional jump or move depends on uninitialised value(s)
==9770== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9770== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9770== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9770== by 0x40EFC2: execbuiltin (builtin.c:450)
==9770== by 0x42D8E9: execcmd (exec.c:3378)
==9770== by 0x428CA0: execpline2 (exec.c:1697)
==9770== by 0x427FD2: execpline (exec.c:1484)
==9770== by 0x42779A: execlist (exec.c:1275)
==9770== by 0x42717C: execode (exec.c:1073)
==9770== by 0x431299: runshfunc (exec.c:5040)
==9770== by 0x430E76: doshfunc (exec.c:4920)
==9770== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9770==
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9771-- Caught __NR_exit; running __libc_freeres()
==9771== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9771-by-pythonnut-on-???
==9771== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9771-by-pythonnut-on-???
==9771== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9771-by-pythonnut-on-???
==9771==
==9771== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9771== don't want to do, unless you know exactly what you're doing,
==9771== or are doing some strange experiment):
==9771== /usr/lib/valgrind/../../bin/vgdb --pid=9771 ...command...
==9771==
==9771== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9771== /path/to/gdb ./zsh
==9771== and then give GDB the following command
==9771== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9771
==9771== --pid is optional if only one valgrind process is running
==9771==
--9771-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9771==
==9771== HEAP SUMMARY:
==9771== in use at exit: 3,124,116 bytes in 69,171 blocks
==9771== total heap usage: 1,584,539 allocs, 1,515,368 frees, 127,797,840 bytes allocated
==9771==
==9771== Searching for pointers to 69,171 not-freed blocks
--9771-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9771-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9771-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9771-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9771-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9771-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9771-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9771-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9771-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9771-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9771-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9771-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9771-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9771-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9771-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9771-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9771-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9771-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9771-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9771-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9771-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9771-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9771-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9771-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9771-- Scanning root segment: 0x701a000..0x701afff (4096)
--9771-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9771-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9771-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9771-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9771-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9771-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9771-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9771-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9771-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9771-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9771== Checked 4,788,016 bytes
==9771==
==9771== LEAK SUMMARY:
==9771== definitely lost: 2,189 bytes in 12 blocks
==9771== indirectly lost: 6,756 bytes in 7 blocks
==9771== possibly lost: 0 bytes in 0 blocks
==9771== still reachable: 3,115,171 bytes in 69,152 blocks
==9771== suppressed: 0 bytes in 0 blocks
==9771== Rerun with --leak-check=full to see details of leaked memory
==9771==
==9771== Use --track-origins=yes to see where uninitialised values come from
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9771==
==9771== 1 errors in context 1 of 2:
==9771== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9771== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9771== by 0x488CD0: stringsubst (subst.c:301)
==9771== by 0x48801B: prefork (subst.c:77)
==9771== by 0x42B318: execcmd (exec.c:2619)
==9771== by 0x428CA0: execpline2 (exec.c:1697)
==9771== by 0x427FD2: execpline (exec.c:1484)
==9771== by 0x427756: execlist (exec.c:1267)
==9771== by 0x42717C: execode (exec.c:1073)
==9771== by 0x431299: runshfunc (exec.c:5040)
==9771== by 0x430E76: doshfunc (exec.c:4920)
==9771== by 0x4302FB: execshfunc (exec.c:4557)
==9771== by 0x42D8C1: execcmd (exec.c:3373)
==9771==
==9771==
==9771== 2 errors in context 2 of 2:
==9771== Conditional jump or move depends on uninitialised value(s)
==9771== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9771== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9771== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9771== by 0x40EFC2: execbuiltin (builtin.c:450)
==9771== by 0x42D8E9: execcmd (exec.c:3378)
==9771== by 0x428CA0: execpline2 (exec.c:1697)
==9771== by 0x427FD2: execpline (exec.c:1484)
==9771== by 0x42779A: execlist (exec.c:1275)
==9771== by 0x42717C: execode (exec.c:1073)
==9771== by 0x431299: runshfunc (exec.c:5040)
==9771== by 0x430E76: doshfunc (exec.c:4920)
==9771== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9771==
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9772-by-pythonnut-on-???
==9772== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9772-by-pythonnut-on-???
==9772== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9772-by-pythonnut-on-???
==9772==
==9772== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9772== don't want to do, unless you know exactly what you're doing,
==9772== or are doing some strange experiment):
==9772== /usr/lib/valgrind/../../bin/vgdb --pid=9772 ...command...
==9772==
==9772== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9772== /path/to/gdb ./zsh
==9772== and then give GDB the following command
==9772== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9772
==9772== --pid is optional if only one valgrind process is running
==9772==
==9773== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9773-by-pythonnut-on-???
==9773== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9773-by-pythonnut-on-???
==9773== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9773-by-pythonnut-on-???
==9773==
==9773== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9773== don't want to do, unless you know exactly what you're doing,
==9773== or are doing some strange experiment):
==9773== /usr/lib/valgrind/../../bin/vgdb --pid=9773 ...command...
==9773==
==9773== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9773== /path/to/gdb ./zsh
==9773== and then give GDB the following command
==9773== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9773
==9773== --pid is optional if only one valgrind process is running
==9773==
==9776== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9776-by-pythonnut-on-???
==9776== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9776-by-pythonnut-on-???
==9776== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9776-by-pythonnut-on-???
==9776==
==9776== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9776== don't want to do, unless you know exactly what you're doing,
==9776== or are doing some strange experiment):
==9776== /usr/lib/valgrind/../../bin/vgdb --pid=9776 ...command...
==9776==
==9776== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9776== /path/to/gdb ./zsh
==9776== and then give GDB the following command
==9776== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9776
==9776== --pid is optional if only one valgrind process is running
==9776==
client request: code 4d430005, addr 0xFFEFE9C1C, len 4
--9776-- Caught __NR_exit; running __libc_freeres()
--9776-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9776==
==9776== HEAP SUMMARY:
==9776== in use at exit: 3,127,929 bytes in 69,238 blocks
==9776== total heap usage: 1,584,700 allocs, 1,515,462 frees, 127,827,154 bytes allocated
==9776==
==9776== Searching for pointers to 69,238 not-freed blocks
--9776-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9776-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9776-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9776-- Scanning root segment: 0x4037000..0x403afff (16384)
--9776-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9776-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9776-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9776-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9776-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9776-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9776-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9776-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9776-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9776-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9776-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9776-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9776-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9776-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9776-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9776-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9776-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9776-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9776-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9776-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9776-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9776-- Scanning root segment: 0x701a000..0x701afff (4096)
--9776-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9776-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9776-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9776-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9776-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9776-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9776-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9776-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9776-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9776-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9776== Checked 4,810,576 bytes
==9776==
==9776== LEAK SUMMARY:
==9776== definitely lost: 2,189 bytes in 12 blocks
==9776== indirectly lost: 6,756 bytes in 7 blocks
==9776== possibly lost: 0 bytes in 0 blocks
==9776== still reachable: 3,118,984 bytes in 69,219 blocks
==9776== suppressed: 0 bytes in 0 blocks
==9776== Rerun with --leak-check=full to see details of leaked memory
==9776==
==9776== Use --track-origins=yes to see where uninitialised values come from
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9776==
==9776== 1 errors in context 1 of 2:
==9776== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9776== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9776== by 0x488CD0: stringsubst (subst.c:301)
==9776== by 0x48801B: prefork (subst.c:77)
==9776== by 0x42B318: execcmd (exec.c:2619)
==9776== by 0x428CA0: execpline2 (exec.c:1697)
==9776== by 0x427FD2: execpline (exec.c:1484)
==9776== by 0x427756: execlist (exec.c:1267)
==9776== by 0x42717C: execode (exec.c:1073)
==9776== by 0x431299: runshfunc (exec.c:5040)
==9776== by 0x430E76: doshfunc (exec.c:4920)
==9776== by 0x4302FB: execshfunc (exec.c:4557)
==9776== by 0x42D8C1: execcmd (exec.c:3373)
==9776==
==9776==
==9776== 2 errors in context 2 of 2:
==9776== Conditional jump or move depends on uninitialised value(s)
==9776== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9776== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9776== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9776== by 0x40EFC2: execbuiltin (builtin.c:450)
==9776== by 0x42D8E9: execcmd (exec.c:3378)
==9776== by 0x428CA0: execpline2 (exec.c:1697)
==9776== by 0x427FD2: execpline (exec.c:1484)
==9776== by 0x42779A: execlist (exec.c:1275)
==9776== by 0x42717C: execode (exec.c:1073)
==9776== by 0x431299: runshfunc (exec.c:5040)
==9776== by 0x430E76: doshfunc (exec.c:4920)
==9776== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9776==
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9779-- Caught __NR_exit; running __libc_freeres()
==9779== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9779-by-pythonnut-on-???
==9779== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9779-by-pythonnut-on-???
==9779== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9779-by-pythonnut-on-???
==9779==
==9779== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9779== don't want to do, unless you know exactly what you're doing,
==9779== or are doing some strange experiment):
==9779== /usr/lib/valgrind/../../bin/vgdb --pid=9779 ...command...
==9779==
==9779== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9779== /path/to/gdb ./zsh
==9779== and then give GDB the following command
==9779== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9779
==9779== --pid is optional if only one valgrind process is running
==9779==
==9780== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9780-by-pythonnut-on-???
==9780== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9780-by-pythonnut-on-???
==9780== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9780-by-pythonnut-on-???
==9780==
==9780== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9780== don't want to do, unless you know exactly what you're doing,
==9780== or are doing some strange experiment):
==9780== /usr/lib/valgrind/../../bin/vgdb --pid=9780 ...command...
==9780==
==9780== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9780== /path/to/gdb ./zsh
==9780== and then give GDB the following command
==9780== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9780
==9780== --pid is optional if only one valgrind process is running
==9780==
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9779-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9779==
==9779== HEAP SUMMARY:
==9779== in use at exit: 3,164,796 bytes in 69,245 blocks
==9779== total heap usage: 1,584,707 allocs, 1,515,462 frees, 127,867,077 bytes allocated
==9779==
==9779== Searching for pointers to 69,245 not-freed blocks
--9779-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9779-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9779-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9779-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9779-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9779-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9779-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9779-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9779-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9779-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9779-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9779-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9779-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9779-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9779-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9779-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9779-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9779-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9779-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9779-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9779-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9779-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9779-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9779-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9779-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9779-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9779-- Scanning root segment: 0x701a000..0x701afff (4096)
--9779-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9779-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9779-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9779-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9779-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9779-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9779-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9779-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9779-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9779-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9779== Checked 4,922,392 bytes
==9779==
==9779== LEAK SUMMARY:
==9779== definitely lost: 2,189 bytes in 12 blocks
==9779== indirectly lost: 6,756 bytes in 7 blocks
==9779== possibly lost: 0 bytes in 0 blocks
==9779== still reachable: 3,155,851 bytes in 69,226 blocks
==9779== suppressed: 0 bytes in 0 blocks
==9779== Rerun with --leak-check=full to see details of leaked memory
==9779==
==9779== Use --track-origins=yes to see where uninitialised values come from
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9779==
==9779== 1 errors in context 1 of 2:
==9779== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9779== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9779== by 0x488CD0: stringsubst (subst.c:301)
==9779== by 0x48801B: prefork (subst.c:77)
==9779== by 0x42B318: execcmd (exec.c:2619)
==9779== by 0x428CA0: execpline2 (exec.c:1697)
==9779== by 0x427FD2: execpline (exec.c:1484)
==9779== by 0x427756: execlist (exec.c:1267)
==9779== by 0x42717C: execode (exec.c:1073)
==9779== by 0x431299: runshfunc (exec.c:5040)
==9779== by 0x430E76: doshfunc (exec.c:4920)
==9779== by 0x4302FB: execshfunc (exec.c:4557)
==9779== by 0x42D8C1: execcmd (exec.c:3373)
==9779==
==9779==
==9779== 2 errors in context 2 of 2:
==9779== Conditional jump or move depends on uninitialised value(s)
==9779== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9779== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9779== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9779== by 0x40EFC2: execbuiltin (builtin.c:450)
==9779== by 0x42D8E9: execcmd (exec.c:3378)
==9779== by 0x428CA0: execpline2 (exec.c:1697)
==9779== by 0x427FD2: execpline (exec.c:1484)
==9779== by 0x42779A: execlist (exec.c:1275)
==9779== by 0x42717C: execode (exec.c:1073)
==9779== by 0x431299: runshfunc (exec.c:5040)
==9779== by 0x430E76: doshfunc (exec.c:4920)
==9779== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9779==
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9778-by-pythonnut-on-???
==9778== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9778-by-pythonnut-on-???
==9778== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9778-by-pythonnut-on-???
==9778==
==9778== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9778== don't want to do, unless you know exactly what you're doing,
==9778== or are doing some strange experiment):
==9778== /usr/lib/valgrind/../../bin/vgdb --pid=9778 ...command...
==9778==
==9778== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9778== /path/to/gdb ./zsh
==9778== and then give GDB the following command
==9778== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9778
==9778== --pid is optional if only one valgrind process is running
==9778==
--9778-- Caught __NR_exit; running __libc_freeres()
--9778-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9778==
==9778== HEAP SUMMARY:
==9778== in use at exit: 3,164,764 bytes in 69,242 blocks
==9778== total heap usage: 1,584,710 allocs, 1,515,468 frees, 127,867,685 bytes allocated
==9778==
==9778== Searching for pointers to 69,242 not-freed blocks
--9778-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9778-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9778-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9778-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9778-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9778-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9778-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9778-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9778-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9778-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9778-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9778-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9778-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9778-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9778-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9778-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9778-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9778-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9778-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9778-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9778-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9778-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9778-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9778-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9778-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9778-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9778-- Scanning root segment: 0x701a000..0x701afff (4096)
--9778-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9778-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9778-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9778-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9778-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9778-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9778-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9778-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9778-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9778-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9778== Checked 4,921,720 bytes
==9778==
==9778== LEAK SUMMARY:
==9778== definitely lost: 2,189 bytes in 12 blocks
==9778== indirectly lost: 6,756 bytes in 7 blocks
==9778== possibly lost: 0 bytes in 0 blocks
==9778== still reachable: 3,155,819 bytes in 69,223 blocks
==9778== suppressed: 0 bytes in 0 blocks
==9778== Rerun with --leak-check=full to see details of leaked memory
==9778==
==9778== Use --track-origins=yes to see where uninitialised values come from
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778==
==9778== 1 errors in context 1 of 2:
==9778== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9778== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9778== by 0x488CD0: stringsubst (subst.c:301)
==9778== by 0x48801B: prefork (subst.c:77)
==9778== by 0x42B318: execcmd (exec.c:2619)
==9778== by 0x428CA0: execpline2 (exec.c:1697)
==9778== by 0x427FD2: execpline (exec.c:1484)
==9778== by 0x427756: execlist (exec.c:1267)
==9778== by 0x42717C: execode (exec.c:1073)
==9778== by 0x431299: runshfunc (exec.c:5040)
==9778== by 0x430E76: doshfunc (exec.c:4920)
==9778== by 0x4302FB: execshfunc (exec.c:4557)
==9778== by 0x42D8C1: execcmd (exec.c:3373)
==9778==
==9778==
==9778== 2 errors in context 2 of 2:
==9778== Conditional jump or move depends on uninitialised value(s)
==9778== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9778== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9778== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9778== by 0x40EFC2: execbuiltin (builtin.c:450)
==9778== by 0x42D8E9: execcmd (exec.c:3378)
==9778== by 0x428CA0: execpline2 (exec.c:1697)
==9778== by 0x427FD2: execpline (exec.c:1484)
==9778== by 0x42779A: execlist (exec.c:1275)
==9778== by 0x42717C: execode (exec.c:1073)
==9778== by 0x431299: runshfunc (exec.c:5040)
==9778== by 0x430E76: doshfunc (exec.c:4920)
==9778== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9778==
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9781-by-pythonnut-on-???
==9781== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9781-by-pythonnut-on-???
==9781== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9781-by-pythonnut-on-???
==9781==
==9781== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9781== don't want to do, unless you know exactly what you're doing,
==9781== or are doing some strange experiment):
==9781== /usr/lib/valgrind/../../bin/vgdb --pid=9781 ...command...
==9781==
==9781== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9781== /path/to/gdb ./zsh
==9781== and then give GDB the following command
==9781== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9781
==9781== --pid is optional if only one valgrind process is running
==9781==
==9782== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9782-by-pythonnut-on-???
==9782== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9782-by-pythonnut-on-???
==9782== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9782-by-pythonnut-on-???
==9782==
==9782== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9782== don't want to do, unless you know exactly what you're doing,
==9782== or are doing some strange experiment):
==9782== /usr/lib/valgrind/../../bin/vgdb --pid=9782 ...command...
==9782==
==9782== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9782== /path/to/gdb ./zsh
==9782== and then give GDB the following command
==9782== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9782
==9782== --pid is optional if only one valgrind process is running
==9782==
--9782-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--9782-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9782==
==9782== HEAP SUMMARY:
==9782== in use at exit: 3,201,478 bytes in 69,248 blocks
==9782== total heap usage: 1,584,716 allocs, 1,515,468 frees, 127,905,912 bytes allocated
==9782==
==9782== Searching for pointers to 69,248 not-freed blocks
--9782-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9782-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9782-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9782-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9782-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9782-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9782-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9782-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9782-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9782-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9782-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9782-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9782-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9782-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9782-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9782-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9782-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9782-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9782-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9782-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9782-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9782-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9782-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9782-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9782-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9782-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9782-- Scanning root segment: 0x701a000..0x701afff (4096)
--9782-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9782-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9782-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9782-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9782-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9782-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9782-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9782-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9782-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9782-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9782== Checked 4,995,912 bytes
==9782==
==9782== LEAK SUMMARY:
==9782== definitely lost: 2,189 bytes in 12 blocks
==9782== indirectly lost: 6,756 bytes in 7 blocks
==9782== possibly lost: 0 bytes in 0 blocks
==9782== still reachable: 3,192,533 bytes in 69,229 blocks
==9782== suppressed: 0 bytes in 0 blocks
==9782== Rerun with --leak-check=full to see details of leaked memory
==9782==
==9782== Use --track-origins=yes to see where uninitialised values come from
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9782==
==9782== 1 errors in context 1 of 2:
==9782== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9782== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9782== by 0x488CD0: stringsubst (subst.c:301)
==9782== by 0x48801B: prefork (subst.c:77)
==9782== by 0x42B318: execcmd (exec.c:2619)
==9782== by 0x428CA0: execpline2 (exec.c:1697)
==9782== by 0x427FD2: execpline (exec.c:1484)
==9782== by 0x427756: execlist (exec.c:1267)
==9782== by 0x42717C: execode (exec.c:1073)
==9782== by 0x431299: runshfunc (exec.c:5040)
==9782== by 0x430E76: doshfunc (exec.c:4920)
==9782== by 0x4302FB: execshfunc (exec.c:4557)
==9782== by 0x42D8C1: execcmd (exec.c:3373)
==9782==
==9782==
==9782== 2 errors in context 2 of 2:
==9782== Conditional jump or move depends on uninitialised value(s)
==9782== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9782== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9782== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9782== by 0x40EFC2: execbuiltin (builtin.c:450)
==9782== by 0x42D8E9: execcmd (exec.c:3378)
==9782== by 0x428CA0: execpline2 (exec.c:1697)
==9782== by 0x427FD2: execpline (exec.c:1484)
==9782== by 0x42779A: execlist (exec.c:1275)
==9782== by 0x42717C: execode (exec.c:1073)
==9782== by 0x431299: runshfunc (exec.c:5040)
==9782== by 0x430E76: doshfunc (exec.c:4920)
==9782== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9782==
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9781-- Caught __NR_exit; running __libc_freeres()
--9781-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9781==
==9781== HEAP SUMMARY:
==9781== in use at exit: 3,164,838 bytes in 69,245 blocks
==9781== total heap usage: 1,584,719 allocs, 1,515,474 frees, 127,906,488 bytes allocated
==9781==
==9781== Searching for pointers to 69,245 not-freed blocks
--9781-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9781-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9781-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9781-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9781-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9781-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9781-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9781-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9781-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9781-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9781-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9781-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9781-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9781-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9781-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9781-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9781-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9781-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9781-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9781-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9781-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9781-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9781-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9781-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9781-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9781-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9781-- Scanning root segment: 0x701a000..0x701afff (4096)
--9781-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9781-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9781-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9781-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9781-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9781-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9781-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9781-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9781-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9781-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9781== Checked 4,958,648 bytes
==9781==
==9781== LEAK SUMMARY:
==9781== definitely lost: 2,189 bytes in 12 blocks
==9781== indirectly lost: 6,756 bytes in 7 blocks
==9781== possibly lost: 0 bytes in 0 blocks
==9781== still reachable: 3,155,893 bytes in 69,226 blocks
==9781== suppressed: 0 bytes in 0 blocks
==9781== Rerun with --leak-check=full to see details of leaked memory
==9781==
==9781== Use --track-origins=yes to see where uninitialised values come from
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781==
==9781== 1 errors in context 1 of 2:
==9781== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9781== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9781== by 0x488CD0: stringsubst (subst.c:301)
==9781== by 0x48801B: prefork (subst.c:77)
==9781== by 0x42B318: execcmd (exec.c:2619)
==9781== by 0x428CA0: execpline2 (exec.c:1697)
==9781== by 0x427FD2: execpline (exec.c:1484)
==9781== by 0x427756: execlist (exec.c:1267)
==9781== by 0x42717C: execode (exec.c:1073)
==9781== by 0x431299: runshfunc (exec.c:5040)
==9781== by 0x430E76: doshfunc (exec.c:4920)
==9781== by 0x4302FB: execshfunc (exec.c:4557)
==9781== by 0x42D8C1: execcmd (exec.c:3373)
==9781==
==9781==
==9781== 2 errors in context 2 of 2:
==9781== Conditional jump or move depends on uninitialised value(s)
==9781== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9781== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9781== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9781== by 0x40EFC2: execbuiltin (builtin.c:450)
==9781== by 0x42D8E9: execcmd (exec.c:3378)
==9781== by 0x428CA0: execpline2 (exec.c:1697)
==9781== by 0x427FD2: execpline (exec.c:1484)
==9781== by 0x42779A: execlist (exec.c:1275)
==9781== by 0x42717C: execode (exec.c:1073)
==9781== by 0x431299: runshfunc (exec.c:5040)
==9781== by 0x430E76: doshfunc (exec.c:4920)
==9781== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9781==
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9784-by-pythonnut-on-???
==9784== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9784-by-pythonnut-on-???
==9784== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9784-by-pythonnut-on-???
==9784==
==9784== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9784== don't want to do, unless you know exactly what you're doing,
==9784== or are doing some strange experiment):
==9784== /usr/lib/valgrind/../../bin/vgdb --pid=9784 ...command...
==9784==
==9784== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9784== /path/to/gdb ./zsh
==9784== and then give GDB the following command
==9784== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9784
==9784== --pid is optional if only one valgrind process is running
==9784==
--9785-- Caught __NR_exit; running __libc_freeres()
==9785== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9785-by-pythonnut-on-???
==9785== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9785-by-pythonnut-on-???
==9785== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9785-by-pythonnut-on-???
==9785==
==9785== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9785== don't want to do, unless you know exactly what you're doing,
==9785== or are doing some strange experiment):
==9785== /usr/lib/valgrind/../../bin/vgdb --pid=9785 ...command...
==9785==
==9785== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9785== /path/to/gdb ./zsh
==9785== and then give GDB the following command
==9785== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9785
==9785== --pid is optional if only one valgrind process is running
==9785==
--9785-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9785==
==9785== HEAP SUMMARY:
==9785== in use at exit: 3,165,694 bytes in 69,251 blocks
==9785== total heap usage: 1,584,728 allocs, 1,515,477 frees, 127,874,200 bytes allocated
==9785==
==9785== Searching for pointers to 69,251 not-freed blocks
--9785-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9785-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9785-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9785-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9785-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9785-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9785-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9785-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9785-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9785-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9785-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9785-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9785-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9785-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9785-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9785-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9785-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9785-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9785-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9785-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9785-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9785-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9785-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9785-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9785-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9785-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9785-- Scanning root segment: 0x701a000..0x701afff (4096)
--9785-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9785-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9785-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9785-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9785-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9785-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9785-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9785-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9785-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9785-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9785== Checked 4,922,968 bytes
==9785==
==9785== LEAK SUMMARY:
==9785== definitely lost: 2,189 bytes in 12 blocks
==9785== indirectly lost: 6,756 bytes in 7 blocks
==9785== possibly lost: 0 bytes in 0 blocks
==9785== still reachable: 3,156,749 bytes in 69,232 blocks
==9785== suppressed: 0 bytes in 0 blocks
==9785== Rerun with --leak-check=full to see details of leaked memory
==9785==
==9785== Use --track-origins=yes to see where uninitialised values come from
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9785==
==9785== 1 errors in context 1 of 2:
==9785== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9785== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9785== by 0x488CD0: stringsubst (subst.c:301)
==9785== by 0x48801B: prefork (subst.c:77)
==9785== by 0x42B318: execcmd (exec.c:2619)
==9785== by 0x428CA0: execpline2 (exec.c:1697)
==9785== by 0x427FD2: execpline (exec.c:1484)
==9785== by 0x427756: execlist (exec.c:1267)
==9785== by 0x42717C: execode (exec.c:1073)
==9785== by 0x431299: runshfunc (exec.c:5040)
==9785== by 0x430E76: doshfunc (exec.c:4920)
==9785== by 0x4302FB: execshfunc (exec.c:4557)
==9785== by 0x42D8C1: execcmd (exec.c:3373)
==9785==
==9785==
==9785== 2 errors in context 2 of 2:
==9785== Conditional jump or move depends on uninitialised value(s)
==9785== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9785== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9785== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9785== by 0x40EFC2: execbuiltin (builtin.c:450)
==9785== by 0x42D8E9: execcmd (exec.c:3378)
==9785== by 0x428CA0: execpline2 (exec.c:1697)
==9785== by 0x427FD2: execpline (exec.c:1484)
==9785== by 0x42779A: execlist (exec.c:1275)
==9785== by 0x42717C: execode (exec.c:1073)
==9785== by 0x431299: runshfunc (exec.c:5040)
==9785== by 0x430E76: doshfunc (exec.c:4920)
==9785== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9785==
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9784-- Caught __NR_exit; running __libc_freeres()
--9784-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9784==
==9784== HEAP SUMMARY:
==9784== in use at exit: 3,165,459 bytes in 69,251 blocks
==9784== total heap usage: 1,584,765 allocs, 1,515,514 frees, 127,883,709 bytes allocated
==9784==
==9784== Searching for pointers to 69,251 not-freed blocks
--9784-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9784-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9784-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9784-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9784-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9784-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9784-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9784-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9784-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9784-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9784-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9784-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9784-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9784-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9784-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9784-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9784-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9784-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9784-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9784-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9784-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9784-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9784-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9784-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9784-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9784-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9784-- Scanning root segment: 0x701a000..0x701afff (4096)
--9784-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9784-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9784-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9784-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9784-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9784-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9784-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9784-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9784-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9784-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9784== Checked 4,922,160 bytes
==9784==
==9784== LEAK SUMMARY:
==9784== definitely lost: 2,189 bytes in 12 blocks
==9784== indirectly lost: 6,756 bytes in 7 blocks
==9784== possibly lost: 0 bytes in 0 blocks
==9784== still reachable: 3,156,514 bytes in 69,232 blocks
==9784== suppressed: 0 bytes in 0 blocks
==9784== Rerun with --leak-check=full to see details of leaked memory
==9784==
==9784== Use --track-origins=yes to see where uninitialised values come from
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784==
==9784== 1 errors in context 1 of 2:
==9784== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9784== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9784== by 0x488CD0: stringsubst (subst.c:301)
==9784== by 0x48801B: prefork (subst.c:77)
==9784== by 0x42B318: execcmd (exec.c:2619)
==9784== by 0x428CA0: execpline2 (exec.c:1697)
==9784== by 0x427FD2: execpline (exec.c:1484)
==9784== by 0x427756: execlist (exec.c:1267)
==9784== by 0x42717C: execode (exec.c:1073)
==9784== by 0x431299: runshfunc (exec.c:5040)
==9784== by 0x430E76: doshfunc (exec.c:4920)
==9784== by 0x4302FB: execshfunc (exec.c:4557)
==9784== by 0x42D8C1: execcmd (exec.c:3373)
==9784==
==9784==
==9784== 2 errors in context 2 of 2:
==9784== Conditional jump or move depends on uninitialised value(s)
==9784== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9784== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9784== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9784== by 0x40EFC2: execbuiltin (builtin.c:450)
==9784== by 0x42D8E9: execcmd (exec.c:3378)
==9784== by 0x428CA0: execpline2 (exec.c:1697)
==9784== by 0x427FD2: execpline (exec.c:1484)
==9784== by 0x42779A: execlist (exec.c:1275)
==9784== by 0x42717C: execode (exec.c:1073)
==9784== by 0x431299: runshfunc (exec.c:5040)
==9784== by 0x430E76: doshfunc (exec.c:4920)
==9784== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9784==
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9788-- Caught __NR_exit; running __libc_freeres()
==9788== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9788-by-pythonnut-on-???
==9788== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9788-by-pythonnut-on-???
==9788== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9788-by-pythonnut-on-???
==9788==
==9788== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9788== don't want to do, unless you know exactly what you're doing,
==9788== or are doing some strange experiment):
==9788== /usr/lib/valgrind/../../bin/vgdb --pid=9788 ...command...
==9788==
==9788== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9788== /path/to/gdb ./zsh
==9788== and then give GDB the following command
==9788== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9788
==9788== --pid is optional if only one valgrind process is running
==9788==
client request: code 4d430005, addr 0xFFEFEAE9C, len 4
--9788-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9789-- Caught __NR_exit; running __libc_freeres()
==9788==
==9788== HEAP SUMMARY:
==9788== in use at exit: 3,128,508 bytes in 69,251 blocks
==9788== total heap usage: 1,584,737 allocs, 1,515,486 frees, 127,877,620 bytes allocated
==9788==
==9789== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9789-by-pythonnut-on-???
==9789== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9789-by-pythonnut-on-???
==9789== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9789-by-pythonnut-on-???
==9789==
==9789== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9789== don't want to do, unless you know exactly what you're doing,
==9789== or are doing some strange experiment):
==9789== /usr/lib/valgrind/../../bin/vgdb --pid=9789 ...command...
==9789==
==9789== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9789== /path/to/gdb ./zsh
==9789== and then give GDB the following command
==9789== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9789
==9789== --pid is optional if only one valgrind process is running
==9789==
--9789-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9789==
==9788== Searching for pointers to 69,251 not-freed blocks
--9788-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9788-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9788-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9788-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9788-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9788-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9788-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9788-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9788-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9788-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9788-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9788-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9788-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9788-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9788-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9788-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9788-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9788-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9788-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9788-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9788-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9788-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9788-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9788-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9789== HEAP SUMMARY:
==9789== in use at exit: 3,128,508 bytes in 69,251 blocks
==9789== total heap usage: 1,584,742 allocs, 1,515,491 frees, 127,879,708 bytes allocated
==9789==
--9788-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9788-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9788-- Scanning root segment: 0x701a000..0x701afff (4096)
--9788-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9788-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9788-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9788-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9788-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9788-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9788-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9788-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9788-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9788-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9789== Searching for pointers to 69,251 not-freed blocks
--9789-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9789-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9789-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9789-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9789-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9789-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9789-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9789-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9789-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9789-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9789-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9789-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9789-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9789-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9789-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9789-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9789-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9789-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9789-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9789-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9789-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9789-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9789-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9789-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9789-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9789-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9789-- Scanning root segment: 0x701a000..0x701afff (4096)
--9789-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9789-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9789-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9789-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9789-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9789-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9789-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9789-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9789-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9789-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9788== Checked 4,884,776 bytes
==9788==
==9789== Checked 4,884,896 bytes
==9789==
==9788== LEAK SUMMARY:
==9788== definitely lost: 2,189 bytes in 12 blocks
==9788== indirectly lost: 6,756 bytes in 7 blocks
==9788== possibly lost: 0 bytes in 0 blocks
==9788== still reachable: 3,119,563 bytes in 69,232 blocks
==9788== suppressed: 0 bytes in 0 blocks
==9788== Rerun with --leak-check=full to see details of leaked memory
==9788==
==9788== Use --track-origins=yes to see where uninitialised values come from
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9788==
==9788== 1 errors in context 1 of 2:
==9788== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9788== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9788== by 0x488CD0: stringsubst (subst.c:301)
==9788== by 0x48801B: prefork (subst.c:77)
==9788== by 0x42B318: execcmd (exec.c:2619)
==9788== by 0x428CA0: execpline2 (exec.c:1697)
==9788== by 0x427FD2: execpline (exec.c:1484)
==9788== by 0x427756: execlist (exec.c:1267)
==9788== by 0x42717C: execode (exec.c:1073)
==9788== by 0x431299: runshfunc (exec.c:5040)
==9788== by 0x430E76: doshfunc (exec.c:4920)
==9788== by 0x4302FB: execshfunc (exec.c:4557)
==9788== by 0x42D8C1: execcmd (exec.c:3373)
==9788==
==9788==
==9788== 2 errors in context 2 of 2:
==9788== Conditional jump or move depends on uninitialised value(s)
==9788== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9788== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9788== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9788== by 0x40EFC2: execbuiltin (builtin.c:450)
==9788== by 0x42D8E9: execcmd (exec.c:3378)
==9788== by 0x428CA0: execpline2 (exec.c:1697)
==9788== by 0x427FD2: execpline (exec.c:1484)
==9788== by 0x42779A: execlist (exec.c:1275)
==9788== by 0x42717C: execode (exec.c:1073)
==9788== by 0x431299: runshfunc (exec.c:5040)
==9788== by 0x430E76: doshfunc (exec.c:4920)
==9788== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9788==
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789== LEAK SUMMARY:
==9789== definitely lost: 2,213 bytes in 13 blocks
==9789== indirectly lost: 6,796 bytes in 9 blocks
==9789== possibly lost: 0 bytes in 0 blocks
==9789== still reachable: 3,119,499 bytes in 69,229 blocks
==9789== suppressed: 0 bytes in 0 blocks
==9789== Rerun with --leak-check=full to see details of leaked memory
==9789==
==9789== Use --track-origins=yes to see where uninitialised values come from
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789==
==9789== 1 errors in context 1 of 2:
==9789== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9789== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9789== by 0x488CD0: stringsubst (subst.c:301)
==9789== by 0x48801B: prefork (subst.c:77)
==9789== by 0x42B318: execcmd (exec.c:2619)
==9789== by 0x428CA0: execpline2 (exec.c:1697)
==9789== by 0x427FD2: execpline (exec.c:1484)
==9789== by 0x427756: execlist (exec.c:1267)
==9789== by 0x42717C: execode (exec.c:1073)
==9789== by 0x431299: runshfunc (exec.c:5040)
==9789== by 0x430E76: doshfunc (exec.c:4920)
==9789== by 0x4302FB: execshfunc (exec.c:4557)
==9789== by 0x42D8C1: execcmd (exec.c:3373)
==9789==
==9789==
==9789== 2 errors in context 2 of 2:
==9789== Conditional jump or move depends on uninitialised value(s)
==9789== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9789== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9789== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9789== by 0x40EFC2: execbuiltin (builtin.c:450)
==9789== by 0x42D8E9: execcmd (exec.c:3378)
==9789== by 0x428CA0: execpline2 (exec.c:1697)
==9789== by 0x427FD2: execpline (exec.c:1484)
==9789== by 0x42779A: execlist (exec.c:1275)
==9789== by 0x42717C: execode (exec.c:1073)
==9789== by 0x431299: runshfunc (exec.c:5040)
==9789== by 0x430E76: doshfunc (exec.c:4920)
==9789== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9789==
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEB81C, len 4
--9773-- Caught __NR_exit; running __libc_freeres()
--9773-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9773==
==9773== HEAP SUMMARY:
==9773== in use at exit: 3,127,562 bytes in 69,228 blocks
==9773== total heap usage: 1,584,743 allocs, 1,515,515 frees, 127,880,276 bytes allocated
==9773==
==9773== Searching for pointers to 69,228 not-freed blocks
--9773-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9773-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9773-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9773-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9773-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9773-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9773-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9773-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9773-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9773-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9773-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9773-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9773-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9773-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9773-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9773-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9773-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9773-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9773-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9773-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9773-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9773-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9773-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9773-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9773-- Scanning root segment: 0x701a000..0x701afff (4096)
--9773-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9773-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9773-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9773-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9773-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9773-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9773-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9773-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9773-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9773-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9773== Checked 4,791,768 bytes
==9773==
==9773== LEAK SUMMARY:
==9773== definitely lost: 2,189 bytes in 12 blocks
==9773== indirectly lost: 6,756 bytes in 7 blocks
==9773== possibly lost: 0 bytes in 0 blocks
==9773== still reachable: 3,118,617 bytes in 69,209 blocks
==9773== suppressed: 0 bytes in 0 blocks
==9773== Rerun with --leak-check=full to see details of leaked memory
==9773==
==9773== Use --track-origins=yes to see where uninitialised values come from
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9773==
==9773== 1 errors in context 1 of 2:
==9773== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9773== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9773== by 0x488CD0: stringsubst (subst.c:301)
==9773== by 0x48801B: prefork (subst.c:77)
==9773== by 0x42B318: execcmd (exec.c:2619)
==9773== by 0x428CA0: execpline2 (exec.c:1697)
==9773== by 0x427FD2: execpline (exec.c:1484)
==9773== by 0x427756: execlist (exec.c:1267)
==9773== by 0x42717C: execode (exec.c:1073)
==9773== by 0x431299: runshfunc (exec.c:5040)
==9773== by 0x430E76: doshfunc (exec.c:4920)
==9773== by 0x4302FB: execshfunc (exec.c:4557)
==9773== by 0x42D8C1: execcmd (exec.c:3373)
==9773==
==9773==
==9773== 2 errors in context 2 of 2:
==9773== Conditional jump or move depends on uninitialised value(s)
==9773== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9773== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9773== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9773== by 0x40EFC2: execbuiltin (builtin.c:450)
==9773== by 0x42D8E9: execcmd (exec.c:3378)
==9773== by 0x428CA0: execpline2 (exec.c:1697)
==9773== by 0x427FD2: execpline (exec.c:1484)
==9773== by 0x42779A: execlist (exec.c:1275)
==9773== by 0x42717C: execode (exec.c:1073)
==9773== by 0x431299: runshfunc (exec.c:5040)
==9773== by 0x430E76: doshfunc (exec.c:4920)
==9773== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9773==
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9793-by-pythonnut-on-???
==9793== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9793-by-pythonnut-on-???
==9793== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9793-by-pythonnut-on-???
==9793==
==9793== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9793== don't want to do, unless you know exactly what you're doing,
==9793== or are doing some strange experiment):
==9793== /usr/lib/valgrind/../../bin/vgdb --pid=9793 ...command...
==9793==
==9793== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9793== /path/to/gdb ./zsh
==9793== and then give GDB the following command
==9793== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9793
==9793== --pid is optional if only one valgrind process is running
==9793==
==9792== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9792-by-pythonnut-on-???
==9792== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9792-by-pythonnut-on-???
==9792== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9792-by-pythonnut-on-???
==9792==
==9792== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9792== don't want to do, unless you know exactly what you're doing,
==9792== or are doing some strange experiment):
==9792== /usr/lib/valgrind/../../bin/vgdb --pid=9792 ...command...
==9792==
==9792== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9792== /path/to/gdb ./zsh
==9792== and then give GDB the following command
==9792== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9792
==9792== --pid is optional if only one valgrind process is running
==9792==
--9793-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEC14C, len 4
client request: code 4d430005, addr 0xFFEFEC0AC, len 4
--9793-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9793==
==9793== HEAP SUMMARY:
==9793== in use at exit: 3,127,452 bytes in 69,229 blocks
==9793== total heap usage: 1,584,688 allocs, 1,515,459 frees, 127,829,685 bytes allocated
==9793==
==9793== Searching for pointers to 69,229 not-freed blocks
--9793-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9793-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9793-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9793-- Scanning root segment: 0x4037000..0x403afff (16384)
--9793-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9793-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9793-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9793-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9793-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9793-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9793-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9793-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9793-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9793-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9793-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9793-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9793-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9793-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9793-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9793-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9793-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9793-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9793-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9793-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9793-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9793-- Scanning root segment: 0x701a000..0x701afff (4096)
--9793-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9793-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9793-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9793-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9793-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9793-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9793-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9793-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9793-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9793-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9793== Checked 4,809,000 bytes
==9793==
==9793== LEAK SUMMARY:
==9793== definitely lost: 2,189 bytes in 12 blocks
==9793== indirectly lost: 6,756 bytes in 7 blocks
==9793== possibly lost: 0 bytes in 0 blocks
==9793== still reachable: 3,118,507 bytes in 69,210 blocks
==9793== suppressed: 0 bytes in 0 blocks
==9793== Rerun with --leak-check=full to see details of leaked memory
==9793==
==9793== Use --track-origins=yes to see where uninitialised values come from
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793==
==9793== 1 errors in context 1 of 2:
==9793== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9793== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9793== by 0x488CD0: stringsubst (subst.c:301)
==9793== by 0x48801B: prefork (subst.c:77)
==9793== by 0x42B318: execcmd (exec.c:2619)
==9793== by 0x428CA0: execpline2 (exec.c:1697)
==9793== by 0x427FD2: execpline (exec.c:1484)
==9793== by 0x427756: execlist (exec.c:1267)
==9793== by 0x42717C: execode (exec.c:1073)
==9793== by 0x431299: runshfunc (exec.c:5040)
==9793== by 0x430E76: doshfunc (exec.c:4920)
==9793== by 0x4302FB: execshfunc (exec.c:4557)
==9793== by 0x42D8C1: execcmd (exec.c:3373)
==9793==
==9793==
==9793== 2 errors in context 2 of 2:
==9793== Conditional jump or move depends on uninitialised value(s)
==9793== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9793== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9793== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9793== by 0x40EFC2: execbuiltin (builtin.c:450)
==9793== by 0x42D8E9: execcmd (exec.c:3378)
==9793== by 0x428CA0: execpline2 (exec.c:1697)
==9793== by 0x427FD2: execpline (exec.c:1484)
==9793== by 0x42779A: execlist (exec.c:1275)
==9793== by 0x42717C: execode (exec.c:1073)
==9793== by 0x431299: runshfunc (exec.c:5040)
==9793== by 0x430E76: doshfunc (exec.c:4920)
==9793== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9793==
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9792-- Caught __NR_exit; running __libc_freeres()
--9792-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9792==
==9792== HEAP SUMMARY:
==9792== in use at exit: 3,127,388 bytes in 69,226 blocks
==9792== total heap usage: 1,584,693 allocs, 1,515,467 frees, 127,830,541 bytes allocated
==9792==
==9792== Searching for pointers to 69,226 not-freed blocks
--9792-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9792-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9792-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9792-- Scanning root segment: 0x4037000..0x403afff (16384)
--9792-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9792-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9792-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9792-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9792-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9792-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9792-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9792-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9792-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9792-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9792-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9792-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9792-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9792-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9792-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9792-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9792-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9792-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9792-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9792-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9792-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9792-- Scanning root segment: 0x701a000..0x701afff (4096)
--9792-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9792-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9792-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9792-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9792-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9792-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9792-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9792-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9792-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9792-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9792== Checked 4,808,312 bytes
==9792==
==9792== LEAK SUMMARY:
==9792== definitely lost: 2,189 bytes in 12 blocks
==9792== indirectly lost: 6,756 bytes in 7 blocks
==9792== possibly lost: 0 bytes in 0 blocks
==9792== still reachable: 3,118,443 bytes in 69,207 blocks
==9792== suppressed: 0 bytes in 0 blocks
==9792== Rerun with --leak-check=full to see details of leaked memory
==9792==
==9792== Use --track-origins=yes to see where uninitialised values come from
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9792==
==9792== 1 errors in context 1 of 2:
==9792== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9792== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9792== by 0x488CD0: stringsubst (subst.c:301)
==9792== by 0x48801B: prefork (subst.c:77)
==9792== by 0x42B318: execcmd (exec.c:2619)
==9792== by 0x428CA0: execpline2 (exec.c:1697)
==9792== by 0x427FD2: execpline (exec.c:1484)
==9792== by 0x427756: execlist (exec.c:1267)
==9792== by 0x42717C: execode (exec.c:1073)
==9792== by 0x431299: runshfunc (exec.c:5040)
==9792== by 0x430E76: doshfunc (exec.c:4920)
==9792== by 0x4302FB: execshfunc (exec.c:4557)
==9792== by 0x42D8C1: execcmd (exec.c:3373)
==9792==
==9792==
==9792== 2 errors in context 2 of 2:
==9792== Conditional jump or move depends on uninitialised value(s)
==9792== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9792== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9792== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9792== by 0x40EFC2: execbuiltin (builtin.c:450)
==9792== by 0x42D8E9: execcmd (exec.c:3378)
==9792== by 0x428CA0: execpline2 (exec.c:1697)
==9792== by 0x427FD2: execpline (exec.c:1484)
==9792== by 0x42779A: execlist (exec.c:1275)
==9792== by 0x42717C: execode (exec.c:1073)
==9792== by 0x431299: runshfunc (exec.c:5040)
==9792== by 0x430E76: doshfunc (exec.c:4920)
==9792== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9792==
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9796-by-pythonnut-on-???
==9796== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9796-by-pythonnut-on-???
==9796== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9796-by-pythonnut-on-???
==9796==
==9796== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9796== don't want to do, unless you know exactly what you're doing,
==9796== or are doing some strange experiment):
==9796== /usr/lib/valgrind/../../bin/vgdb --pid=9796 ...command...
==9796==
==9796== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9796== /path/to/gdb ./zsh
==9796== and then give GDB the following command
==9796== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9796
==9796== --pid is optional if only one valgrind process is running
==9796==
==9797== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9797-by-pythonnut-on-???
==9797== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9797-by-pythonnut-on-???
==9797== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9797-by-pythonnut-on-???
==9797==
==9797== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9797== don't want to do, unless you know exactly what you're doing,
==9797== or are doing some strange experiment):
==9797== /usr/lib/valgrind/../../bin/vgdb --pid=9797 ...command...
==9797==
==9797== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9797== /path/to/gdb ./zsh
==9797== and then give GDB the following command
==9797== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9797
==9797== --pid is optional if only one valgrind process is running
==9797==
--9797-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEACEC, len 4
client request: code 4d430005, addr 0xFFEFEAC4C, len 4
--9797-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9797==
==9797== HEAP SUMMARY:
==9797== in use at exit: 3,127,696 bytes in 69,232 blocks
==9797== total heap usage: 1,584,722 allocs, 1,515,490 frees, 127,842,976 bytes allocated
==9797==
==9797== Searching for pointers to 69,232 not-freed blocks
--9797-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9797-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9797-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9797-- Scanning root segment: 0x4037000..0x403afff (16384)
--9797-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9797-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9797-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9797-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9797-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9797-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9797-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9797-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9797-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9797-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9797-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9797-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9797-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9797-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9797-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9797-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9797-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9797-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9797-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9797-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9797-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9797-- Scanning root segment: 0x701a000..0x701afff (4096)
--9797-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9797-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9797-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9797-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9797-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9797-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9797-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9797-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9797-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9797-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9797== Checked 4,810,552 bytes
==9797==
==9797== LEAK SUMMARY:
==9797== definitely lost: 2,189 bytes in 12 blocks
==9797== indirectly lost: 6,756 bytes in 7 blocks
==9797== possibly lost: 0 bytes in 0 blocks
==9797== still reachable: 3,118,751 bytes in 69,213 blocks
==9797== suppressed: 0 bytes in 0 blocks
==9797== Rerun with --leak-check=full to see details of leaked memory
==9797==
==9797== Use --track-origins=yes to see where uninitialised values come from
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9797==
==9797== 1 errors in context 1 of 2:
==9797== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9797== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9797== by 0x488CD0: stringsubst (subst.c:301)
==9797== by 0x48801B: prefork (subst.c:77)
==9797== by 0x42B318: execcmd (exec.c:2619)
==9797== by 0x428CA0: execpline2 (exec.c:1697)
==9797== by 0x427FD2: execpline (exec.c:1484)
==9797== by 0x427756: execlist (exec.c:1267)
==9797== by 0x42717C: execode (exec.c:1073)
==9797== by 0x431299: runshfunc (exec.c:5040)
==9797== by 0x430E76: doshfunc (exec.c:4920)
==9797== by 0x4302FB: execshfunc (exec.c:4557)
==9797== by 0x42D8C1: execcmd (exec.c:3373)
==9797==
==9797==
==9797== 2 errors in context 2 of 2:
==9797== Conditional jump or move depends on uninitialised value(s)
==9797== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9797== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9797== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9797== by 0x40EFC2: execbuiltin (builtin.c:450)
==9797== by 0x42D8E9: execcmd (exec.c:3378)
==9797== by 0x428CA0: execpline2 (exec.c:1697)
==9797== by 0x427FD2: execpline (exec.c:1484)
==9797== by 0x42779A: execlist (exec.c:1275)
==9797== by 0x42717C: execode (exec.c:1073)
==9797== by 0x431299: runshfunc (exec.c:5040)
==9797== by 0x430E76: doshfunc (exec.c:4920)
==9797== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9797==
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9796-- Caught __NR_exit; running __libc_freeres()
--9796-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9796==
==9796== HEAP SUMMARY:
==9796== in use at exit: 3,127,727 bytes in 69,233 blocks
==9796== total heap usage: 1,584,718 allocs, 1,515,485 frees, 127,839,424 bytes allocated
==9796==
==9796== Searching for pointers to 69,233 not-freed blocks
--9796-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9796-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9796-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9796-- Scanning root segment: 0x4037000..0x403afff (16384)
--9796-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9796-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9796-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9796-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9796-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9796-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9796-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9796-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9796-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9796-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9796-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9796-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9796-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9796-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9796-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9796-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9796-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9796-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9796-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9796-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9796-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9796-- Scanning root segment: 0x701a000..0x701afff (4096)
--9796-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9796-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9796-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9796-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9796-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9796-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9796-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9796-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9796-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9796-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9796== Checked 4,810,256 bytes
==9796==
==9796== LEAK SUMMARY:
==9796== definitely lost: 2,189 bytes in 12 blocks
==9796== indirectly lost: 6,756 bytes in 7 blocks
==9796== possibly lost: 0 bytes in 0 blocks
==9796== still reachable: 3,118,782 bytes in 69,214 blocks
==9796== suppressed: 0 bytes in 0 blocks
==9796== Rerun with --leak-check=full to see details of leaked memory
==9796==
==9796== Use --track-origins=yes to see where uninitialised values come from
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796==
==9796== 1 errors in context 1 of 2:
==9796== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9796== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9796== by 0x488CD0: stringsubst (subst.c:301)
==9796== by 0x48801B: prefork (subst.c:77)
==9796== by 0x42B318: execcmd (exec.c:2619)
==9796== by 0x428CA0: execpline2 (exec.c:1697)
==9796== by 0x427FD2: execpline (exec.c:1484)
==9796== by 0x427756: execlist (exec.c:1267)
==9796== by 0x42717C: execode (exec.c:1073)
==9796== by 0x431299: runshfunc (exec.c:5040)
==9796== by 0x430E76: doshfunc (exec.c:4920)
==9796== by 0x4302FB: execshfunc (exec.c:4557)
==9796== by 0x42D8C1: execcmd (exec.c:3373)
==9796==
==9796==
==9796== 2 errors in context 2 of 2:
==9796== Conditional jump or move depends on uninitialised value(s)
==9796== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9796== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9796== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9796== by 0x40EFC2: execbuiltin (builtin.c:450)
==9796== by 0x42D8E9: execcmd (exec.c:3378)
==9796== by 0x428CA0: execpline2 (exec.c:1697)
==9796== by 0x427FD2: execpline (exec.c:1484)
==9796== by 0x42779A: execlist (exec.c:1275)
==9796== by 0x42717C: execode (exec.c:1073)
==9796== by 0x431299: runshfunc (exec.c:5040)
==9796== by 0x430E76: doshfunc (exec.c:4920)
==9796== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9796==
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9803== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9803-by-pythonnut-on-???
==9803== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9803-by-pythonnut-on-???
==9803== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9803-by-pythonnut-on-???
==9803==
==9803== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9803== don't want to do, unless you know exactly what you're doing,
==9803== or are doing some strange experiment):
==9803== /usr/lib/valgrind/../../bin/vgdb --pid=9803 ...command...
==9803==
==9803== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9803== /path/to/gdb ./zsh
==9803== and then give GDB the following command
==9803== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9803
==9803== --pid is optional if only one valgrind process is running
==9803==
client request: code 4d430005, addr 0xFFEFEB23C, len 4
==9802== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9802-by-pythonnut-on-???
==9802== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9802-by-pythonnut-on-???
==9802== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9802-by-pythonnut-on-???
==9802==
==9802== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9802== don't want to do, unless you know exactly what you're doing,
==9802== or are doing some strange experiment):
==9802== /usr/lib/valgrind/../../bin/vgdb --pid=9802 ...command...
==9802==
==9802== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9802== /path/to/gdb ./zsh
==9802== and then give GDB the following command
==9802== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9802
==9802== --pid is optional if only one valgrind process is running
==9802==
--9802-- Caught __NR_exit; running __libc_freeres()
--9802-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9802==
==9802== HEAP SUMMARY:
==9802== in use at exit: 3,127,987 bytes in 69,238 blocks
==9802== total heap usage: 1,584,729 allocs, 1,515,491 frees, 127,844,564 bytes allocated
==9802==
==9802== Searching for pointers to 69,238 not-freed blocks
--9802-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9802-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9802-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9802-- Scanning root segment: 0x4037000..0x403afff (16384)
--9802-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9802-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9802-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9802-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9802-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9802-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9802-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9802-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9802-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9802-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9802-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9802-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9802-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9802-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9802-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9802-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9802-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9802-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9802-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9802-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9802-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9802-- Scanning root segment: 0x701a000..0x701afff (4096)
--9802-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9802-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9802-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9802-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9802-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9802-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9802-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9802-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9802-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9802-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9802== Checked 4,810,256 bytes
==9802==
==9802== LEAK SUMMARY:
==9802== definitely lost: 2,189 bytes in 12 blocks
==9802== indirectly lost: 6,756 bytes in 7 blocks
==9802== possibly lost: 0 bytes in 0 blocks
==9802== still reachable: 3,119,042 bytes in 69,219 blocks
==9802== suppressed: 0 bytes in 0 blocks
==9802== Rerun with --leak-check=full to see details of leaked memory
==9802==
==9802== Use --track-origins=yes to see where uninitialised values come from
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9802==
==9802== 1 errors in context 1 of 2:
==9802== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9802== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9802== by 0x488CD0: stringsubst (subst.c:301)
==9802== by 0x48801B: prefork (subst.c:77)
==9802== by 0x42B318: execcmd (exec.c:2619)
==9802== by 0x428CA0: execpline2 (exec.c:1697)
==9802== by 0x427FD2: execpline (exec.c:1484)
==9802== by 0x427756: execlist (exec.c:1267)
==9802== by 0x42717C: execode (exec.c:1073)
==9802== by 0x431299: runshfunc (exec.c:5040)
==9802== by 0x430E76: doshfunc (exec.c:4920)
==9802== by 0x4302FB: execshfunc (exec.c:4557)
==9802== by 0x42D8C1: execcmd (exec.c:3373)
==9802==
==9802==
==9802== 2 errors in context 2 of 2:
==9802== Conditional jump or move depends on uninitialised value(s)
==9802== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9802== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9802== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9802== by 0x40EFC2: execbuiltin (builtin.c:450)
==9802== by 0x42D8E9: execcmd (exec.c:3378)
==9802== by 0x428CA0: execpline2 (exec.c:1697)
==9802== by 0x427FD2: execpline (exec.c:1484)
==9802== by 0x42779A: execlist (exec.c:1275)
==9802== by 0x42717C: execode (exec.c:1073)
==9802== by 0x431299: runshfunc (exec.c:5040)
==9802== by 0x430E76: doshfunc (exec.c:4920)
==9802== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9802==
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEAD8C, len 4
--9804-- Caught __NR_exit; running __libc_freeres()
==9804== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9804-by-pythonnut-on-???
==9804== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9804-by-pythonnut-on-???
==9804== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9804-by-pythonnut-on-???
==9804==
==9804== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9804== don't want to do, unless you know exactly what you're doing,
==9804== or are doing some strange experiment):
==9804== /usr/lib/valgrind/../../bin/vgdb --pid=9804 ...command...
==9804==
==9804== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9804== /path/to/gdb ./zsh
==9804== and then give GDB the following command
==9804== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9804
==9804== --pid is optional if only one valgrind process is running
==9804==
--9804-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9804==
==9804== HEAP SUMMARY:
==9804== in use at exit: 3,128,016 bytes in 69,239 blocks
==9804== total heap usage: 1,584,734 allocs, 1,515,495 frees, 127,846,705 bytes allocated
==9804==
==9804== Searching for pointers to 69,239 not-freed blocks
--9804-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9804-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9804-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9804-- Scanning root segment: 0x4037000..0x403afff (16384)
--9804-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9804-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9804-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9804-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9804-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9804-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9804-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9804-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9804-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9804-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9804-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9804-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9804-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9804-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9804-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9804-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9804-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9804-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9804-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9804-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9804-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9804-- Scanning root segment: 0x701a000..0x701afff (4096)
--9804-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9804-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9804-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9804-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9804-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9804-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9804-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9804-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9804-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9804-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9804== Checked 4,810,552 bytes
==9804==
==9804== LEAK SUMMARY:
==9804== definitely lost: 2,189 bytes in 12 blocks
==9804== indirectly lost: 6,756 bytes in 7 blocks
==9804== possibly lost: 0 bytes in 0 blocks
==9804== still reachable: 3,119,071 bytes in 69,220 blocks
==9804== suppressed: 0 bytes in 0 blocks
==9804== Rerun with --leak-check=full to see details of leaked memory
==9804==
==9804== Use --track-origins=yes to see where uninitialised values come from
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9804==
==9804== 1 errors in context 1 of 2:
==9804== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9804== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9804== by 0x488CD0: stringsubst (subst.c:301)
==9804== by 0x48801B: prefork (subst.c:77)
==9804== by 0x42B318: execcmd (exec.c:2619)
==9804== by 0x428CA0: execpline2 (exec.c:1697)
==9804== by 0x427FD2: execpline (exec.c:1484)
==9804== by 0x427756: execlist (exec.c:1267)
==9804== by 0x42717C: execode (exec.c:1073)
==9804== by 0x431299: runshfunc (exec.c:5040)
==9804== by 0x430E76: doshfunc (exec.c:4920)
==9804== by 0x4302FB: execshfunc (exec.c:4557)
==9804== by 0x42D8C1: execcmd (exec.c:3373)
==9804==
==9804==
==9804== 2 errors in context 2 of 2:
==9804== Conditional jump or move depends on uninitialised value(s)
==9804== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9804== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9804== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9804== by 0x40EFC2: execbuiltin (builtin.c:450)
==9804== by 0x42D8E9: execcmd (exec.c:3378)
==9804== by 0x428CA0: execpline2 (exec.c:1697)
==9804== by 0x427FD2: execpline (exec.c:1484)
==9804== by 0x42779A: execlist (exec.c:1275)
==9804== by 0x42717C: execode (exec.c:1073)
==9804== by 0x431299: runshfunc (exec.c:5040)
==9804== by 0x430E76: doshfunc (exec.c:4920)
==9804== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9804==
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9806-by-pythonnut-on-???
==9806== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9806-by-pythonnut-on-???
==9806== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9806-by-pythonnut-on-???
==9806==
==9806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9806== don't want to do, unless you know exactly what you're doing,
==9806== or are doing some strange experiment):
==9806== /usr/lib/valgrind/../../bin/vgdb --pid=9806 ...command...
==9806==
==9806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9806== /path/to/gdb ./zsh
==9806== and then give GDB the following command
==9806== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9806
==9806== --pid is optional if only one valgrind process is running
==9806==
client request: code 4d430005, addr 0xFFEFEB70C, len 4
client request: code 4d430005, addr 0xFFEFEB08C, len 4
--9772-- Caught __NR_exit; running __libc_freeres()
--9772-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9772==
==9772== HEAP SUMMARY:
==9772== in use at exit: 3,126,120 bytes in 69,190 blocks
==9772== total heap usage: 1,584,743 allocs, 1,515,553 frees, 127,850,645 bytes allocated
==9772==
==9772== Searching for pointers to 69,190 not-freed blocks
--9772-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9772-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9772-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9772-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9772-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9772-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9772-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9772-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9772-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9772-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9772-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9772-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9772-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9772-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9772-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9772-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9772-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9772-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9772-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9772-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9772-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9772-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9772-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9772-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9772-- Scanning root segment: 0x701a000..0x701afff (4096)
--9772-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9772-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9772-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9772-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9772-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9772-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9772-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9772-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9772-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9772-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9772== Checked 4,788,384 bytes
==9772==
==9772== LEAK SUMMARY:
==9772== definitely lost: 2,189 bytes in 12 blocks
==9772== indirectly lost: 6,756 bytes in 7 blocks
==9772== possibly lost: 0 bytes in 0 blocks
==9772== still reachable: 3,117,175 bytes in 69,171 blocks
==9772== suppressed: 0 bytes in 0 blocks
==9772== Rerun with --leak-check=full to see details of leaked memory
==9772==
==9772== Use --track-origins=yes to see where uninitialised values come from
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772==
==9772== 1 errors in context 1 of 2:
==9772== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9772== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9772== by 0x488CD0: stringsubst (subst.c:301)
==9772== by 0x48801B: prefork (subst.c:77)
==9772== by 0x42B318: execcmd (exec.c:2619)
==9772== by 0x428CA0: execpline2 (exec.c:1697)
==9772== by 0x427FD2: execpline (exec.c:1484)
==9772== by 0x427756: execlist (exec.c:1267)
==9772== by 0x42717C: execode (exec.c:1073)
==9772== by 0x431299: runshfunc (exec.c:5040)
==9772== by 0x430E76: doshfunc (exec.c:4920)
==9772== by 0x4302FB: execshfunc (exec.c:4557)
==9772== by 0x42D8C1: execcmd (exec.c:3373)
==9772==
==9772==
==9772== 2 errors in context 2 of 2:
==9772== Conditional jump or move depends on uninitialised value(s)
==9772== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9772== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9772== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9772== by 0x40EFC2: execbuiltin (builtin.c:450)
==9772== by 0x42D8E9: execcmd (exec.c:3378)
==9772== by 0x428CA0: execpline2 (exec.c:1697)
==9772== by 0x427FD2: execpline (exec.c:1484)
==9772== by 0x42779A: execlist (exec.c:1275)
==9772== by 0x42717C: execode (exec.c:1073)
==9772== by 0x431299: runshfunc (exec.c:5040)
==9772== by 0x430E76: doshfunc (exec.c:4920)
==9772== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9772==
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9808-by-pythonnut-on-???
==9808== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9808-by-pythonnut-on-???
==9808== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9808-by-pythonnut-on-???
==9808==
==9808== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9808== don't want to do, unless you know exactly what you're doing,
==9808== or are doing some strange experiment):
==9808== /usr/lib/valgrind/../../bin/vgdb --pid=9808 ...command...
==9808==
==9808== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9808== /path/to/gdb ./zsh
==9808== and then give GDB the following command
==9808== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9808
==9808== --pid is optional if only one valgrind process is running
==9808==
--9809-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==9810== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9810-by-pythonnut-on-???
==9810== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9810-by-pythonnut-on-???
==9810== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9810-by-pythonnut-on-???
==9810==
==9810== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9810== don't want to do, unless you know exactly what you're doing,
==9810== or are doing some strange experiment):
==9810== /usr/lib/valgrind/../../bin/vgdb --pid=9810 ...command...
==9810==
==9810== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9810== /path/to/gdb ./zsh
==9810== and then give GDB the following command
==9810== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9810
==9810== --pid is optional if only one valgrind process is running
==9810==
==9809== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9809-by-pythonnut-on-???
==9809== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9809-by-pythonnut-on-???
==9809== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9809-by-pythonnut-on-???
==9809==
==9809== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9809== don't want to do, unless you know exactly what you're doing,
==9809== or are doing some strange experiment):
==9809== /usr/lib/valgrind/../../bin/vgdb --pid=9809 ...command...
==9809==
==9809== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9809== /path/to/gdb ./zsh
==9809== and then give GDB the following command
==9809== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9809
==9809== --pid is optional if only one valgrind process is running
==9809==
--9809-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9809==
==9809== HEAP SUMMARY:
==9809== in use at exit: 3,111,895 bytes in 68,920 blocks
==9809== total heap usage: 1,584,898 allocs, 1,515,978 frees, 127,820,518 bytes allocated
==9809==
==9809== Searching for pointers to 68,920 not-freed blocks
--9809-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9809-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9809-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9809-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9809-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9809-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9809-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9809-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9809-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9809-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9809-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9809-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9809-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9809-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9809-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9809-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9809-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9809-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9809-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9809-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9809-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9809-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9809-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9809-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9809-- Scanning root segment: 0x701a000..0x701afff (4096)
--9809-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9809-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9809-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9809-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9809-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9809-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9809-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9809-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9809-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9809-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9809== Checked 4,767,936 bytes
==9809==
==9809== LEAK SUMMARY:
==9809== definitely lost: 2,189 bytes in 12 blocks
==9809== indirectly lost: 6,756 bytes in 7 blocks
==9809== possibly lost: 0 bytes in 0 blocks
==9809== still reachable: 3,102,950 bytes in 68,901 blocks
==9809== suppressed: 0 bytes in 0 blocks
==9809== Rerun with --leak-check=full to see details of leaked memory
==9809==
==9809== Use --track-origins=yes to see where uninitialised values come from
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9809==
==9809== 1 errors in context 1 of 2:
==9809== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9809== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9809== by 0x488CD0: stringsubst (subst.c:301)
==9809== by 0x48801B: prefork (subst.c:77)
==9809== by 0x42B318: execcmd (exec.c:2619)
==9809== by 0x428CA0: execpline2 (exec.c:1697)
==9809== by 0x427FD2: execpline (exec.c:1484)
==9809== by 0x427756: execlist (exec.c:1267)
==9809== by 0x42717C: execode (exec.c:1073)
==9809== by 0x431299: runshfunc (exec.c:5040)
==9809== by 0x430E76: doshfunc (exec.c:4920)
==9809== by 0x4302FB: execshfunc (exec.c:4557)
==9809== by 0x42D8C1: execcmd (exec.c:3373)
==9809==
==9809==
==9809== 2 errors in context 2 of 2:
==9809== Conditional jump or move depends on uninitialised value(s)
==9809== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9809== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9809== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9809== by 0x40EFC2: execbuiltin (builtin.c:450)
==9809== by 0x42D8E9: execcmd (exec.c:3378)
==9809== by 0x428CA0: execpline2 (exec.c:1697)
==9809== by 0x427FD2: execpline (exec.c:1484)
==9809== by 0x42779A: execlist (exec.c:1275)
==9809== by 0x42717C: execode (exec.c:1073)
==9809== by 0x431299: runshfunc (exec.c:5040)
==9809== by 0x430E76: doshfunc (exec.c:4920)
==9809== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9809==
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9808-- Caught __NR_exit; running __libc_freeres()
--9808-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9808==
==9808== HEAP SUMMARY:
==9808== in use at exit: 3,111,532 bytes in 68,910 blocks
==9808== total heap usage: 1,584,901 allocs, 1,515,991 frees, 127,821,158 bytes allocated
==9808==
==9808== Searching for pointers to 68,910 not-freed blocks
--9808-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9808-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9808-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9808-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9808-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9808-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9808-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9808-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9808-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9808-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9808-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9808-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9808-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9808-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9808-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9808-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9808-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9808-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9808-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9808-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9808-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9808-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9808-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9808-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9808-- Scanning root segment: 0x701a000..0x701afff (4096)
--9808-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9808-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9808-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9808-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9808-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9808-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9808-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9808-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9808-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9808-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9808== Checked 4,765,624 bytes
==9808==
==9808== LEAK SUMMARY:
==9808== definitely lost: 2,189 bytes in 12 blocks
==9808== indirectly lost: 6,756 bytes in 7 blocks
==9808== possibly lost: 0 bytes in 0 blocks
==9808== still reachable: 3,102,587 bytes in 68,891 blocks
==9808== suppressed: 0 bytes in 0 blocks
==9808== Rerun with --leak-check=full to see details of leaked memory
==9808==
==9808== Use --track-origins=yes to see where uninitialised values come from
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808==
==9808== 1 errors in context 1 of 2:
==9808== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9808== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9808== by 0x488CD0: stringsubst (subst.c:301)
==9808== by 0x48801B: prefork (subst.c:77)
==9808== by 0x42B318: execcmd (exec.c:2619)
==9808== by 0x428CA0: execpline2 (exec.c:1697)
==9808== by 0x427FD2: execpline (exec.c:1484)
==9808== by 0x427756: execlist (exec.c:1267)
==9808== by 0x42717C: execode (exec.c:1073)
==9808== by 0x431299: runshfunc (exec.c:5040)
==9808== by 0x430E76: doshfunc (exec.c:4920)
==9808== by 0x4302FB: execshfunc (exec.c:4557)
==9808== by 0x42D8C1: execcmd (exec.c:3373)
==9808==
==9808==
==9808== 2 errors in context 2 of 2:
==9808== Conditional jump or move depends on uninitialised value(s)
==9808== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9808== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9808== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9808== by 0x40EFC2: execbuiltin (builtin.c:450)
==9808== by 0x42D8E9: execcmd (exec.c:3378)
==9808== by 0x428CA0: execpline2 (exec.c:1697)
==9808== by 0x427FD2: execpline (exec.c:1484)
==9808== by 0x42779A: execlist (exec.c:1275)
==9808== by 0x42717C: execode (exec.c:1073)
==9808== by 0x431299: runshfunc (exec.c:5040)
==9808== by 0x430E76: doshfunc (exec.c:4920)
==9808== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9808==
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9814-- Caught __NR_exit; running __libc_freeres()
==9815== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9815-by-pythonnut-on-???
==9815== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9815-by-pythonnut-on-???
==9815== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9815-by-pythonnut-on-???
==9815==
==9815== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9815== don't want to do, unless you know exactly what you're doing,
==9815== or are doing some strange experiment):
==9815== /usr/lib/valgrind/../../bin/vgdb --pid=9815 ...command...
==9815==
==9815== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9815== /path/to/gdb ./zsh
==9815== and then give GDB the following command
==9815== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9815
==9815== --pid is optional if only one valgrind process is running
==9815==
==9814== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9814-by-pythonnut-on-???
==9813== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9813-by-pythonnut-on-???
==9814== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9814-by-pythonnut-on-???
==9813== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9813-by-pythonnut-on-???
==9814== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9814-by-pythonnut-on-???
==9813== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9813-by-pythonnut-on-???
==9814==
==9813==
==9814== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9814== don't want to do, unless you know exactly what you're doing,
==9814== or are doing some strange experiment):
==9814== /usr/lib/valgrind/../../bin/vgdb --pid=9814 ...command...
==9813== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9813== don't want to do, unless you know exactly what you're doing,
==9813== or are doing some strange experiment):
==9813== /usr/lib/valgrind/../../bin/vgdb --pid=9813 ...command...
==9814==
==9813==
==9814== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9814== /path/to/gdb ./zsh
==9814== and then give GDB the following command
==9814== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9814
==9814== --pid is optional if only one valgrind process is running
==9813== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9813== /path/to/gdb ./zsh
==9813== and then give GDB the following command
==9813== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9813
==9814==
==9813== --pid is optional if only one valgrind process is running
==9813==
client request: code 4d430005, addr 0xFFEFF268C, len 4
--9814-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF25EC, len 4
==9814==
==9814== HEAP SUMMARY:
==9814== in use at exit: 3,111,978 bytes in 68,921 blocks
==9814== total heap usage: 1,584,931 allocs, 1,516,010 frees, 127,833,642 bytes allocated
==9814==
==9814== Searching for pointers to 68,921 not-freed blocks
--9814-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9814-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9814-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9814-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9814-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9814-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9814-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9814-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9814-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9814-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9814-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9814-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9814-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9814-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9814-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9814-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9814-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9814-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9814-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9814-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9814-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9814-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9814-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9814-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9814-- Scanning root segment: 0x701a000..0x701afff (4096)
--9814-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9814-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9814-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9814-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9814-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9814-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9814-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9814-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9814-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9814-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9814== Checked 4,770,000 bytes
==9814==
==9814== LEAK SUMMARY:
==9814== definitely lost: 2,189 bytes in 12 blocks
==9814== indirectly lost: 6,756 bytes in 7 blocks
==9814== possibly lost: 0 bytes in 0 blocks
==9814== still reachable: 3,103,033 bytes in 68,902 blocks
==9814== suppressed: 0 bytes in 0 blocks
==9814== Rerun with --leak-check=full to see details of leaked memory
==9814==
==9814== Use --track-origins=yes to see where uninitialised values come from
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9814==
==9814== 1 errors in context 1 of 2:
==9814== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9814== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9814== by 0x488CD0: stringsubst (subst.c:301)
==9814== by 0x48801B: prefork (subst.c:77)
==9814== by 0x42B318: execcmd (exec.c:2619)
==9814== by 0x428CA0: execpline2 (exec.c:1697)
==9814== by 0x427FD2: execpline (exec.c:1484)
==9814== by 0x427756: execlist (exec.c:1267)
==9814== by 0x42717C: execode (exec.c:1073)
==9814== by 0x431299: runshfunc (exec.c:5040)
==9814== by 0x430E76: doshfunc (exec.c:4920)
==9814== by 0x4302FB: execshfunc (exec.c:4557)
==9814== by 0x42D8C1: execcmd (exec.c:3373)
==9814==
==9814==
==9814== 2 errors in context 2 of 2:
==9814== Conditional jump or move depends on uninitialised value(s)
==9814== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9814== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9814== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9814== by 0x40EFC2: execbuiltin (builtin.c:450)
==9814== by 0x42D8E9: execcmd (exec.c:3378)
==9814== by 0x428CA0: execpline2 (exec.c:1697)
==9814== by 0x427FD2: execpline (exec.c:1484)
==9814== by 0x42779A: execlist (exec.c:1275)
==9814== by 0x42717C: execode (exec.c:1073)
==9814== by 0x431299: runshfunc (exec.c:5040)
==9814== by 0x430E76: doshfunc (exec.c:4920)
==9814== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9814==
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9813-- Caught __NR_exit; running __libc_freeres()
--9813-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9813==
==9813== HEAP SUMMARY:
==9813== in use at exit: 3,111,946 bytes in 68,921 blocks
==9813== total heap usage: 1,584,935 allocs, 1,516,014 frees, 127,833,210 bytes allocated
==9813==
==9813== Searching for pointers to 68,921 not-freed blocks
--9813-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9813-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9813-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9813-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9813-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9813-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9813-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9813-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9813-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9813-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9813-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9813-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9813-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9813-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9813-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9813-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9813-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9813-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9813-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9813-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9813-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9813-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9813-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9813-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9813-- Scanning root segment: 0x701a000..0x701afff (4096)
--9813-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9813-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9813-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9813-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9813-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9813-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9813-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9813-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9813-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9813-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9813== Checked 4,769,672 bytes
==9813==
==9813== LEAK SUMMARY:
==9813== definitely lost: 2,189 bytes in 12 blocks
==9813== indirectly lost: 6,756 bytes in 7 blocks
==9813== possibly lost: 0 bytes in 0 blocks
==9813== still reachable: 3,103,001 bytes in 68,902 blocks
==9813== suppressed: 0 bytes in 0 blocks
==9813== Rerun with --leak-check=full to see details of leaked memory
==9813==
==9813== Use --track-origins=yes to see where uninitialised values come from
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9813==
==9813== 1 errors in context 1 of 2:
==9813== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9813== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9813== by 0x488CD0: stringsubst (subst.c:301)
==9813== by 0x48801B: prefork (subst.c:77)
==9813== by 0x42B318: execcmd (exec.c:2619)
==9813== by 0x428CA0: execpline2 (exec.c:1697)
==9813== by 0x427FD2: execpline (exec.c:1484)
==9813== by 0x427756: execlist (exec.c:1267)
==9813== by 0x42717C: execode (exec.c:1073)
==9813== by 0x431299: runshfunc (exec.c:5040)
==9813== by 0x430E76: doshfunc (exec.c:4920)
==9813== by 0x4302FB: execshfunc (exec.c:4557)
==9813== by 0x42D8C1: execcmd (exec.c:3373)
==9813==
==9813==
==9813== 2 errors in context 2 of 2:
==9813== Conditional jump or move depends on uninitialised value(s)
==9813== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9813== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9813== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9813== by 0x40EFC2: execbuiltin (builtin.c:450)
==9813== by 0x42D8E9: execcmd (exec.c:3378)
==9813== by 0x428CA0: execpline2 (exec.c:1697)
==9813== by 0x427FD2: execpline (exec.c:1484)
==9813== by 0x42779A: execlist (exec.c:1275)
==9813== by 0x42717C: execode (exec.c:1073)
==9813== by 0x431299: runshfunc (exec.c:5040)
==9813== by 0x430E76: doshfunc (exec.c:4920)
==9813== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9813==
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--9817-- Caught __NR_exit; running __libc_freeres()
==9817== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9817-by-pythonnut-on-???
==9817== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9817-by-pythonnut-on-???
==9817== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9817-by-pythonnut-on-???
==9817==
==9817== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9817== don't want to do, unless you know exactly what you're doing,
==9817== or are doing some strange experiment):
==9817== /usr/lib/valgrind/../../bin/vgdb --pid=9817 ...command...
==9817==
==9817== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9817== /path/to/gdb ./zsh
==9817== and then give GDB the following command
==9817== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9817
==9817== --pid is optional if only one valgrind process is running
==9817==
--9817-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9817==
==9817== HEAP SUMMARY:
==9817== in use at exit: 3,112,215 bytes in 68,926 blocks
==9817== total heap usage: 1,584,946 allocs, 1,516,020 frees, 127,838,304 bytes allocated
==9817==
==9817== Searching for pointers to 68,926 not-freed blocks
--9817-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9817-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9817-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9817-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9817-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9817-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9817-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9817-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9817-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9817-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9817-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9817-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9817-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9817-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9817-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9817-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9817-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9817-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9817-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9817-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9817-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9817-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9817-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9817-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9817-- Scanning root segment: 0x701a000..0x701afff (4096)
--9817-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9817-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9817-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9817-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9817-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9817-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9817-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9817-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9817-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9817-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9817== Checked 4,769,664 bytes
==9817==
==9817== LEAK SUMMARY:
==9817== definitely lost: 2,189 bytes in 12 blocks
==9817== indirectly lost: 6,756 bytes in 7 blocks
==9817== possibly lost: 0 bytes in 0 blocks
==9817== still reachable: 3,103,270 bytes in 68,907 blocks
==9817== suppressed: 0 bytes in 0 blocks
==9817== Rerun with --leak-check=full to see details of leaked memory
==9817==
==9817== Use --track-origins=yes to see where uninitialised values come from
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9817==
==9817== 1 errors in context 1 of 2:
==9817== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9817== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9817== by 0x488CD0: stringsubst (subst.c:301)
==9817== by 0x48801B: prefork (subst.c:77)
==9817== by 0x42B318: execcmd (exec.c:2619)
==9817== by 0x428CA0: execpline2 (exec.c:1697)
==9817== by 0x427FD2: execpline (exec.c:1484)
==9817== by 0x427756: execlist (exec.c:1267)
==9817== by 0x42717C: execode (exec.c:1073)
==9817== by 0x431299: runshfunc (exec.c:5040)
==9817== by 0x430E76: doshfunc (exec.c:4920)
==9817== by 0x4302FB: execshfunc (exec.c:4557)
==9817== by 0x42D8C1: execcmd (exec.c:3373)
==9817==
==9817==
==9817== 2 errors in context 2 of 2:
==9817== Conditional jump or move depends on uninitialised value(s)
==9817== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9817== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9817== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9817== by 0x40EFC2: execbuiltin (builtin.c:450)
==9817== by 0x42D8E9: execcmd (exec.c:3378)
==9817== by 0x428CA0: execpline2 (exec.c:1697)
==9817== by 0x427FD2: execpline (exec.c:1484)
==9817== by 0x42779A: execlist (exec.c:1275)
==9817== by 0x42717C: execode (exec.c:1073)
==9817== by 0x431299: runshfunc (exec.c:5040)
==9817== by 0x430E76: doshfunc (exec.c:4920)
==9817== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9817==
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9819-by-pythonnut-on-???
==9819== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9819-by-pythonnut-on-???
==9819== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9819-by-pythonnut-on-???
==9819==
==9819== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9819== don't want to do, unless you know exactly what you're doing,
==9819== or are doing some strange experiment):
==9819== /usr/lib/valgrind/../../bin/vgdb --pid=9819 ...command...
==9819==
==9819== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9819== /path/to/gdb ./zsh
==9819== and then give GDB the following command
==9819== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9819
==9819== --pid is optional if only one valgrind process is running
==9819==
client request: code 4d430005, addr 0xFFEFF272C, len 4
--9819-- Caught __NR_exit; running __libc_freeres()
--9819-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9819==
==9819== HEAP SUMMARY:
==9819== in use at exit: 3,112,322 bytes in 68,930 blocks
==9819== total heap usage: 1,584,954 allocs, 1,516,024 frees, 127,840,523 bytes allocated
==9819==
==9819== Searching for pointers to 68,930 not-freed blocks
--9819-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9819-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9819-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9819-- Scanning root segment: 0x4037000..0x403afff (16384)
--9819-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9819-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9819-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9819-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9819-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9819-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9819-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9819-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9819-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9819-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9819-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9819-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9819-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9819-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9819-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9819-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9819-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9819-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9819-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9819-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9819-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9819-- Scanning root segment: 0x701a000..0x701afff (4096)
--9819-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9819-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9819-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9819-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9819-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9819-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9819-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9819-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9819-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9819-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9819== Checked 4,786,416 bytes
==9819==
==9819== LEAK SUMMARY:
==9819== definitely lost: 2,189 bytes in 12 blocks
==9819== indirectly lost: 6,756 bytes in 7 blocks
==9819== possibly lost: 0 bytes in 0 blocks
==9819== still reachable: 3,103,377 bytes in 68,911 blocks
==9819== suppressed: 0 bytes in 0 blocks
==9819== Rerun with --leak-check=full to see details of leaked memory
==9819==
==9819== Use --track-origins=yes to see where uninitialised values come from
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819==
==9819== 1 errors in context 1 of 2:
==9819== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9819== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9819== by 0x488CD0: stringsubst (subst.c:301)
==9819== by 0x48801B: prefork (subst.c:77)
==9819== by 0x42B318: execcmd (exec.c:2619)
==9819== by 0x428CA0: execpline2 (exec.c:1697)
==9819== by 0x427FD2: execpline (exec.c:1484)
==9819== by 0x427756: execlist (exec.c:1267)
==9819== by 0x42717C: execode (exec.c:1073)
==9819== by 0x431299: runshfunc (exec.c:5040)
==9819== by 0x430E76: doshfunc (exec.c:4920)
==9819== by 0x4302FB: execshfunc (exec.c:4557)
==9819== by 0x42D8C1: execcmd (exec.c:3373)
==9819==
==9819==
==9819== 2 errors in context 2 of 2:
==9819== Conditional jump or move depends on uninitialised value(s)
==9819== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9819== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9819== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9819== by 0x40EFC2: execbuiltin (builtin.c:450)
==9819== by 0x42D8E9: execcmd (exec.c:3378)
==9819== by 0x428CA0: execpline2 (exec.c:1697)
==9819== by 0x427FD2: execpline (exec.c:1484)
==9819== by 0x42779A: execlist (exec.c:1275)
==9819== by 0x42717C: execode (exec.c:1073)
==9819== by 0x431299: runshfunc (exec.c:5040)
==9819== by 0x430E76: doshfunc (exec.c:4920)
==9819== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9819==
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
--9823-- Caught __NR_exit; running __libc_freeres()
==9823== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9823-by-pythonnut-on-???
==9823== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9823-by-pythonnut-on-???
==9823== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9823-by-pythonnut-on-???
==9823==
==9823== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9823== don't want to do, unless you know exactly what you're doing,
==9823== or are doing some strange experiment):
==9823== /usr/lib/valgrind/../../bin/vgdb --pid=9823 ...command...
==9823==
==9823== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9823== /path/to/gdb ./zsh
==9823== and then give GDB the following command
==9823== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9823
==9823== --pid is optional if only one valgrind process is running
==9823==
--9823-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9823==
==9823== HEAP SUMMARY:
==9823== in use at exit: 3,111,612 bytes in 68,915 blocks
==9823== total heap usage: 1,585,004 allocs, 1,516,089 frees, 127,846,992 bytes allocated
==9823==
==9823== Searching for pointers to 68,915 not-freed blocks
--9823-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9823-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9823-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9823-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9823-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9823-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9823-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9823-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9823-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9823-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9823-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9823-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9823-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9823-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9823-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9823-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9823-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9823-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9823-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9823-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9823-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9823-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9823-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9823-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9823-- Scanning root segment: 0x701a000..0x701afff (4096)
--9823-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9823-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9823-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9823-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9823-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9823-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9823-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9823-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9823-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9823-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9823== Checked 4,786,576 bytes
==9823==
==9823== LEAK SUMMARY:
==9823== definitely lost: 2,189 bytes in 12 blocks
==9823== indirectly lost: 6,756 bytes in 7 blocks
==9823== possibly lost: 0 bytes in 0 blocks
==9823== still reachable: 3,102,667 bytes in 68,896 blocks
==9823== suppressed: 0 bytes in 0 blocks
==9823== Rerun with --leak-check=full to see details of leaked memory
==9823==
==9823== Use --track-origins=yes to see where uninitialised values come from
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9823==
==9823== 1 errors in context 1 of 2:
==9823== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9823== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9823== by 0x488CD0: stringsubst (subst.c:301)
==9823== by 0x48801B: prefork (subst.c:77)
==9823== by 0x42B318: execcmd (exec.c:2619)
==9823== by 0x428CA0: execpline2 (exec.c:1697)
==9823== by 0x427FD2: execpline (exec.c:1484)
==9823== by 0x427756: execlist (exec.c:1267)
==9823== by 0x42717C: execode (exec.c:1073)
==9823== by 0x431299: runshfunc (exec.c:5040)
==9823== by 0x430E76: doshfunc (exec.c:4920)
==9823== by 0x4302FB: execshfunc (exec.c:4557)
==9823== by 0x42D8C1: execcmd (exec.c:3373)
==9823==
==9823==
==9823== 2 errors in context 2 of 2:
==9823== Conditional jump or move depends on uninitialised value(s)
==9823== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9823== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9823== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9823== by 0x40EFC2: execbuiltin (builtin.c:450)
==9823== by 0x42D8E9: execcmd (exec.c:3378)
==9823== by 0x428CA0: execpline2 (exec.c:1697)
==9823== by 0x427FD2: execpline (exec.c:1484)
==9823== by 0x42779A: execlist (exec.c:1275)
==9823== by 0x42717C: execode (exec.c:1073)
==9823== by 0x431299: runshfunc (exec.c:5040)
==9823== by 0x430E76: doshfunc (exec.c:4920)
==9823== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9823==
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9824-by-pythonnut-on-???
==9824== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9824-by-pythonnut-on-???
==9824== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9824-by-pythonnut-on-???
==9824==
==9824== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9824== don't want to do, unless you know exactly what you're doing,
==9824== or are doing some strange experiment):
==9824== /usr/lib/valgrind/../../bin/vgdb --pid=9824 ...command...
==9824==
==9824== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9824== /path/to/gdb ./zsh
==9824== and then give GDB the following command
==9824== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9824
==9824== --pid is optional if only one valgrind process is running
==9824==
--9824-- Caught __NR_exit; running __libc_freeres()
--9824-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9824==
==9824== HEAP SUMMARY:
==9824== in use at exit: 3,113,041 bytes in 68,962 blocks
==9824== total heap usage: 1,585,096 allocs, 1,516,134 frees, 127,855,102 bytes allocated
==9824==
==9824== Searching for pointers to 68,962 not-freed blocks
--9824-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9824-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9824-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9824-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9824-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9824-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9824-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9824-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9824-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9824-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9824-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9824-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9824-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9824-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9824-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9824-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9824-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9824-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9824-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9824-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9824-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9824-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9824-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9824-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9824-- Scanning root segment: 0x701a000..0x701afff (4096)
--9824-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9824-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9824-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9824-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9824-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9824-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9824-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9824-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9824-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9824-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9824== Checked 4,767,064 bytes
==9824==
==9824== LEAK SUMMARY:
==9824== definitely lost: 2,189 bytes in 12 blocks
==9824== indirectly lost: 6,756 bytes in 7 blocks
==9824== possibly lost: 0 bytes in 0 blocks
==9824== still reachable: 3,104,096 bytes in 68,943 blocks
==9824== suppressed: 0 bytes in 0 blocks
==9824== Rerun with --leak-check=full to see details of leaked memory
==9824==
==9824== Use --track-origins=yes to see where uninitialised values come from
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824==
==9824== 1 errors in context 1 of 2:
==9824== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9824== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9824== by 0x488CD0: stringsubst (subst.c:301)
==9824== by 0x48801B: prefork (subst.c:77)
==9824== by 0x42B318: execcmd (exec.c:2619)
==9824== by 0x428CA0: execpline2 (exec.c:1697)
==9824== by 0x427FD2: execpline (exec.c:1484)
==9824== by 0x427756: execlist (exec.c:1267)
==9824== by 0x42717C: execode (exec.c:1073)
==9824== by 0x431299: runshfunc (exec.c:5040)
==9824== by 0x430E76: doshfunc (exec.c:4920)
==9824== by 0x4302FB: execshfunc (exec.c:4557)
==9824== by 0x42D8C1: execcmd (exec.c:3373)
==9824==
==9824==
==9824== 2 errors in context 2 of 2:
==9824== Conditional jump or move depends on uninitialised value(s)
==9824== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9824== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9824== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9824== by 0x40EFC2: execbuiltin (builtin.c:450)
==9824== by 0x42D8E9: execcmd (exec.c:3378)
==9824== by 0x428CA0: execpline2 (exec.c:1697)
==9824== by 0x427FD2: execpline (exec.c:1484)
==9824== by 0x42779A: execlist (exec.c:1275)
==9824== by 0x42717C: execode (exec.c:1073)
==9824== by 0x431299: runshfunc (exec.c:5040)
==9824== by 0x430E76: doshfunc (exec.c:4920)
==9824== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9824==
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9827-by-pythonnut-on-???
==9827== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9827-by-pythonnut-on-???
==9827== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9827-by-pythonnut-on-???
==9827==
==9827== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9827== don't want to do, unless you know exactly what you're doing,
==9827== or are doing some strange experiment):
==9827== /usr/lib/valgrind/../../bin/vgdb --pid=9827 ...command...
==9827==
==9827== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9827== /path/to/gdb ./zsh
==9827== and then give GDB the following command
==9827== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9827
==9827== --pid is optional if only one valgrind process is running
==9827==
==9828== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9828-by-pythonnut-on-???
==9828== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9828-by-pythonnut-on-???
==9828== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9828-by-pythonnut-on-???
==9828==
==9828== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9828== don't want to do, unless you know exactly what you're doing,
==9828== or are doing some strange experiment):
==9828== /usr/lib/valgrind/../../bin/vgdb --pid=9828 ...command...
==9828==
==9828== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9828== /path/to/gdb ./zsh
==9828== and then give GDB the following command
==9828== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9828
==9828== --pid is optional if only one valgrind process is running
==9828==
==9829== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9829-by-pythonnut-on-???
==9829== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9829-by-pythonnut-on-???
==9829== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9829-by-pythonnut-on-???
==9829==
==9829== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9829== don't want to do, unless you know exactly what you're doing,
==9829== or are doing some strange experiment):
==9829== /usr/lib/valgrind/../../bin/vgdb --pid=9829 ...command...
==9829==
==9829== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9829== /path/to/gdb ./zsh
==9829== and then give GDB the following command
==9829== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9829
==9829== --pid is optional if only one valgrind process is running
==9829==
client request: code 4d430005, addr 0xFFEFF0B2C, len 4
--9829-- Caught __NR_exit; running __libc_freeres()
--9829-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9829==
==9829== HEAP SUMMARY:
==9829== in use at exit: 3,116,830 bytes in 69,028 blocks
==9829== total heap usage: 1,585,237 allocs, 1,516,209 frees, 127,886,085 bytes allocated
==9829==
==9829== Searching for pointers to 69,028 not-freed blocks
--9829-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9829-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9829-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9829-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9829-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9829-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9829-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9829-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9829-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9829-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9829-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9829-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9829-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9829-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9829-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9829-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9829-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9829-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9829-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9829-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9829-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9829-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9829-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9829-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9829-- Scanning root segment: 0x701a000..0x701afff (4096)
--9829-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9829-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9829-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9829-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9829-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9829-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9829-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9829-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9829-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9829-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9829== Checked 4,774,480 bytes
==9829==
==9829== LEAK SUMMARY:
==9829== definitely lost: 2,189 bytes in 12 blocks
==9829== indirectly lost: 6,756 bytes in 7 blocks
==9829== possibly lost: 0 bytes in 0 blocks
==9829== still reachable: 3,107,885 bytes in 69,009 blocks
==9829== suppressed: 0 bytes in 0 blocks
==9829== Rerun with --leak-check=full to see details of leaked memory
==9829==
==9829== Use --track-origins=yes to see where uninitialised values come from
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9829==
==9829== 1 errors in context 1 of 2:
==9829== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9829== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9829== by 0x488CD0: stringsubst (subst.c:301)
==9829== by 0x48801B: prefork (subst.c:77)
==9829== by 0x42B318: execcmd (exec.c:2619)
==9829== by 0x428CA0: execpline2 (exec.c:1697)
==9829== by 0x427FD2: execpline (exec.c:1484)
==9829== by 0x427756: execlist (exec.c:1267)
==9829== by 0x42717C: execode (exec.c:1073)
==9829== by 0x431299: runshfunc (exec.c:5040)
==9829== by 0x430E76: doshfunc (exec.c:4920)
==9829== by 0x4302FB: execshfunc (exec.c:4557)
==9829== by 0x42D8C1: execcmd (exec.c:3373)
==9829==
==9829==
==9829== 2 errors in context 2 of 2:
==9829== Conditional jump or move depends on uninitialised value(s)
==9829== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9829== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9829== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9829== by 0x40EFC2: execbuiltin (builtin.c:450)
==9829== by 0x42D8E9: execcmd (exec.c:3378)
==9829== by 0x428CA0: execpline2 (exec.c:1697)
==9829== by 0x427FD2: execpline (exec.c:1484)
==9829== by 0x42779A: execlist (exec.c:1275)
==9829== by 0x42717C: execode (exec.c:1073)
==9829== by 0x431299: runshfunc (exec.c:5040)
==9829== by 0x430E76: doshfunc (exec.c:4920)
==9829== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9829==
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9832-- Caught __NR_exit; running __libc_freeres()
==9832== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9832-by-pythonnut-on-???
==9832== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9832-by-pythonnut-on-???
==9832== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9832-by-pythonnut-on-???
==9832==
==9832== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9832== don't want to do, unless you know exactly what you're doing,
==9832== or are doing some strange experiment):
==9832== /usr/lib/valgrind/../../bin/vgdb --pid=9832 ...command...
==9832==
==9832== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9832== /path/to/gdb ./zsh
==9832== and then give GDB the following command
==9832== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9832
==9832== --pid is optional if only one valgrind process is running
==9832==
==9833== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9833-by-pythonnut-on-???
==9833== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9833-by-pythonnut-on-???
==9833== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9833-by-pythonnut-on-???
==9833==
==9833== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9833== don't want to do, unless you know exactly what you're doing,
==9833== or are doing some strange experiment):
==9833== /usr/lib/valgrind/../../bin/vgdb --pid=9833 ...command...
==9833==
==9833== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9833== /path/to/gdb ./zsh
==9833== and then give GDB the following command
==9833== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9833
==9833== --pid is optional if only one valgrind process is running
==9833==
client request: code 4d430005, addr 0xFFEFF172C, len 4
--9832-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9832==
==9832== HEAP SUMMARY:
==9832== in use at exit: 3,153,721 bytes in 69,036 blocks
==9832== total heap usage: 1,585,245 allocs, 1,516,209 frees, 127,926,032 bytes allocated
==9832==
==9832== Searching for pointers to 69,036 not-freed blocks
--9832-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9832-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9832-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9832-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9832-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9832-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9832-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9832-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9832-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9832-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9832-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9832-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9832-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9832-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9832-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9832-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9832-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9832-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9832-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9832-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9832-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9832-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9832-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9832-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9832-- Scanning root segment: 0x701a000..0x701afff (4096)
--9832-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9832-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9832-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9832-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9832-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9832-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9832-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9832-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9832-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9832-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9832== Checked 4,886,288 bytes
==9832==
==9832== LEAK SUMMARY:
==9832== definitely lost: 2,189 bytes in 12 blocks
==9832== indirectly lost: 6,756 bytes in 7 blocks
==9832== possibly lost: 0 bytes in 0 blocks
==9832== still reachable: 3,144,776 bytes in 69,017 blocks
==9832== suppressed: 0 bytes in 0 blocks
==9832== Rerun with --leak-check=full to see details of leaked memory
==9832==
==9832== Use --track-origins=yes to see where uninitialised values come from
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9832==
==9832== 1 errors in context 1 of 2:
==9832== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9832== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9832== by 0x488CD0: stringsubst (subst.c:301)
==9832== by 0x48801B: prefork (subst.c:77)
==9832== by 0x42B318: execcmd (exec.c:2619)
==9832== by 0x428CA0: execpline2 (exec.c:1697)
==9832== by 0x427FD2: execpline (exec.c:1484)
==9832== by 0x427756: execlist (exec.c:1267)
==9832== by 0x42717C: execode (exec.c:1073)
==9832== by 0x431299: runshfunc (exec.c:5040)
==9832== by 0x430E76: doshfunc (exec.c:4920)
==9832== by 0x4302FB: execshfunc (exec.c:4557)
==9832== by 0x42D8C1: execcmd (exec.c:3373)
==9832==
==9832==
==9832== 2 errors in context 2 of 2:
==9832== Conditional jump or move depends on uninitialised value(s)
==9832== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9832== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9832== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9832== by 0x40EFC2: execbuiltin (builtin.c:450)
==9832== by 0x42D8E9: execcmd (exec.c:3378)
==9832== by 0x428CA0: execpline2 (exec.c:1697)
==9832== by 0x427FD2: execpline (exec.c:1484)
==9832== by 0x42779A: execlist (exec.c:1275)
==9832== by 0x42717C: execode (exec.c:1073)
==9832== by 0x431299: runshfunc (exec.c:5040)
==9832== by 0x430E76: doshfunc (exec.c:4920)
==9832== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9832==
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9831-by-pythonnut-on-???
==9831== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9831-by-pythonnut-on-???
==9831== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9831-by-pythonnut-on-???
==9831==
==9831== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9831== don't want to do, unless you know exactly what you're doing,
==9831== or are doing some strange experiment):
==9831== /usr/lib/valgrind/../../bin/vgdb --pid=9831 ...command...
==9831==
==9831== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9831== /path/to/gdb ./zsh
==9831== and then give GDB the following command
==9831== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9831
==9831== --pid is optional if only one valgrind process is running
==9831==
--9831-- Caught __NR_exit; running __libc_freeres()
--9831-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9831==
==9831== HEAP SUMMARY:
==9831== in use at exit: 3,153,657 bytes in 69,033 blocks
==9831== total heap usage: 1,585,247 allocs, 1,516,214 frees, 127,926,576 bytes allocated
==9831==
==9831== Searching for pointers to 69,033 not-freed blocks
--9831-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9831-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9831-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9831-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9831-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9831-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9831-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9831-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9831-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9831-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9831-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9831-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9831-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9831-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9831-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9831-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9831-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9831-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9831-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9831-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9831-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9831-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9831-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9831-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9831-- Scanning root segment: 0x701a000..0x701afff (4096)
--9831-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9831-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9831-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9831-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9831-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9831-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9831-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9831-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9831-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9831-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9831== Checked 4,885,616 bytes
==9831==
==9831== LEAK SUMMARY:
==9831== definitely lost: 2,189 bytes in 12 blocks
==9831== indirectly lost: 6,756 bytes in 7 blocks
==9831== possibly lost: 0 bytes in 0 blocks
==9831== still reachable: 3,144,712 bytes in 69,014 blocks
==9831== suppressed: 0 bytes in 0 blocks
==9831== Rerun with --leak-check=full to see details of leaked memory
==9831==
==9831== Use --track-origins=yes to see where uninitialised values come from
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831==
==9831== 1 errors in context 1 of 2:
==9831== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9831== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9831== by 0x488CD0: stringsubst (subst.c:301)
==9831== by 0x48801B: prefork (subst.c:77)
==9831== by 0x42B318: execcmd (exec.c:2619)
==9831== by 0x428CA0: execpline2 (exec.c:1697)
==9831== by 0x427FD2: execpline (exec.c:1484)
==9831== by 0x427756: execlist (exec.c:1267)
==9831== by 0x42717C: execode (exec.c:1073)
==9831== by 0x431299: runshfunc (exec.c:5040)
==9831== by 0x430E76: doshfunc (exec.c:4920)
==9831== by 0x4302FB: execshfunc (exec.c:4557)
==9831== by 0x42D8C1: execcmd (exec.c:3373)
==9831==
==9831==
==9831== 2 errors in context 2 of 2:
==9831== Conditional jump or move depends on uninitialised value(s)
==9831== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9831== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9831== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9831== by 0x40EFC2: execbuiltin (builtin.c:450)
==9831== by 0x42D8E9: execcmd (exec.c:3378)
==9831== by 0x428CA0: execpline2 (exec.c:1697)
==9831== by 0x427FD2: execpline (exec.c:1484)
==9831== by 0x42779A: execlist (exec.c:1275)
==9831== by 0x42717C: execode (exec.c:1073)
==9831== by 0x431299: runshfunc (exec.c:5040)
==9831== by 0x430E76: doshfunc (exec.c:4920)
==9831== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9831==
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9834-by-pythonnut-on-???
==9834== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9834-by-pythonnut-on-???
==9834== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9834-by-pythonnut-on-???
==9834==
==9834== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9834== don't want to do, unless you know exactly what you're doing,
==9834== or are doing some strange experiment):
==9834== /usr/lib/valgrind/../../bin/vgdb --pid=9834 ...command...
==9834==
==9834== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9834== /path/to/gdb ./zsh
==9834== and then give GDB the following command
==9834== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9834
==9834== --pid is optional if only one valgrind process is running
==9834==
==9835== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9835-by-pythonnut-on-???
==9835== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9835-by-pythonnut-on-???
==9835== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9835-by-pythonnut-on-???
==9835==
==9835== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9835== don't want to do, unless you know exactly what you're doing,
==9835== or are doing some strange experiment):
==9835== /usr/lib/valgrind/../../bin/vgdb --pid=9835 ...command...
==9835==
==9835== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9835== /path/to/gdb ./zsh
==9835== and then give GDB the following command
==9835== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9835
==9835== --pid is optional if only one valgrind process is running
==9835==
--9835-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF172C, len 4
--9835-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9835==
==9835== HEAP SUMMARY:
==9835== in use at exit: 3,190,371 bytes in 69,039 blocks
==9835== total heap usage: 1,585,254 allocs, 1,516,215 frees, 127,964,867 bytes allocated
==9835==
==9835== Searching for pointers to 69,039 not-freed blocks
--9835-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9835-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9835-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9835-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9835-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9835-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9835-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9835-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9835-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9835-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9835-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9835-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9835-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9835-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9835-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9835-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9835-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9835-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9835-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9835-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9835-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9835-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9835-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9835-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9835-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9835-- Scanning root segment: 0x701a000..0x701afff (4096)
--9835-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9835-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9835-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9835-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9835-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9835-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9835-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9835-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9835-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9835-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9835== Checked 4,959,800 bytes
==9835==
==9835== LEAK SUMMARY:
==9835== definitely lost: 2,189 bytes in 12 blocks
==9835== indirectly lost: 6,756 bytes in 7 blocks
==9835== possibly lost: 0 bytes in 0 blocks
==9835== still reachable: 3,181,426 bytes in 69,020 blocks
==9835== suppressed: 0 bytes in 0 blocks
==9835== Rerun with --leak-check=full to see details of leaked memory
==9835==
==9835== Use --track-origins=yes to see where uninitialised values come from
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9835==
==9835== 1 errors in context 1 of 2:
==9835== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9835== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9835== by 0x488CD0: stringsubst (subst.c:301)
==9835== by 0x48801B: prefork (subst.c:77)
==9835== by 0x42B318: execcmd (exec.c:2619)
==9835== by 0x428CA0: execpline2 (exec.c:1697)
==9835== by 0x427FD2: execpline (exec.c:1484)
==9835== by 0x427756: execlist (exec.c:1267)
==9835== by 0x42717C: execode (exec.c:1073)
==9835== by 0x431299: runshfunc (exec.c:5040)
==9835== by 0x430E76: doshfunc (exec.c:4920)
==9835== by 0x4302FB: execshfunc (exec.c:4557)
==9835== by 0x42D8C1: execcmd (exec.c:3373)
==9835==
==9835==
==9835== 2 errors in context 2 of 2:
==9835== Conditional jump or move depends on uninitialised value(s)
==9835== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9835== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9835== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9835== by 0x40EFC2: execbuiltin (builtin.c:450)
==9835== by 0x42D8E9: execcmd (exec.c:3378)
==9835== by 0x428CA0: execpline2 (exec.c:1697)
==9835== by 0x427FD2: execpline (exec.c:1484)
==9835== by 0x42779A: execlist (exec.c:1275)
==9835== by 0x42717C: execode (exec.c:1073)
==9835== by 0x431299: runshfunc (exec.c:5040)
==9835== by 0x430E76: doshfunc (exec.c:4920)
==9835== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9835==
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9834-- Caught __NR_exit; running __libc_freeres()
--9834-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9834==
==9834== HEAP SUMMARY:
==9834== in use at exit: 3,153,731 bytes in 69,036 blocks
==9834== total heap usage: 1,585,257 allocs, 1,516,221 frees, 127,965,443 bytes allocated
==9834==
==9834== Searching for pointers to 69,036 not-freed blocks
--9834-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9834-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9834-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9834-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9834-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9834-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9834-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9834-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9834-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9834-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9834-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9834-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9834-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9834-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9834-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9834-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9834-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9834-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9834-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9834-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9834-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9834-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9834-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9834-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9834-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9834-- Scanning root segment: 0x701a000..0x701afff (4096)
--9834-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9834-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9834-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9834-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9834-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9834-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9834-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9834-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9834-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9834-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9834== Checked 4,922,544 bytes
==9834==
==9834== LEAK SUMMARY:
==9834== definitely lost: 2,189 bytes in 12 blocks
==9834== indirectly lost: 6,756 bytes in 7 blocks
==9834== possibly lost: 0 bytes in 0 blocks
==9834== still reachable: 3,144,786 bytes in 69,017 blocks
==9834== suppressed: 0 bytes in 0 blocks
==9834== Rerun with --leak-check=full to see details of leaked memory
==9834==
==9834== Use --track-origins=yes to see where uninitialised values come from
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834==
==9834== 1 errors in context 1 of 2:
==9834== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9834== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9834== by 0x488CD0: stringsubst (subst.c:301)
==9834== by 0x48801B: prefork (subst.c:77)
==9834== by 0x42B318: execcmd (exec.c:2619)
==9834== by 0x428CA0: execpline2 (exec.c:1697)
==9834== by 0x427FD2: execpline (exec.c:1484)
==9834== by 0x427756: execlist (exec.c:1267)
==9834== by 0x42717C: execode (exec.c:1073)
==9834== by 0x431299: runshfunc (exec.c:5040)
==9834== by 0x430E76: doshfunc (exec.c:4920)
==9834== by 0x4302FB: execshfunc (exec.c:4557)
==9834== by 0x42D8C1: execcmd (exec.c:3373)
==9834==
==9834==
==9834== 2 errors in context 2 of 2:
==9834== Conditional jump or move depends on uninitialised value(s)
==9834== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9834== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9834== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9834== by 0x40EFC2: execbuiltin (builtin.c:450)
==9834== by 0x42D8E9: execcmd (exec.c:3378)
==9834== by 0x428CA0: execpline2 (exec.c:1697)
==9834== by 0x427FD2: execpline (exec.c:1484)
==9834== by 0x42779A: execlist (exec.c:1275)
==9834== by 0x42717C: execode (exec.c:1073)
==9834== by 0x431299: runshfunc (exec.c:5040)
==9834== by 0x430E76: doshfunc (exec.c:4920)
==9834== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9834==
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9839-by-pythonnut-on-???
==9839== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9839-by-pythonnut-on-???
==9839== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9839-by-pythonnut-on-???
==9839==
==9839== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9839== don't want to do, unless you know exactly what you're doing,
==9839== or are doing some strange experiment):
==9839== /usr/lib/valgrind/../../bin/vgdb --pid=9839 ...command...
==9839==
==9839== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9839== /path/to/gdb ./zsh
==9839== and then give GDB the following command
==9839== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9839
==9839== --pid is optional if only one valgrind process is running
==9839==
--9840-- Caught __NR_exit; running __libc_freeres()
==9840== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9840-by-pythonnut-on-???
==9840== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9840-by-pythonnut-on-???
==9840== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9840-by-pythonnut-on-???
==9840==
==9840== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9840== don't want to do, unless you know exactly what you're doing,
==9840== or are doing some strange experiment):
==9840== /usr/lib/valgrind/../../bin/vgdb --pid=9840 ...command...
==9840==
==9840== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9840== /path/to/gdb ./zsh
==9840== and then give GDB the following command
==9840== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9840
==9840== --pid is optional if only one valgrind process is running
==9840==
--9840-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9840==
==9840== HEAP SUMMARY:
==9840== in use at exit: 3,154,587 bytes in 69,042 blocks
==9840== total heap usage: 1,585,266 allocs, 1,516,224 frees, 127,933,155 bytes allocated
==9840==
==9840== Searching for pointers to 69,042 not-freed blocks
--9840-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9840-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9840-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9840-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9840-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9840-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9840-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9840-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9840-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9840-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9840-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9840-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9840-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9840-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9840-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9840-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9840-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9840-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9840-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9840-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9840-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9840-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9840-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9840-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9840-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9840-- Scanning root segment: 0x701a000..0x701afff (4096)
--9840-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9840-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9840-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9840-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9840-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9840-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9840-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9840-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9840-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9840-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9840== Checked 4,903,240 bytes
==9840==
==9840== LEAK SUMMARY:
==9840== definitely lost: 2,189 bytes in 12 blocks
==9840== indirectly lost: 6,756 bytes in 7 blocks
==9840== possibly lost: 0 bytes in 0 blocks
==9840== still reachable: 3,145,642 bytes in 69,023 blocks
==9840== suppressed: 0 bytes in 0 blocks
==9840== Rerun with --leak-check=full to see details of leaked memory
==9840==
==9840== Use --track-origins=yes to see where uninitialised values come from
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9840==
==9840== 1 errors in context 1 of 2:
==9840== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9840== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9840== by 0x488CD0: stringsubst (subst.c:301)
==9840== by 0x48801B: prefork (subst.c:77)
==9840== by 0x42B318: execcmd (exec.c:2619)
==9840== by 0x428CA0: execpline2 (exec.c:1697)
==9840== by 0x427FD2: execpline (exec.c:1484)
==9840== by 0x427756: execlist (exec.c:1267)
==9840== by 0x42717C: execode (exec.c:1073)
==9840== by 0x431299: runshfunc (exec.c:5040)
==9840== by 0x430E76: doshfunc (exec.c:4920)
==9840== by 0x4302FB: execshfunc (exec.c:4557)
==9840== by 0x42D8C1: execcmd (exec.c:3373)
==9840==
==9840==
==9840== 2 errors in context 2 of 2:
==9840== Conditional jump or move depends on uninitialised value(s)
==9840== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9840== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9840== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9840== by 0x40EFC2: execbuiltin (builtin.c:450)
==9840== by 0x42D8E9: execcmd (exec.c:3378)
==9840== by 0x428CA0: execpline2 (exec.c:1697)
==9840== by 0x427FD2: execpline (exec.c:1484)
==9840== by 0x42779A: execlist (exec.c:1275)
==9840== by 0x42717C: execode (exec.c:1073)
==9840== by 0x431299: runshfunc (exec.c:5040)
==9840== by 0x430E76: doshfunc (exec.c:4920)
==9840== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9840==
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9839-- Caught __NR_exit; running __libc_freeres()
--9839-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9839==
==9839== HEAP SUMMARY:
==9839== in use at exit: 3,154,352 bytes in 69,042 blocks
==9839== total heap usage: 1,585,303 allocs, 1,516,261 frees, 127,942,664 bytes allocated
==9839==
==9839== Searching for pointers to 69,042 not-freed blocks
--9839-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9839-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9839-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9839-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9839-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9839-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9839-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9839-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9839-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9839-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9839-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9839-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9839-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9839-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9839-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9839-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9839-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9839-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9839-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9839-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9839-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9839-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9839-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9839-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9839-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9839-- Scanning root segment: 0x701a000..0x701afff (4096)
--9839-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9839-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9839-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9839-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9839-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9839-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9839-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9839-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9839-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9839-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9839== Checked 4,902,440 bytes
==9839==
==9839== LEAK SUMMARY:
==9839== definitely lost: 2,189 bytes in 12 blocks
==9839== indirectly lost: 6,756 bytes in 7 blocks
==9839== possibly lost: 0 bytes in 0 blocks
==9839== still reachable: 3,145,407 bytes in 69,023 blocks
==9839== suppressed: 0 bytes in 0 blocks
==9839== Rerun with --leak-check=full to see details of leaked memory
==9839==
==9839== Use --track-origins=yes to see where uninitialised values come from
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839==
==9839== 1 errors in context 1 of 2:
==9839== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9839== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9839== by 0x488CD0: stringsubst (subst.c:301)
==9839== by 0x48801B: prefork (subst.c:77)
==9839== by 0x42B318: execcmd (exec.c:2619)
==9839== by 0x428CA0: execpline2 (exec.c:1697)
==9839== by 0x427FD2: execpline (exec.c:1484)
==9839== by 0x427756: execlist (exec.c:1267)
==9839== by 0x42717C: execode (exec.c:1073)
==9839== by 0x431299: runshfunc (exec.c:5040)
==9839== by 0x430E76: doshfunc (exec.c:4920)
==9839== by 0x4302FB: execshfunc (exec.c:4557)
==9839== by 0x42D8C1: execcmd (exec.c:3373)
==9839==
==9839==
==9839== 2 errors in context 2 of 2:
==9839== Conditional jump or move depends on uninitialised value(s)
==9839== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9839== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9839== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9839== by 0x40EFC2: execbuiltin (builtin.c:450)
==9839== by 0x42D8E9: execcmd (exec.c:3378)
==9839== by 0x428CA0: execpline2 (exec.c:1697)
==9839== by 0x427FD2: execpline (exec.c:1484)
==9839== by 0x42779A: execlist (exec.c:1275)
==9839== by 0x42717C: execode (exec.c:1073)
==9839== by 0x431299: runshfunc (exec.c:5040)
==9839== by 0x430E76: doshfunc (exec.c:4920)
==9839== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9839==
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9841-- Caught __NR_exit; running __libc_freeres()
==9841== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9841-by-pythonnut-on-???
==9841== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9841-by-pythonnut-on-???
==9841== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9841-by-pythonnut-on-???
==9841==
==9841== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9841== don't want to do, unless you know exactly what you're doing,
==9841== or are doing some strange experiment):
==9841== /usr/lib/valgrind/../../bin/vgdb --pid=9841 ...command...
==9841==
==9841== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9841== /path/to/gdb ./zsh
==9841== and then give GDB the following command
==9841== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9841
==9841== --pid is optional if only one valgrind process is running
==9841==
client request: code 4d430005, addr 0xFFEFF1DAC, len 4
--9841-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9841==
--9842-- Caught __NR_exit; running __libc_freeres()
==9841== HEAP SUMMARY:
==9841== in use at exit: 3,117,401 bytes in 69,042 blocks
==9841== total heap usage: 1,585,275 allocs, 1,516,233 frees, 127,936,575 bytes allocated
==9841==
==9842== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9842-by-pythonnut-on-???
==9842== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9842-by-pythonnut-on-???
==9842== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9842-by-pythonnut-on-???
==9842==
==9842== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9842== don't want to do, unless you know exactly what you're doing,
==9842== or are doing some strange experiment):
==9842== /usr/lib/valgrind/../../bin/vgdb --pid=9842 ...command...
==9842==
==9842== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9842== /path/to/gdb ./zsh
==9842== and then give GDB the following command
==9842== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9842
==9842== --pid is optional if only one valgrind process is running
==9842==
==9841== Searching for pointers to 69,042 not-freed blocks
--9841-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9841-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9841-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9841-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9841-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9841-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9841-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9841-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9841-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9841-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9841-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9841-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9841-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9841-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9841-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9841-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9841-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9841-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9841-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9841-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9841-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9841-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9841-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9841-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9841-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9841-- Scanning root segment: 0x701a000..0x701afff (4096)
--9841-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9841-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9841-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9841-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9841-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9841-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9841-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9841-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9841-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9841-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9842-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9842==
==9842== HEAP SUMMARY:
==9842== in use at exit: 3,117,401 bytes in 69,042 blocks
==9842== total heap usage: 1,585,280 allocs, 1,516,238 frees, 127,938,663 bytes allocated
==9842==
==9842== Searching for pointers to 69,042 not-freed blocks
--9842-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9842-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9842-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9842-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9842-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9842-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9842-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9842-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9842-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9842-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9842-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9842-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9842-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9842-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9842-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9842-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9842-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9842-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9842-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9842-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9842-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9842-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9842-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9842-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9842-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9842-- Scanning root segment: 0x701a000..0x701afff (4096)
--9842-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9842-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9842-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9842-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9842-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9842-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9842-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9842-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9842-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9842-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9841== Checked 4,865,048 bytes
==9841==
==9841== LEAK SUMMARY:
==9841== definitely lost: 2,189 bytes in 12 blocks
==9841== indirectly lost: 6,756 bytes in 7 blocks
==9841== possibly lost: 0 bytes in 0 blocks
==9841== still reachable: 3,108,456 bytes in 69,023 blocks
==9841== suppressed: 0 bytes in 0 blocks
==9841== Rerun with --leak-check=full to see details of leaked memory
==9841==
==9841== Use --track-origins=yes to see where uninitialised values come from
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9841==
==9841== 1 errors in context 1 of 2:
==9841== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9841== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9841== by 0x488CD0: stringsubst (subst.c:301)
==9841== by 0x48801B: prefork (subst.c:77)
==9841== by 0x42B318: execcmd (exec.c:2619)
==9841== by 0x428CA0: execpline2 (exec.c:1697)
==9841== by 0x427FD2: execpline (exec.c:1484)
==9841== by 0x427756: execlist (exec.c:1267)
==9841== by 0x42717C: execode (exec.c:1073)
==9841== by 0x431299: runshfunc (exec.c:5040)
==9841== by 0x430E76: doshfunc (exec.c:4920)
==9841== by 0x4302FB: execshfunc (exec.c:4557)
==9841== by 0x42D8C1: execcmd (exec.c:3373)
==9841==
==9841==
==9841== 2 errors in context 2 of 2:
==9841== Conditional jump or move depends on uninitialised value(s)
==9841== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9841== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9841== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9841== by 0x40EFC2: execbuiltin (builtin.c:450)
==9841== by 0x42D8E9: execcmd (exec.c:3378)
==9841== by 0x428CA0: execpline2 (exec.c:1697)
==9841== by 0x427FD2: execpline (exec.c:1484)
==9841== by 0x42779A: execlist (exec.c:1275)
==9841== by 0x42717C: execode (exec.c:1073)
==9841== by 0x431299: runshfunc (exec.c:5040)
==9841== by 0x430E76: doshfunc (exec.c:4920)
==9841== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9841==
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842== Checked 4,865,176 bytes
==9842==
==9842== LEAK SUMMARY:
==9842== definitely lost: 2,213 bytes in 13 blocks
==9842== indirectly lost: 6,796 bytes in 9 blocks
==9842== possibly lost: 0 bytes in 0 blocks
==9842== still reachable: 3,108,392 bytes in 69,020 blocks
==9842== suppressed: 0 bytes in 0 blocks
==9842== Rerun with --leak-check=full to see details of leaked memory
==9842==
==9842== Use --track-origins=yes to see where uninitialised values come from
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842==
==9842== 1 errors in context 1 of 2:
==9842== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9842== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9842== by 0x488CD0: stringsubst (subst.c:301)
==9842== by 0x48801B: prefork (subst.c:77)
==9842== by 0x42B318: execcmd (exec.c:2619)
==9842== by 0x428CA0: execpline2 (exec.c:1697)
==9842== by 0x427FD2: execpline (exec.c:1484)
==9842== by 0x427756: execlist (exec.c:1267)
==9842== by 0x42717C: execode (exec.c:1073)
==9842== by 0x431299: runshfunc (exec.c:5040)
==9842== by 0x430E76: doshfunc (exec.c:4920)
==9842== by 0x4302FB: execshfunc (exec.c:4557)
==9842== by 0x42D8C1: execcmd (exec.c:3373)
==9842==
==9842==
==9842== 2 errors in context 2 of 2:
==9842== Conditional jump or move depends on uninitialised value(s)
==9842== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9842== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9842== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9842== by 0x40EFC2: execbuiltin (builtin.c:450)
==9842== by 0x42D8E9: execcmd (exec.c:3378)
==9842== by 0x428CA0: execpline2 (exec.c:1697)
==9842== by 0x427FD2: execpline (exec.c:1484)
==9842== by 0x42779A: execlist (exec.c:1275)
==9842== by 0x42717C: execode (exec.c:1073)
==9842== by 0x431299: runshfunc (exec.c:5040)
==9842== by 0x430E76: doshfunc (exec.c:4920)
==9842== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9842==
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9844== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9844-by-pythonnut-on-???
==9844== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9844-by-pythonnut-on-???
==9844== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9844-by-pythonnut-on-???
==9844==
==9844== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9844== don't want to do, unless you know exactly what you're doing,
==9844== or are doing some strange experiment):
==9844== /usr/lib/valgrind/../../bin/vgdb --pid=9844 ...command...
==9844==
==9844== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9844== /path/to/gdb ./zsh
==9844== and then give GDB the following command
==9844== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9844
==9844== --pid is optional if only one valgrind process is running
==9844==
client request: code 4d430005, addr 0xFFEFF272C, len 4
--9828-- Caught __NR_exit; running __libc_freeres()
--9828-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9828==
==9828== HEAP SUMMARY:
==9828== in use at exit: 3,116,455 bytes in 69,019 blocks
==9828== total heap usage: 1,585,281 allocs, 1,516,262 frees, 127,939,231 bytes allocated
==9828==
==9828== Searching for pointers to 69,019 not-freed blocks
--9828-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9828-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9828-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9828-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9828-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9828-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9828-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9828-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9828-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9828-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9828-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9828-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9828-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9828-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9828-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9828-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9828-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9828-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9828-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9828-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9828-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9828-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9828-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9828-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9828-- Scanning root segment: 0x701a000..0x701afff (4096)
--9828-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9828-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9828-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9828-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9828-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9828-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9828-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9828-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9828-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9828-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9828== Checked 4,772,048 bytes
==9828==
==9828== LEAK SUMMARY:
==9828== definitely lost: 2,189 bytes in 12 blocks
==9828== indirectly lost: 6,756 bytes in 7 blocks
==9828== possibly lost: 0 bytes in 0 blocks
==9828== still reachable: 3,107,510 bytes in 69,000 blocks
==9828== suppressed: 0 bytes in 0 blocks
==9828== Rerun with --leak-check=full to see details of leaked memory
==9828==
==9828== Use --track-origins=yes to see where uninitialised values come from
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9828==
==9828== 1 errors in context 1 of 2:
==9828== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9828== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9828== by 0x488CD0: stringsubst (subst.c:301)
==9828== by 0x48801B: prefork (subst.c:77)
==9828== by 0x42B318: execcmd (exec.c:2619)
==9828== by 0x428CA0: execpline2 (exec.c:1697)
==9828== by 0x427FD2: execpline (exec.c:1484)
==9828== by 0x427756: execlist (exec.c:1267)
==9828== by 0x42717C: execode (exec.c:1073)
==9828== by 0x431299: runshfunc (exec.c:5040)
==9828== by 0x430E76: doshfunc (exec.c:4920)
==9828== by 0x4302FB: execshfunc (exec.c:4557)
==9828== by 0x42D8C1: execcmd (exec.c:3373)
==9828==
==9828==
==9828== 2 errors in context 2 of 2:
==9828== Conditional jump or move depends on uninitialised value(s)
==9828== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9828== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9828== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9828== by 0x40EFC2: execbuiltin (builtin.c:450)
==9828== by 0x42D8E9: execcmd (exec.c:3378)
==9828== by 0x428CA0: execpline2 (exec.c:1697)
==9828== by 0x427FD2: execpline (exec.c:1484)
==9828== by 0x42779A: execlist (exec.c:1275)
==9828== by 0x42717C: execode (exec.c:1073)
==9828== by 0x431299: runshfunc (exec.c:5040)
==9828== by 0x430E76: doshfunc (exec.c:4920)
==9828== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9828==
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9846-by-pythonnut-on-???
==9846== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9846-by-pythonnut-on-???
==9846== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9846-by-pythonnut-on-???
==9846==
==9846== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9846== don't want to do, unless you know exactly what you're doing,
==9846== or are doing some strange experiment):
==9846== /usr/lib/valgrind/../../bin/vgdb --pid=9846 ...command...
==9846==
==9846== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9846== /path/to/gdb ./zsh
==9846== and then give GDB the following command
==9846== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9846
==9846== --pid is optional if only one valgrind process is running
==9846==
==9845== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9845-by-pythonnut-on-???
==9845== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9845-by-pythonnut-on-???
==9845== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9845-by-pythonnut-on-???
==9845==
==9845== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9845== don't want to do, unless you know exactly what you're doing,
==9845== or are doing some strange experiment):
==9845== /usr/lib/valgrind/../../bin/vgdb --pid=9845 ...command...
==9845==
==9845== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9845== /path/to/gdb ./zsh
==9845== and then give GDB the following command
==9845== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9845
==9845== --pid is optional if only one valgrind process is running
==9845==
--9846-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF305C, len 4
client request: code 4d430005, addr 0xFFEFF2FBC, len 4
--9846-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9846==
==9846== HEAP SUMMARY:
==9846== in use at exit: 3,116,345 bytes in 69,020 blocks
==9846== total heap usage: 1,585,226 allocs, 1,516,206 frees, 127,888,600 bytes allocated
==9846==
==9846== Searching for pointers to 69,020 not-freed blocks
--9846-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9846-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9846-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9846-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9846-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9846-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9846-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9846-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9846-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9846-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9846-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9846-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9846-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9846-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9846-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9846-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9846-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9846-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9846-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9846-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9846-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9846-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9846-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9846-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9846-- Scanning root segment: 0x701a000..0x701afff (4096)
--9846-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9846-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9846-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9846-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9846-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9846-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9846-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9846-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9846-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9846-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9846== Checked 4,773,128 bytes
==9846==
==9846== LEAK SUMMARY:
==9846== definitely lost: 2,189 bytes in 12 blocks
==9846== indirectly lost: 6,756 bytes in 7 blocks
==9846== possibly lost: 0 bytes in 0 blocks
==9846== still reachable: 3,107,400 bytes in 69,001 blocks
==9846== suppressed: 0 bytes in 0 blocks
==9846== Rerun with --leak-check=full to see details of leaked memory
==9846==
==9846== Use --track-origins=yes to see where uninitialised values come from
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846==
==9846== 1 errors in context 1 of 2:
==9846== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9846== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9846== by 0x488CD0: stringsubst (subst.c:301)
==9846== by 0x48801B: prefork (subst.c:77)
==9846== by 0x42B318: execcmd (exec.c:2619)
==9846== by 0x428CA0: execpline2 (exec.c:1697)
==9846== by 0x427FD2: execpline (exec.c:1484)
==9846== by 0x427756: execlist (exec.c:1267)
==9846== by 0x42717C: execode (exec.c:1073)
==9846== by 0x431299: runshfunc (exec.c:5040)
==9846== by 0x430E76: doshfunc (exec.c:4920)
==9846== by 0x4302FB: execshfunc (exec.c:4557)
==9846== by 0x42D8C1: execcmd (exec.c:3373)
==9846==
==9846==
==9846== 2 errors in context 2 of 2:
==9846== Conditional jump or move depends on uninitialised value(s)
==9846== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9846== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9846== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9846== by 0x40EFC2: execbuiltin (builtin.c:450)
==9846== by 0x42D8E9: execcmd (exec.c:3378)
==9846== by 0x428CA0: execpline2 (exec.c:1697)
==9846== by 0x427FD2: execpline (exec.c:1484)
==9846== by 0x42779A: execlist (exec.c:1275)
==9846== by 0x42717C: execode (exec.c:1073)
==9846== by 0x431299: runshfunc (exec.c:5040)
==9846== by 0x430E76: doshfunc (exec.c:4920)
==9846== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9846==
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9845-- Caught __NR_exit; running __libc_freeres()
--9845-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9845==
==9845== HEAP SUMMARY:
==9845== in use at exit: 3,116,281 bytes in 69,017 blocks
==9845== total heap usage: 1,585,231 allocs, 1,516,214 frees, 127,889,456 bytes allocated
==9845==
==9845== Searching for pointers to 69,017 not-freed blocks
--9845-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9845-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9845-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9845-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9845-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9845-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9845-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9845-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9845-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9845-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9845-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9845-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9845-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9845-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9845-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9845-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9845-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9845-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9845-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9845-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9845-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9845-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9845-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9845-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9845-- Scanning root segment: 0x701a000..0x701afff (4096)
--9845-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9845-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9845-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9845-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9845-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9845-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9845-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9845-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9845-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9845-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9845== Checked 4,772,440 bytes
==9845==
==9845== LEAK SUMMARY:
==9845== definitely lost: 2,189 bytes in 12 blocks
==9845== indirectly lost: 6,756 bytes in 7 blocks
==9845== possibly lost: 0 bytes in 0 blocks
==9845== still reachable: 3,107,336 bytes in 68,998 blocks
==9845== suppressed: 0 bytes in 0 blocks
==9845== Rerun with --leak-check=full to see details of leaked memory
==9845==
==9845== Use --track-origins=yes to see where uninitialised values come from
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9845==
==9845== 1 errors in context 1 of 2:
==9845== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9845== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9845== by 0x488CD0: stringsubst (subst.c:301)
==9845== by 0x48801B: prefork (subst.c:77)
==9845== by 0x42B318: execcmd (exec.c:2619)
==9845== by 0x428CA0: execpline2 (exec.c:1697)
==9845== by 0x427FD2: execpline (exec.c:1484)
==9845== by 0x427756: execlist (exec.c:1267)
==9845== by 0x42717C: execode (exec.c:1073)
==9845== by 0x431299: runshfunc (exec.c:5040)
==9845== by 0x430E76: doshfunc (exec.c:4920)
==9845== by 0x4302FB: execshfunc (exec.c:4557)
==9845== by 0x42D8C1: execcmd (exec.c:3373)
==9845==
==9845==
==9845== 2 errors in context 2 of 2:
==9845== Conditional jump or move depends on uninitialised value(s)
==9845== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9845== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9845== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9845== by 0x40EFC2: execbuiltin (builtin.c:450)
==9845== by 0x42D8E9: execcmd (exec.c:3378)
==9845== by 0x428CA0: execpline2 (exec.c:1697)
==9845== by 0x427FD2: execpline (exec.c:1484)
==9845== by 0x42779A: execlist (exec.c:1275)
==9845== by 0x42717C: execode (exec.c:1073)
==9845== by 0x431299: runshfunc (exec.c:5040)
==9845== by 0x430E76: doshfunc (exec.c:4920)
==9845== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9845==
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9851-by-pythonnut-on-???
==9851== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9851-by-pythonnut-on-???
==9851== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9851-by-pythonnut-on-???
==9851==
==9851== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9851== don't want to do, unless you know exactly what you're doing,
==9851== or are doing some strange experiment):
==9851== /usr/lib/valgrind/../../bin/vgdb --pid=9851 ...command...
==9851==
==9851== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9851== /path/to/gdb ./zsh
==9851== and then give GDB the following command
==9851== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9851
==9851== --pid is optional if only one valgrind process is running
==9851==
==9852== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9852-by-pythonnut-on-???
==9852== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9852-by-pythonnut-on-???
==9852== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9852-by-pythonnut-on-???
==9852==
==9852== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9852== don't want to do, unless you know exactly what you're doing,
==9852== or are doing some strange experiment):
==9852== /usr/lib/valgrind/../../bin/vgdb --pid=9852 ...command...
==9852==
==9852== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9852== /path/to/gdb ./zsh
==9852== and then give GDB the following command
==9852== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9852
==9852== --pid is optional if only one valgrind process is running
==9852==
--9852-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF1BFC, len 4
client request: code 4d430005, addr 0xFFEFF1B5C, len 4
--9852-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9852==
==9852== HEAP SUMMARY:
==9852== in use at exit: 3,116,597 bytes in 69,022 blocks
==9852== total heap usage: 1,585,260 allocs, 1,516,238 frees, 127,901,931 bytes allocated
==9852==
==9852== Searching for pointers to 69,022 not-freed blocks
--9852-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9852-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9852-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9852-- Scanning root segment: 0x4037000..0x403afff (16384)
--9852-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9852-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9852-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9852-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9852-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9852-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9852-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9852-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9852-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9852-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9852-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9852-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9852-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9852-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9852-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9852-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9852-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9852-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9852-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9852-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9852-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9852-- Scanning root segment: 0x701a000..0x701afff (4096)
--9852-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9852-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9852-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9852-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9852-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9852-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9852-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9852-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9852-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9852-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9852== Checked 4,791,064 bytes
==9852==
==9852== LEAK SUMMARY:
==9852== definitely lost: 2,189 bytes in 12 blocks
==9852== indirectly lost: 6,756 bytes in 7 blocks
==9852== possibly lost: 0 bytes in 0 blocks
==9852== still reachable: 3,107,652 bytes in 69,003 blocks
==9852== suppressed: 0 bytes in 0 blocks
==9852== Rerun with --leak-check=full to see details of leaked memory
==9852==
==9852== Use --track-origins=yes to see where uninitialised values come from
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9852==
==9852== 1 errors in context 1 of 2:
==9852== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9852== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9852== by 0x488CD0: stringsubst (subst.c:301)
==9852== by 0x48801B: prefork (subst.c:77)
==9852== by 0x42B318: execcmd (exec.c:2619)
==9852== by 0x428CA0: execpline2 (exec.c:1697)
==9852== by 0x427FD2: execpline (exec.c:1484)
==9852== by 0x427756: execlist (exec.c:1267)
==9852== by 0x42717C: execode (exec.c:1073)
==9852== by 0x431299: runshfunc (exec.c:5040)
==9852== by 0x430E76: doshfunc (exec.c:4920)
==9852== by 0x4302FB: execshfunc (exec.c:4557)
==9852== by 0x42D8C1: execcmd (exec.c:3373)
==9852==
==9852==
==9852== 2 errors in context 2 of 2:
==9852== Conditional jump or move depends on uninitialised value(s)
==9852== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9852== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9852== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9852== by 0x40EFC2: execbuiltin (builtin.c:450)
==9852== by 0x42D8E9: execcmd (exec.c:3378)
==9852== by 0x428CA0: execpline2 (exec.c:1697)
==9852== by 0x427FD2: execpline (exec.c:1484)
==9852== by 0x42779A: execlist (exec.c:1275)
==9852== by 0x42717C: execode (exec.c:1073)
==9852== by 0x431299: runshfunc (exec.c:5040)
==9852== by 0x430E76: doshfunc (exec.c:4920)
==9852== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9852==
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9851-- Caught __NR_exit; running __libc_freeres()
--9851-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9851==
==9851== HEAP SUMMARY:
==9851== in use at exit: 3,116,596 bytes in 69,023 blocks
==9851== total heap usage: 1,585,256 allocs, 1,516,233 frees, 127,898,379 bytes allocated
==9851==
==9851== Searching for pointers to 69,023 not-freed blocks
--9851-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9851-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9851-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9851-- Scanning root segment: 0x4037000..0x403afff (16384)
--9851-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9851-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9851-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9851-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9851-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9851-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9851-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9851-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9851-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9851-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9851-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9851-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9851-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9851-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9851-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9851-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9851-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9851-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9851-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9851-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9851-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9851-- Scanning root segment: 0x701a000..0x701afff (4096)
--9851-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9851-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9851-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9851-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9851-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9851-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9851-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9851-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9851-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9851-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9851== Checked 4,790,744 bytes
==9851==
==9851== LEAK SUMMARY:
==9851== definitely lost: 2,189 bytes in 12 blocks
==9851== indirectly lost: 6,756 bytes in 7 blocks
==9851== possibly lost: 0 bytes in 0 blocks
==9851== still reachable: 3,107,651 bytes in 69,004 blocks
==9851== suppressed: 0 bytes in 0 blocks
==9851== Rerun with --leak-check=full to see details of leaked memory
==9851==
==9851== Use --track-origins=yes to see where uninitialised values come from
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851==
==9851== 1 errors in context 1 of 2:
==9851== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9851== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9851== by 0x488CD0: stringsubst (subst.c:301)
==9851== by 0x48801B: prefork (subst.c:77)
==9851== by 0x42B318: execcmd (exec.c:2619)
==9851== by 0x428CA0: execpline2 (exec.c:1697)
==9851== by 0x427FD2: execpline (exec.c:1484)
==9851== by 0x427756: execlist (exec.c:1267)
==9851== by 0x42717C: execode (exec.c:1073)
==9851== by 0x431299: runshfunc (exec.c:5040)
==9851== by 0x430E76: doshfunc (exec.c:4920)
==9851== by 0x4302FB: execshfunc (exec.c:4557)
==9851== by 0x42D8C1: execcmd (exec.c:3373)
==9851==
==9851==
==9851== 2 errors in context 2 of 2:
==9851== Conditional jump or move depends on uninitialised value(s)
==9851== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9851== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9851== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9851== by 0x40EFC2: execbuiltin (builtin.c:450)
==9851== by 0x42D8E9: execcmd (exec.c:3378)
==9851== by 0x428CA0: execpline2 (exec.c:1697)
==9851== by 0x427FD2: execpline (exec.c:1484)
==9851== by 0x42779A: execlist (exec.c:1275)
==9851== by 0x42717C: execode (exec.c:1073)
==9851== by 0x431299: runshfunc (exec.c:5040)
==9851== by 0x430E76: doshfunc (exec.c:4920)
==9851== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9851==
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9856== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9856-by-pythonnut-on-???
==9856== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9856-by-pythonnut-on-???
==9856== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9856-by-pythonnut-on-???
==9856==
==9856== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9856== don't want to do, unless you know exactly what you're doing,
==9856== or are doing some strange experiment):
==9856== /usr/lib/valgrind/../../bin/vgdb --pid=9856 ...command...
==9856==
==9856== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9856== /path/to/gdb ./zsh
==9856== and then give GDB the following command
==9856== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9856
==9856== --pid is optional if only one valgrind process is running
==9856==
client request: code 4d430005, addr 0xFFEFF214C, len 4
==9855== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9855-by-pythonnut-on-???
==9855== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9855-by-pythonnut-on-???
==9855== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9855-by-pythonnut-on-???
==9855==
==9855== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9855== don't want to do, unless you know exactly what you're doing,
==9855== or are doing some strange experiment):
==9855== /usr/lib/valgrind/../../bin/vgdb --pid=9855 ...command...
==9855==
==9855== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9855== /path/to/gdb ./zsh
==9855== and then give GDB the following command
==9855== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9855
==9855== --pid is optional if only one valgrind process is running
==9855==
--9855-- Caught __NR_exit; running __libc_freeres()
--9855-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9855==
==9855== HEAP SUMMARY:
==9855== in use at exit: 3,116,888 bytes in 69,028 blocks
==9855== total heap usage: 1,585,267 allocs, 1,516,239 frees, 127,903,519 bytes allocated
==9855==
==9855== Searching for pointers to 69,028 not-freed blocks
--9855-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9855-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9855-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9855-- Scanning root segment: 0x4037000..0x403afff (16384)
--9855-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9855-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9855-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9855-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9855-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9855-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9855-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9855-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9855-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9855-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9855-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9855-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9855-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9855-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9855-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9855-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9855-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9855-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9855-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9855-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9855-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9855-- Scanning root segment: 0x701a000..0x701afff (4096)
--9855-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9855-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9855-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9855-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9855-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9855-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9855-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9855-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9855-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9855-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9855== Checked 4,790,760 bytes
==9855==
==9855== LEAK SUMMARY:
==9855== definitely lost: 2,189 bytes in 12 blocks
==9855== indirectly lost: 6,756 bytes in 7 blocks
==9855== possibly lost: 0 bytes in 0 blocks
==9855== still reachable: 3,107,943 bytes in 69,009 blocks
==9855== suppressed: 0 bytes in 0 blocks
==9855== Rerun with --leak-check=full to see details of leaked memory
==9855==
==9855== Use --track-origins=yes to see where uninitialised values come from
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9855==
==9855== 1 errors in context 1 of 2:
==9855== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9855== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9855== by 0x488CD0: stringsubst (subst.c:301)
==9855== by 0x48801B: prefork (subst.c:77)
==9855== by 0x42B318: execcmd (exec.c:2619)
==9855== by 0x428CA0: execpline2 (exec.c:1697)
==9855== by 0x427FD2: execpline (exec.c:1484)
==9855== by 0x427756: execlist (exec.c:1267)
==9855== by 0x42717C: execode (exec.c:1073)
==9855== by 0x431299: runshfunc (exec.c:5040)
==9855== by 0x430E76: doshfunc (exec.c:4920)
==9855== by 0x4302FB: execshfunc (exec.c:4557)
==9855== by 0x42D8C1: execcmd (exec.c:3373)
==9855==
==9855==
==9855== 2 errors in context 2 of 2:
==9855== Conditional jump or move depends on uninitialised value(s)
==9855== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9855== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9855== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9855== by 0x40EFC2: execbuiltin (builtin.c:450)
==9855== by 0x42D8E9: execcmd (exec.c:3378)
==9855== by 0x428CA0: execpline2 (exec.c:1697)
==9855== by 0x427FD2: execpline (exec.c:1484)
==9855== by 0x42779A: execlist (exec.c:1275)
==9855== by 0x42717C: execode (exec.c:1073)
==9855== by 0x431299: runshfunc (exec.c:5040)
==9855== by 0x430E76: doshfunc (exec.c:4920)
==9855== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9855==
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF1C9C, len 4
--9857-- Caught __NR_exit; running __libc_freeres()
==9857== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9857-by-pythonnut-on-???
==9857== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9857-by-pythonnut-on-???
==9857== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9857-by-pythonnut-on-???
==9857==
==9857== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9857== don't want to do, unless you know exactly what you're doing,
==9857== or are doing some strange experiment):
==9857== /usr/lib/valgrind/../../bin/vgdb --pid=9857 ...command...
==9857==
==9857== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9857== /path/to/gdb ./zsh
==9857== and then give GDB the following command
==9857== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9857
==9857== --pid is optional if only one valgrind process is running
==9857==
--9857-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9857==
==9857== HEAP SUMMARY:
==9857== in use at exit: 3,116,917 bytes in 69,029 blocks
==9857== total heap usage: 1,585,272 allocs, 1,516,243 frees, 127,905,660 bytes allocated
==9857==
==9857== Searching for pointers to 69,029 not-freed blocks
--9857-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9857-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9857-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9857-- Scanning root segment: 0x4037000..0x403afff (16384)
--9857-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9857-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9857-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9857-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9857-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9857-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9857-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9857-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9857-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9857-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9857-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9857-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9857-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9857-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9857-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9857-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9857-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9857-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9857-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9857-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9857-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9857-- Scanning root segment: 0x701a000..0x701afff (4096)
--9857-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9857-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9857-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9857-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9857-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9857-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9857-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9857-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9857-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9857-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9857== Checked 4,791,056 bytes
==9857==
==9857== LEAK SUMMARY:
==9857== definitely lost: 2,189 bytes in 12 blocks
==9857== indirectly lost: 6,756 bytes in 7 blocks
==9857== possibly lost: 0 bytes in 0 blocks
==9857== still reachable: 3,107,972 bytes in 69,010 blocks
==9857== suppressed: 0 bytes in 0 blocks
==9857== Rerun with --leak-check=full to see details of leaked memory
==9857==
==9857== Use --track-origins=yes to see where uninitialised values come from
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9857==
==9857== 1 errors in context 1 of 2:
==9857== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9857== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9857== by 0x488CD0: stringsubst (subst.c:301)
==9857== by 0x48801B: prefork (subst.c:77)
==9857== by 0x42B318: execcmd (exec.c:2619)
==9857== by 0x428CA0: execpline2 (exec.c:1697)
==9857== by 0x427FD2: execpline (exec.c:1484)
==9857== by 0x427756: execlist (exec.c:1267)
==9857== by 0x42717C: execode (exec.c:1073)
==9857== by 0x431299: runshfunc (exec.c:5040)
==9857== by 0x430E76: doshfunc (exec.c:4920)
==9857== by 0x4302FB: execshfunc (exec.c:4557)
==9857== by 0x42D8C1: execcmd (exec.c:3373)
==9857==
==9857==
==9857== 2 errors in context 2 of 2:
==9857== Conditional jump or move depends on uninitialised value(s)
==9857== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9857== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9857== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9857== by 0x40EFC2: execbuiltin (builtin.c:450)
==9857== by 0x42D8E9: execcmd (exec.c:3378)
==9857== by 0x428CA0: execpline2 (exec.c:1697)
==9857== by 0x427FD2: execpline (exec.c:1484)
==9857== by 0x42779A: execlist (exec.c:1275)
==9857== by 0x42717C: execode (exec.c:1073)
==9857== by 0x431299: runshfunc (exec.c:5040)
==9857== by 0x430E76: doshfunc (exec.c:4920)
==9857== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9857==
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9859== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9859-by-pythonnut-on-???
==9859== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9859-by-pythonnut-on-???
==9859== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9859-by-pythonnut-on-???
==9859==
==9859== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9859== don't want to do, unless you know exactly what you're doing,
==9859== or are doing some strange experiment):
==9859== /usr/lib/valgrind/../../bin/vgdb --pid=9859 ...command...
==9859==
==9859== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9859== /path/to/gdb ./zsh
==9859== and then give GDB the following command
==9859== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9859
==9859== --pid is optional if only one valgrind process is running
==9859==
client request: code 4d430005, addr 0xFFEFF261C, len 4
client request: code 4d430005, addr 0xFFEFF1F9C, len 4
--9827-- Caught __NR_exit; running __libc_freeres()
--9827-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9827==
==9827== HEAP SUMMARY:
==9827== in use at exit: 3,115,045 bytes in 68,981 blocks
==9827== total heap usage: 1,585,281 allocs, 1,516,300 frees, 127,909,600 bytes allocated
==9827==
==9827== Searching for pointers to 68,981 not-freed blocks
--9827-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9827-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9827-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9827-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9827-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9827-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9827-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9827-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9827-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9827-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9827-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9827-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9827-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9827-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9827-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9827-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9827-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9827-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9827-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9827-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9827-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9827-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9827-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9827-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9827-- Scanning root segment: 0x701a000..0x701afff (4096)
--9827-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9827-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9827-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9827-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9827-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9827-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9827-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9827-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9827-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9827-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9827== Checked 4,768,904 bytes
==9827==
==9827== LEAK SUMMARY:
==9827== definitely lost: 2,189 bytes in 12 blocks
==9827== indirectly lost: 6,756 bytes in 7 blocks
==9827== possibly lost: 0 bytes in 0 blocks
==9827== still reachable: 3,106,100 bytes in 68,962 blocks
==9827== suppressed: 0 bytes in 0 blocks
==9827== Rerun with --leak-check=full to see details of leaked memory
==9827==
==9827== Use --track-origins=yes to see where uninitialised values come from
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827==
==9827== 1 errors in context 1 of 2:
==9827== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9827== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9827== by 0x488CD0: stringsubst (subst.c:301)
==9827== by 0x48801B: prefork (subst.c:77)
==9827== by 0x42B318: execcmd (exec.c:2619)
==9827== by 0x428CA0: execpline2 (exec.c:1697)
==9827== by 0x427FD2: execpline (exec.c:1484)
==9827== by 0x427756: execlist (exec.c:1267)
==9827== by 0x42717C: execode (exec.c:1073)
==9827== by 0x431299: runshfunc (exec.c:5040)
==9827== by 0x430E76: doshfunc (exec.c:4920)
==9827== by 0x4302FB: execshfunc (exec.c:4557)
==9827== by 0x42D8C1: execcmd (exec.c:3373)
==9827==
==9827==
==9827== 2 errors in context 2 of 2:
==9827== Conditional jump or move depends on uninitialised value(s)
==9827== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9827== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9827== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9827== by 0x40EFC2: execbuiltin (builtin.c:450)
==9827== by 0x42D8E9: execcmd (exec.c:3378)
==9827== by 0x428CA0: execpline2 (exec.c:1697)
==9827== by 0x427FD2: execpline (exec.c:1484)
==9827== by 0x42779A: execlist (exec.c:1275)
==9827== by 0x42717C: execode (exec.c:1073)
==9827== by 0x431299: runshfunc (exec.c:5040)
==9827== by 0x430E76: doshfunc (exec.c:4920)
==9827== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9827==
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9861-by-pythonnut-on-???
==9861== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9861-by-pythonnut-on-???
==9861== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9861-by-pythonnut-on-???
==9861==
==9861== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9861== don't want to do, unless you know exactly what you're doing,
==9861== or are doing some strange experiment):
==9861== /usr/lib/valgrind/../../bin/vgdb --pid=9861 ...command...
==9861==
==9861== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9861== /path/to/gdb ./zsh
==9861== and then give GDB the following command
==9861== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9861
==9861== --pid is optional if only one valgrind process is running
==9861==
==9862== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9862-by-pythonnut-on-???
==9862== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9862-by-pythonnut-on-???
==9862== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9862-by-pythonnut-on-???
==9862==
==9862== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9862== don't want to do, unless you know exactly what you're doing,
==9862== or are doing some strange experiment):
==9862== /usr/lib/valgrind/../../bin/vgdb --pid=9862 ...command...
==9862==
==9862== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9862== /path/to/gdb ./zsh
==9862== and then give GDB the following command
==9862== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9862
==9862== --pid is optional if only one valgrind process is running
==9862==
client request: code 4d430005, addr 0xFFEFF07BC, len 4
==9863== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9863-by-pythonnut-on-???
==9863== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9863-by-pythonnut-on-???
==9863== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9863-by-pythonnut-on-???
==9863==
==9863== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9863== don't want to do, unless you know exactly what you're doing,
==9863== or are doing some strange experiment):
==9863== /usr/lib/valgrind/../../bin/vgdb --pid=9863 ...command...
==9863==
==9863== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9863== /path/to/gdb ./zsh
==9863== and then give GDB the following command
==9863== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9863
==9863== --pid is optional if only one valgrind process is running
==9863==
--9863-- Caught __NR_exit; running __libc_freeres()
--9863-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9863==
==9863== HEAP SUMMARY:
==9863== in use at exit: 3,116,894 bytes in 69,028 blocks
==9863== total heap usage: 1,585,241 allocs, 1,516,213 frees, 127,888,261 bytes allocated
==9863==
==9863== Searching for pointers to 69,028 not-freed blocks
--9863-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9863-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9863-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9863-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9863-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9863-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9863-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9863-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9863-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9863-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9863-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9863-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9863-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9863-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9863-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9863-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9863-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9863-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9863-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9863-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9863-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9863-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9863-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9863-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9863-- Scanning root segment: 0x701a000..0x701afff (4096)
--9863-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9863-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9863-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9863-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9863-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9863-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9863-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9863-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9863-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9863-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9863== Checked 4,774,744 bytes
==9863==
==9863== LEAK SUMMARY:
==9863== definitely lost: 2,189 bytes in 12 blocks
==9863== indirectly lost: 6,756 bytes in 7 blocks
==9863== possibly lost: 0 bytes in 0 blocks
==9863== still reachable: 3,107,949 bytes in 69,009 blocks
==9863== suppressed: 0 bytes in 0 blocks
==9863== Rerun with --leak-check=full to see details of leaked memory
==9863==
==9863== Use --track-origins=yes to see where uninitialised values come from
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9863==
==9863== 1 errors in context 1 of 2:
==9863== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9863== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9863== by 0x488CD0: stringsubst (subst.c:301)
==9863== by 0x48801B: prefork (subst.c:77)
==9863== by 0x42B318: execcmd (exec.c:2619)
==9863== by 0x428CA0: execpline2 (exec.c:1697)
==9863== by 0x427FD2: execpline (exec.c:1484)
==9863== by 0x427756: execlist (exec.c:1267)
==9863== by 0x42717C: execode (exec.c:1073)
==9863== by 0x431299: runshfunc (exec.c:5040)
==9863== by 0x430E76: doshfunc (exec.c:4920)
==9863== by 0x4302FB: execshfunc (exec.c:4557)
==9863== by 0x42D8C1: execcmd (exec.c:3373)
==9863==
==9863==
==9863== 2 errors in context 2 of 2:
==9863== Conditional jump or move depends on uninitialised value(s)
==9863== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9863== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9863== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9863== by 0x40EFC2: execbuiltin (builtin.c:450)
==9863== by 0x42D8E9: execcmd (exec.c:3378)
==9863== by 0x428CA0: execpline2 (exec.c:1697)
==9863== by 0x427FD2: execpline (exec.c:1484)
==9863== by 0x42779A: execlist (exec.c:1275)
==9863== by 0x42717C: execode (exec.c:1073)
==9863== by 0x431299: runshfunc (exec.c:5040)
==9863== by 0x430E76: doshfunc (exec.c:4920)
==9863== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9863==
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9868-- Caught __NR_exit; running __libc_freeres()
==9868== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9868-by-pythonnut-on-???
==9868== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9868-by-pythonnut-on-???
==9868== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9868-by-pythonnut-on-???
==9868==
==9868== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9868== don't want to do, unless you know exactly what you're doing,
==9868== or are doing some strange experiment):
==9868== /usr/lib/valgrind/../../bin/vgdb --pid=9868 ...command...
==9868==
==9868== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9868== /path/to/gdb ./zsh
==9868== and then give GDB the following command
==9868== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9868
==9868== --pid is optional if only one valgrind process is running
==9868==
==9869== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9869-by-pythonnut-on-???
==9869== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9869-by-pythonnut-on-???
==9869== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9869-by-pythonnut-on-???
==9869==
==9869== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9869== don't want to do, unless you know exactly what you're doing,
==9869== or are doing some strange experiment):
==9869== /usr/lib/valgrind/../../bin/vgdb --pid=9869 ...command...
==9869==
==9869== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9869== /path/to/gdb ./zsh
==9869== and then give GDB the following command
==9869== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9869
==9869== --pid is optional if only one valgrind process is running
==9869==
client request: code 4d430005, addr 0xFFEFF13BC, len 4
--9868-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9868==
==9868== HEAP SUMMARY:
==9868== in use at exit: 3,153,785 bytes in 69,036 blocks
==9868== total heap usage: 1,585,249 allocs, 1,516,213 frees, 127,928,208 bytes allocated
==9868==
==9868== Searching for pointers to 69,036 not-freed blocks
--9868-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9868-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9868-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9868-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9868-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9868-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9868-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9868-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9868-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9868-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9868-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9868-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9868-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9868-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9868-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9868-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9868-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9868-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9868-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9868-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9868-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9868-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9868-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9868-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9868-- Scanning root segment: 0x701a000..0x701afff (4096)
--9868-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9868-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9868-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9868-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9868-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9868-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9868-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9868-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9868-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9868-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9868== Checked 4,886,552 bytes
==9868==
==9868== LEAK SUMMARY:
==9868== definitely lost: 2,189 bytes in 12 blocks
==9868== indirectly lost: 6,756 bytes in 7 blocks
==9868== possibly lost: 0 bytes in 0 blocks
==9868== still reachable: 3,144,840 bytes in 69,017 blocks
==9868== suppressed: 0 bytes in 0 blocks
==9868== Rerun with --leak-check=full to see details of leaked memory
==9868==
==9868== Use --track-origins=yes to see where uninitialised values come from
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9868==
==9868== 1 errors in context 1 of 2:
==9868== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9868== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9868== by 0x488CD0: stringsubst (subst.c:301)
==9868== by 0x48801B: prefork (subst.c:77)
==9868== by 0x42B318: execcmd (exec.c:2619)
==9868== by 0x428CA0: execpline2 (exec.c:1697)
==9868== by 0x427FD2: execpline (exec.c:1484)
==9868== by 0x427756: execlist (exec.c:1267)
==9868== by 0x42717C: execode (exec.c:1073)
==9868== by 0x431299: runshfunc (exec.c:5040)
==9868== by 0x430E76: doshfunc (exec.c:4920)
==9868== by 0x4302FB: execshfunc (exec.c:4557)
==9868== by 0x42D8C1: execcmd (exec.c:3373)
==9868==
==9868==
==9868== 2 errors in context 2 of 2:
==9868== Conditional jump or move depends on uninitialised value(s)
==9868== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9868== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9868== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9868== by 0x40EFC2: execbuiltin (builtin.c:450)
==9868== by 0x42D8E9: execcmd (exec.c:3378)
==9868== by 0x428CA0: execpline2 (exec.c:1697)
==9868== by 0x427FD2: execpline (exec.c:1484)
==9868== by 0x42779A: execlist (exec.c:1275)
==9868== by 0x42717C: execode (exec.c:1073)
==9868== by 0x431299: runshfunc (exec.c:5040)
==9868== by 0x430E76: doshfunc (exec.c:4920)
==9868== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9868==
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9867-by-pythonnut-on-???
==9867== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9867-by-pythonnut-on-???
==9867== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9867-by-pythonnut-on-???
==9867==
==9867== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9867== don't want to do, unless you know exactly what you're doing,
==9867== or are doing some strange experiment):
==9867== /usr/lib/valgrind/../../bin/vgdb --pid=9867 ...command...
==9867==
==9867== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9867== /path/to/gdb ./zsh
==9867== and then give GDB the following command
==9867== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9867
==9867== --pid is optional if only one valgrind process is running
==9867==
--9867-- Caught __NR_exit; running __libc_freeres()
--9867-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9867==
==9867== HEAP SUMMARY:
==9867== in use at exit: 3,153,721 bytes in 69,033 blocks
==9867== total heap usage: 1,585,251 allocs, 1,516,218 frees, 127,928,752 bytes allocated
==9867==
==9867== Searching for pointers to 69,033 not-freed blocks
--9867-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9867-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9867-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9867-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9867-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9867-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9867-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9867-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9867-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9867-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9867-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9867-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9867-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9867-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9867-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9867-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9867-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9867-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9867-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9867-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9867-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9867-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9867-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9867-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9867-- Scanning root segment: 0x701a000..0x701afff (4096)
--9867-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9867-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9867-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9867-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9867-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9867-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9867-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9867-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9867-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9867-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9867== Checked 4,885,880 bytes
==9867==
==9867== LEAK SUMMARY:
==9867== definitely lost: 2,189 bytes in 12 blocks
==9867== indirectly lost: 6,756 bytes in 7 blocks
==9867== possibly lost: 0 bytes in 0 blocks
==9867== still reachable: 3,144,776 bytes in 69,014 blocks
==9867== suppressed: 0 bytes in 0 blocks
==9867== Rerun with --leak-check=full to see details of leaked memory
==9867==
==9867== Use --track-origins=yes to see where uninitialised values come from
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867==
==9867== 1 errors in context 1 of 2:
==9867== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9867== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9867== by 0x488CD0: stringsubst (subst.c:301)
==9867== by 0x48801B: prefork (subst.c:77)
==9867== by 0x42B318: execcmd (exec.c:2619)
==9867== by 0x428CA0: execpline2 (exec.c:1697)
==9867== by 0x427FD2: execpline (exec.c:1484)
==9867== by 0x427756: execlist (exec.c:1267)
==9867== by 0x42717C: execode (exec.c:1073)
==9867== by 0x431299: runshfunc (exec.c:5040)
==9867== by 0x430E76: doshfunc (exec.c:4920)
==9867== by 0x4302FB: execshfunc (exec.c:4557)
==9867== by 0x42D8C1: execcmd (exec.c:3373)
==9867==
==9867==
==9867== 2 errors in context 2 of 2:
==9867== Conditional jump or move depends on uninitialised value(s)
==9867== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9867== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9867== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9867== by 0x40EFC2: execbuiltin (builtin.c:450)
==9867== by 0x42D8E9: execcmd (exec.c:3378)
==9867== by 0x428CA0: execpline2 (exec.c:1697)
==9867== by 0x427FD2: execpline (exec.c:1484)
==9867== by 0x42779A: execlist (exec.c:1275)
==9867== by 0x42717C: execode (exec.c:1073)
==9867== by 0x431299: runshfunc (exec.c:5040)
==9867== by 0x430E76: doshfunc (exec.c:4920)
==9867== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9867==
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9870-by-pythonnut-on-???
==9870== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9870-by-pythonnut-on-???
==9870== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9870-by-pythonnut-on-???
==9870==
==9870== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9870== don't want to do, unless you know exactly what you're doing,
==9870== or are doing some strange experiment):
==9870== /usr/lib/valgrind/../../bin/vgdb --pid=9870 ...command...
==9870==
==9870== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9870== /path/to/gdb ./zsh
==9870== and then give GDB the following command
==9870== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9870
==9870== --pid is optional if only one valgrind process is running
==9870==
==9871== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9871-by-pythonnut-on-???
==9871== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9871-by-pythonnut-on-???
==9871== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9871-by-pythonnut-on-???
==9871==
==9871== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9871== don't want to do, unless you know exactly what you're doing,
==9871== or are doing some strange experiment):
==9871== /usr/lib/valgrind/../../bin/vgdb --pid=9871 ...command...
==9871==
==9871== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9871== /path/to/gdb ./zsh
==9871== and then give GDB the following command
==9871== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9871
==9871== --pid is optional if only one valgrind process is running
==9871==
--9871-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF13BC, len 4
--9871-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9871==
==9871== HEAP SUMMARY:
==9871== in use at exit: 3,190,435 bytes in 69,039 blocks
==9871== total heap usage: 1,585,258 allocs, 1,516,219 frees, 127,967,043 bytes allocated
==9871==
==9871== Searching for pointers to 69,039 not-freed blocks
--9871-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9871-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9871-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9871-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9871-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9871-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9871-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9871-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9871-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9871-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9871-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9871-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9871-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9871-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9871-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9871-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9871-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9871-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9871-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9871-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9871-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9871-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9871-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9871-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9871-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9871-- Scanning root segment: 0x701a000..0x701afff (4096)
--9871-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9871-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9871-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9871-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9871-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9871-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9871-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9871-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9871-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9871-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9871== Checked 4,960,064 bytes
==9871==
==9871== LEAK SUMMARY:
==9871== definitely lost: 2,189 bytes in 12 blocks
==9871== indirectly lost: 6,756 bytes in 7 blocks
==9871== possibly lost: 0 bytes in 0 blocks
==9871== still reachable: 3,181,490 bytes in 69,020 blocks
==9871== suppressed: 0 bytes in 0 blocks
==9871== Rerun with --leak-check=full to see details of leaked memory
==9871==
==9871== Use --track-origins=yes to see where uninitialised values come from
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9871==
==9871== 1 errors in context 1 of 2:
==9871== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9871== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9871== by 0x488CD0: stringsubst (subst.c:301)
==9871== by 0x48801B: prefork (subst.c:77)
==9871== by 0x42B318: execcmd (exec.c:2619)
==9871== by 0x428CA0: execpline2 (exec.c:1697)
==9871== by 0x427FD2: execpline (exec.c:1484)
==9871== by 0x427756: execlist (exec.c:1267)
==9871== by 0x42717C: execode (exec.c:1073)
==9871== by 0x431299: runshfunc (exec.c:5040)
==9871== by 0x430E76: doshfunc (exec.c:4920)
==9871== by 0x4302FB: execshfunc (exec.c:4557)
==9871== by 0x42D8C1: execcmd (exec.c:3373)
==9871==
==9871==
==9871== 2 errors in context 2 of 2:
==9871== Conditional jump or move depends on uninitialised value(s)
==9871== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9871== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9871== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9871== by 0x40EFC2: execbuiltin (builtin.c:450)
==9871== by 0x42D8E9: execcmd (exec.c:3378)
==9871== by 0x428CA0: execpline2 (exec.c:1697)
==9871== by 0x427FD2: execpline (exec.c:1484)
==9871== by 0x42779A: execlist (exec.c:1275)
==9871== by 0x42717C: execode (exec.c:1073)
==9871== by 0x431299: runshfunc (exec.c:5040)
==9871== by 0x430E76: doshfunc (exec.c:4920)
==9871== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9871==
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9870-- Caught __NR_exit; running __libc_freeres()
--9870-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9870==
==9870== HEAP SUMMARY:
==9870== in use at exit: 3,153,795 bytes in 69,036 blocks
==9870== total heap usage: 1,585,261 allocs, 1,516,225 frees, 127,967,619 bytes allocated
==9870==
==9870== Searching for pointers to 69,036 not-freed blocks
--9870-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9870-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9870-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9870-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9870-- Scanning root segment: 0x41d6000..0x41defff (36864)
--9870-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9870-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9870-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9870-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9870-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9870-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9870-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9870-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9870-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9870-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9870-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9870-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9870-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9870-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9870-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9870-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9870-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9870-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9870-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9870-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9870-- Scanning root segment: 0x701a000..0x701afff (4096)
--9870-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9870-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9870-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9870-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9870-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9870-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9870-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9870-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9870-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9870-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9870== Checked 4,922,808 bytes
==9870==
==9870== LEAK SUMMARY:
==9870== definitely lost: 2,189 bytes in 12 blocks
==9870== indirectly lost: 6,756 bytes in 7 blocks
==9870== possibly lost: 0 bytes in 0 blocks
==9870== still reachable: 3,144,850 bytes in 69,017 blocks
==9870== suppressed: 0 bytes in 0 blocks
==9870== Rerun with --leak-check=full to see details of leaked memory
==9870==
==9870== Use --track-origins=yes to see where uninitialised values come from
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870==
==9870== 1 errors in context 1 of 2:
==9870== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9870== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9870== by 0x488CD0: stringsubst (subst.c:301)
==9870== by 0x48801B: prefork (subst.c:77)
==9870== by 0x42B318: execcmd (exec.c:2619)
==9870== by 0x428CA0: execpline2 (exec.c:1697)
==9870== by 0x427FD2: execpline (exec.c:1484)
==9870== by 0x427756: execlist (exec.c:1267)
==9870== by 0x42717C: execode (exec.c:1073)
==9870== by 0x431299: runshfunc (exec.c:5040)
==9870== by 0x430E76: doshfunc (exec.c:4920)
==9870== by 0x4302FB: execshfunc (exec.c:4557)
==9870== by 0x42D8C1: execcmd (exec.c:3373)
==9870==
==9870==
==9870== 2 errors in context 2 of 2:
==9870== Conditional jump or move depends on uninitialised value(s)
==9870== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9870== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9870== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9870== by 0x40EFC2: execbuiltin (builtin.c:450)
==9870== by 0x42D8E9: execcmd (exec.c:3378)
==9870== by 0x428CA0: execpline2 (exec.c:1697)
==9870== by 0x427FD2: execpline (exec.c:1484)
==9870== by 0x42779A: execlist (exec.c:1275)
==9870== by 0x42717C: execode (exec.c:1073)
==9870== by 0x431299: runshfunc (exec.c:5040)
==9870== by 0x430E76: doshfunc (exec.c:4920)
==9870== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9870==
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9873-by-pythonnut-on-???
==9873== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9873-by-pythonnut-on-???
==9873== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9873-by-pythonnut-on-???
==9873==
==9873== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9873== don't want to do, unless you know exactly what you're doing,
==9873== or are doing some strange experiment):
==9873== /usr/lib/valgrind/../../bin/vgdb --pid=9873 ...command...
==9873==
==9873== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9873== /path/to/gdb ./zsh
==9873== and then give GDB the following command
==9873== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9873
==9873== --pid is optional if only one valgrind process is running
==9873==
--9874-- Caught __NR_exit; running __libc_freeres()
==9874== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9874-by-pythonnut-on-???
==9874== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9874-by-pythonnut-on-???
==9874== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9874-by-pythonnut-on-???
==9874==
==9874== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9874== don't want to do, unless you know exactly what you're doing,
==9874== or are doing some strange experiment):
==9874== /usr/lib/valgrind/../../bin/vgdb --pid=9874 ...command...
==9874==
==9874== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9874== /path/to/gdb ./zsh
==9874== and then give GDB the following command
==9874== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9874
==9874== --pid is optional if only one valgrind process is running
==9874==
--9874-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9874==
==9874== HEAP SUMMARY:
==9874== in use at exit: 3,154,651 bytes in 69,042 blocks
==9874== total heap usage: 1,585,270 allocs, 1,516,228 frees, 127,935,331 bytes allocated
==9874==
==9874== Searching for pointers to 69,042 not-freed blocks
--9874-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9874-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9874-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9874-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9874-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9874-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9874-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9874-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9874-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9874-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9874-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9874-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9874-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9874-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9874-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9874-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9874-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9874-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9874-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9874-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9874-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9874-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9874-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9874-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9874-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9874-- Scanning root segment: 0x701a000..0x701afff (4096)
--9874-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9874-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9874-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9874-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9874-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9874-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9874-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9874-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9874-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9874-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9874== Checked 4,903,504 bytes
==9874==
==9874== LEAK SUMMARY:
==9874== definitely lost: 2,189 bytes in 12 blocks
==9874== indirectly lost: 6,756 bytes in 7 blocks
==9874== possibly lost: 0 bytes in 0 blocks
==9874== still reachable: 3,145,706 bytes in 69,023 blocks
==9874== suppressed: 0 bytes in 0 blocks
==9874== Rerun with --leak-check=full to see details of leaked memory
==9874==
==9874== Use --track-origins=yes to see where uninitialised values come from
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9874==
==9874== 1 errors in context 1 of 2:
==9874== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9874== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9874== by 0x488CD0: stringsubst (subst.c:301)
==9874== by 0x48801B: prefork (subst.c:77)
==9874== by 0x42B318: execcmd (exec.c:2619)
==9874== by 0x428CA0: execpline2 (exec.c:1697)
==9874== by 0x427FD2: execpline (exec.c:1484)
==9874== by 0x427756: execlist (exec.c:1267)
==9874== by 0x42717C: execode (exec.c:1073)
==9874== by 0x431299: runshfunc (exec.c:5040)
==9874== by 0x430E76: doshfunc (exec.c:4920)
==9874== by 0x4302FB: execshfunc (exec.c:4557)
==9874== by 0x42D8C1: execcmd (exec.c:3373)
==9874==
==9874==
==9874== 2 errors in context 2 of 2:
==9874== Conditional jump or move depends on uninitialised value(s)
==9874== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9874== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9874== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9874== by 0x40EFC2: execbuiltin (builtin.c:450)
==9874== by 0x42D8E9: execcmd (exec.c:3378)
==9874== by 0x428CA0: execpline2 (exec.c:1697)
==9874== by 0x427FD2: execpline (exec.c:1484)
==9874== by 0x42779A: execlist (exec.c:1275)
==9874== by 0x42717C: execode (exec.c:1073)
==9874== by 0x431299: runshfunc (exec.c:5040)
==9874== by 0x430E76: doshfunc (exec.c:4920)
==9874== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9874==
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9873-- Caught __NR_exit; running __libc_freeres()
--9873-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9873==
==9873== HEAP SUMMARY:
==9873== in use at exit: 3,154,416 bytes in 69,042 blocks
==9873== total heap usage: 1,585,307 allocs, 1,516,265 frees, 127,944,840 bytes allocated
==9873==
==9873== Searching for pointers to 69,042 not-freed blocks
--9873-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9873-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9873-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9873-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9873-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9873-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9873-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9873-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9873-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9873-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9873-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9873-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9873-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9873-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9873-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9873-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9873-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9873-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9873-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9873-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9873-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9873-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9873-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9873-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9873-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9873-- Scanning root segment: 0x701a000..0x701afff (4096)
--9873-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9873-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9873-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9873-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9873-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9873-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9873-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9873-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9873-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9873-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9873== Checked 4,902,704 bytes
==9873==
==9873== LEAK SUMMARY:
==9873== definitely lost: 2,189 bytes in 12 blocks
==9873== indirectly lost: 6,756 bytes in 7 blocks
==9873== possibly lost: 0 bytes in 0 blocks
==9873== still reachable: 3,145,471 bytes in 69,023 blocks
==9873== suppressed: 0 bytes in 0 blocks
==9873== Rerun with --leak-check=full to see details of leaked memory
==9873==
==9873== Use --track-origins=yes to see where uninitialised values come from
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873==
==9873== 1 errors in context 1 of 2:
==9873== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9873== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9873== by 0x488CD0: stringsubst (subst.c:301)
==9873== by 0x48801B: prefork (subst.c:77)
==9873== by 0x42B318: execcmd (exec.c:2619)
==9873== by 0x428CA0: execpline2 (exec.c:1697)
==9873== by 0x427FD2: execpline (exec.c:1484)
==9873== by 0x427756: execlist (exec.c:1267)
==9873== by 0x42717C: execode (exec.c:1073)
==9873== by 0x431299: runshfunc (exec.c:5040)
==9873== by 0x430E76: doshfunc (exec.c:4920)
==9873== by 0x4302FB: execshfunc (exec.c:4557)
==9873== by 0x42D8C1: execcmd (exec.c:3373)
==9873==
==9873==
==9873== 2 errors in context 2 of 2:
==9873== Conditional jump or move depends on uninitialised value(s)
==9873== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9873== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9873== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9873== by 0x40EFC2: execbuiltin (builtin.c:450)
==9873== by 0x42D8E9: execcmd (exec.c:3378)
==9873== by 0x428CA0: execpline2 (exec.c:1697)
==9873== by 0x427FD2: execpline (exec.c:1484)
==9873== by 0x42779A: execlist (exec.c:1275)
==9873== by 0x42717C: execode (exec.c:1073)
==9873== by 0x431299: runshfunc (exec.c:5040)
==9873== by 0x430E76: doshfunc (exec.c:4920)
==9873== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9873==
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9877-- Caught __NR_exit; running __libc_freeres()
==9877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9877-by-pythonnut-on-???
==9877== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9877-by-pythonnut-on-???
==9877== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9877-by-pythonnut-on-???
==9877==
==9877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9877== don't want to do, unless you know exactly what you're doing,
==9877== or are doing some strange experiment):
==9877== /usr/lib/valgrind/../../bin/vgdb --pid=9877 ...command...
==9877==
==9877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9877== /path/to/gdb ./zsh
==9877== and then give GDB the following command
==9877== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9877
==9877== --pid is optional if only one valgrind process is running
==9877==
client request: code 4d430005, addr 0xFFEFF1A3C, len 4
--9877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9878-- Caught __NR_exit; running __libc_freeres()
==9877==
==9877== HEAP SUMMARY:
==9877== in use at exit: 3,117,465 bytes in 69,042 blocks
==9877== total heap usage: 1,585,279 allocs, 1,516,237 frees, 127,938,751 bytes allocated
==9877==
==9878== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9878-by-pythonnut-on-???
==9878== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9878-by-pythonnut-on-???
==9878== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9878-by-pythonnut-on-???
==9878==
==9878== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9878== don't want to do, unless you know exactly what you're doing,
==9878== or are doing some strange experiment):
==9878== /usr/lib/valgrind/../../bin/vgdb --pid=9878 ...command...
==9878==
==9878== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9878== /path/to/gdb ./zsh
==9878== and then give GDB the following command
==9878== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9878
==9878== --pid is optional if only one valgrind process is running
==9878==
--9878-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9877== Searching for pointers to 69,042 not-freed blocks
==9878==
--9877-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9877-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9877-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9877-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9877-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9877-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9877-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9877-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9877-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9877-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9877-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9877-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9877-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9877-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9877-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9877-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9877-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9877-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9877-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9877-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9877-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9877-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9877-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9877-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9877-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9877-- Scanning root segment: 0x701a000..0x701afff (4096)
--9877-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9877-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9877-- Scanning root segment: 0xae51000..0xae52fff (8192)
==9878== HEAP SUMMARY:
==9878== in use at exit: 3,117,465 bytes in 69,042 blocks
==9878== total heap usage: 1,585,284 allocs, 1,516,242 frees, 127,940,839 bytes allocated
==9878==
--9877-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9877-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9877-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9877-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9877-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9877-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9877-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9878== Searching for pointers to 69,042 not-freed blocks
--9878-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9878-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9878-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9878-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9878-- Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9878-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9878-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9878-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9878-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9878-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9878-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9878-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9878-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9878-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9878-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9878-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9878-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9878-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9878-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9878-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9878-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9878-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9878-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9878-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9878-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9878-- Scanning root segment: 0x701a000..0x701afff (4096)
--9878-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9878-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9878-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9878-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9878-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9878-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9878-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9878-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9878-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9878-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9877== Checked 4,865,312 bytes
==9877==
==9877== LEAK SUMMARY:
==9877== definitely lost: 2,189 bytes in 12 blocks
==9877== indirectly lost: 6,756 bytes in 7 blocks
==9877== possibly lost: 0 bytes in 0 blocks
==9877== still reachable: 3,108,520 bytes in 69,023 blocks
==9877== suppressed: 0 bytes in 0 blocks
==9877== Rerun with --leak-check=full to see details of leaked memory
==9877==
==9877== Use --track-origins=yes to see where uninitialised values come from
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9877==
==9877== 1 errors in context 1 of 2:
==9877== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9877== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9877== by 0x488CD0: stringsubst (subst.c:301)
==9877== by 0x48801B: prefork (subst.c:77)
==9877== by 0x42B318: execcmd (exec.c:2619)
==9877== by 0x428CA0: execpline2 (exec.c:1697)
==9877== by 0x427FD2: execpline (exec.c:1484)
==9877== by 0x427756: execlist (exec.c:1267)
==9877== by 0x42717C: execode (exec.c:1073)
==9877== by 0x431299: runshfunc (exec.c:5040)
==9877== by 0x430E76: doshfunc (exec.c:4920)
==9877== by 0x4302FB: execshfunc (exec.c:4557)
==9877== by 0x42D8C1: execcmd (exec.c:3373)
==9877==
==9877==
==9877== 2 errors in context 2 of 2:
==9877== Conditional jump or move depends on uninitialised value(s)
==9877== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9877== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9877== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9877== by 0x40EFC2: execbuiltin (builtin.c:450)
==9877== by 0x42D8E9: execcmd (exec.c:3378)
==9877== by 0x428CA0: execpline2 (exec.c:1697)
==9877== by 0x427FD2: execpline (exec.c:1484)
==9877== by 0x42779A: execlist (exec.c:1275)
==9877== by 0x42717C: execode (exec.c:1073)
==9877== by 0x431299: runshfunc (exec.c:5040)
==9877== by 0x430E76: doshfunc (exec.c:4920)
==9877== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9877==
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878== Checked 4,865,440 bytes
==9878==
==9878== LEAK SUMMARY:
==9878== definitely lost: 2,213 bytes in 13 blocks
==9878== indirectly lost: 6,796 bytes in 9 blocks
==9878== possibly lost: 0 bytes in 0 blocks
==9878== still reachable: 3,108,456 bytes in 69,020 blocks
==9878== suppressed: 0 bytes in 0 blocks
==9878== Rerun with --leak-check=full to see details of leaked memory
==9878==
==9878== Use --track-origins=yes to see where uninitialised values come from
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878==
==9878== 1 errors in context 1 of 2:
==9878== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9878== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9878== by 0x488CD0: stringsubst (subst.c:301)
==9878== by 0x48801B: prefork (subst.c:77)
==9878== by 0x42B318: execcmd (exec.c:2619)
==9878== by 0x428CA0: execpline2 (exec.c:1697)
==9878== by 0x427FD2: execpline (exec.c:1484)
==9878== by 0x427756: execlist (exec.c:1267)
==9878== by 0x42717C: execode (exec.c:1073)
==9878== by 0x431299: runshfunc (exec.c:5040)
==9878== by 0x430E76: doshfunc (exec.c:4920)
==9878== by 0x4302FB: execshfunc (exec.c:4557)
==9878== by 0x42D8C1: execcmd (exec.c:3373)
==9878==
==9878==
==9878== 2 errors in context 2 of 2:
==9878== Conditional jump or move depends on uninitialised value(s)
==9878== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9878== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9878== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9878== by 0x40EFC2: execbuiltin (builtin.c:450)
==9878== by 0x42D8E9: execcmd (exec.c:3378)
==9878== by 0x428CA0: execpline2 (exec.c:1697)
==9878== by 0x427FD2: execpline (exec.c:1484)
==9878== by 0x42779A: execlist (exec.c:1275)
==9878== by 0x42717C: execode (exec.c:1073)
==9878== by 0x431299: runshfunc (exec.c:5040)
==9878== by 0x430E76: doshfunc (exec.c:4920)
==9878== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9878==
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9880== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9880-by-pythonnut-on-???
==9880== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9880-by-pythonnut-on-???
==9880== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9880-by-pythonnut-on-???
==9880==
==9880== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9880== don't want to do, unless you know exactly what you're doing,
==9880== or are doing some strange experiment):
==9880== /usr/lib/valgrind/../../bin/vgdb --pid=9880 ...command...
==9880==
==9880== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9880== /path/to/gdb ./zsh
==9880== and then give GDB the following command
==9880== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9880
==9880== --pid is optional if only one valgrind process is running
==9880==
client request: code 4d430005, addr 0xFFEFF23BC, len 4
--9862-- Caught __NR_exit; running __libc_freeres()
--9862-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9862==
==9862== HEAP SUMMARY:
==9862== in use at exit: 3,116,519 bytes in 69,019 blocks
==9862== total heap usage: 1,585,285 allocs, 1,516,266 frees, 127,941,407 bytes allocated
==9862==
==9862== Searching for pointers to 69,019 not-freed blocks
--9862-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9862-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9862-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9862-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9862-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9862-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9862-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9862-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9862-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9862-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9862-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9862-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9862-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9862-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9862-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9862-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9862-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9862-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9862-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9862-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9862-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9862-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9862-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9862-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9862-- Scanning root segment: 0x701a000..0x701afff (4096)
--9862-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9862-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9862-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9862-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9862-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9862-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9862-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9862-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9862-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9862-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9862== Checked 4,772,312 bytes
==9862==
==9862== LEAK SUMMARY:
==9862== definitely lost: 2,189 bytes in 12 blocks
==9862== indirectly lost: 6,756 bytes in 7 blocks
==9862== possibly lost: 0 bytes in 0 blocks
==9862== still reachable: 3,107,574 bytes in 69,000 blocks
==9862== suppressed: 0 bytes in 0 blocks
==9862== Rerun with --leak-check=full to see details of leaked memory
==9862==
==9862== Use --track-origins=yes to see where uninitialised values come from
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9862==
==9862== 1 errors in context 1 of 2:
==9862== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9862== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9862== by 0x488CD0: stringsubst (subst.c:301)
==9862== by 0x48801B: prefork (subst.c:77)
==9862== by 0x42B318: execcmd (exec.c:2619)
==9862== by 0x428CA0: execpline2 (exec.c:1697)
==9862== by 0x427FD2: execpline (exec.c:1484)
==9862== by 0x427756: execlist (exec.c:1267)
==9862== by 0x42717C: execode (exec.c:1073)
==9862== by 0x431299: runshfunc (exec.c:5040)
==9862== by 0x430E76: doshfunc (exec.c:4920)
==9862== by 0x4302FB: execshfunc (exec.c:4557)
==9862== by 0x42D8C1: execcmd (exec.c:3373)
==9862==
==9862==
==9862== 2 errors in context 2 of 2:
==9862== Conditional jump or move depends on uninitialised value(s)
==9862== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9862== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9862== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9862== by 0x40EFC2: execbuiltin (builtin.c:450)
==9862== by 0x42D8E9: execcmd (exec.c:3378)
==9862== by 0x428CA0: execpline2 (exec.c:1697)
==9862== by 0x427FD2: execpline (exec.c:1484)
==9862== by 0x42779A: execlist (exec.c:1275)
==9862== by 0x42717C: execode (exec.c:1073)
==9862== by 0x431299: runshfunc (exec.c:5040)
==9862== by 0x430E76: doshfunc (exec.c:4920)
==9862== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9862==
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9882-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF2CEC, len 4
==9882== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9882-by-pythonnut-on-???
==9882== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9882-by-pythonnut-on-???
==9882== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9882-by-pythonnut-on-???
==9882==
==9882== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9882== don't want to do, unless you know exactly what you're doing,
==9882== or are doing some strange experiment):
==9882== /usr/lib/valgrind/../../bin/vgdb --pid=9882 ...command...
==9882==
==9882== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9882== /path/to/gdb ./zsh
==9882== and then give GDB the following command
==9882== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9882
==9882== --pid is optional if only one valgrind process is running
==9882==
client request: code 4d430005, addr 0xFFEFF2C4C, len 4
--9882-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9882==
==9882== HEAP SUMMARY:
==9882== in use at exit: 3,116,409 bytes in 69,020 blocks
==9882== total heap usage: 1,585,230 allocs, 1,516,210 frees, 127,890,776 bytes allocated
==9882==
==9882== Searching for pointers to 69,020 not-freed blocks
--9882-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9882-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9882-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9882-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9882-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9882-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9882-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9882-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9882-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9882-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9882-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9882-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9882-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9882-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9882-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9882-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9882-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9882-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9882-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9882-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9882-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9882-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9882-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9882-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9882-- Scanning root segment: 0x701a000..0x701afff (4096)
--9882-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9882-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9882-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9882-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9882-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9882-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9882-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9882-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9882-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9882-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9882== Checked 4,773,392 bytes
==9882==
==9882== LEAK SUMMARY:
==9882== definitely lost: 2,189 bytes in 12 blocks
==9882== indirectly lost: 6,756 bytes in 7 blocks
==9882== possibly lost: 0 bytes in 0 blocks
==9882== still reachable: 3,107,464 bytes in 69,001 blocks
==9882== suppressed: 0 bytes in 0 blocks
==9882== Rerun with --leak-check=full to see details of leaked memory
==9882==
==9882== Use --track-origins=yes to see where uninitialised values come from
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9882==
==9882== 1 errors in context 1 of 2:
==9882== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9882== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9882== by 0x488CD0: stringsubst (subst.c:301)
==9882== by 0x48801B: prefork (subst.c:77)
==9882== by 0x42B318: execcmd (exec.c:2619)
==9882== by 0x428CA0: execpline2 (exec.c:1697)
==9882== by 0x427FD2: execpline (exec.c:1484)
==9882== by 0x427756: execlist (exec.c:1267)
==9882== by 0x42717C: execode (exec.c:1073)
==9882== by 0x431299: runshfunc (exec.c:5040)
==9882== by 0x430E76: doshfunc (exec.c:4920)
==9882== by 0x4302FB: execshfunc (exec.c:4557)
==9882== by 0x42D8C1: execcmd (exec.c:3373)
==9882==
==9882==
==9882== 2 errors in context 2 of 2:
==9882== Conditional jump or move depends on uninitialised value(s)
==9882== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9882== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9882== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9882== by 0x40EFC2: execbuiltin (builtin.c:450)
==9882== by 0x42D8E9: execcmd (exec.c:3378)
==9882== by 0x428CA0: execpline2 (exec.c:1697)
==9882== by 0x427FD2: execpline (exec.c:1484)
==9882== by 0x42779A: execlist (exec.c:1275)
==9882== by 0x42717C: execode (exec.c:1073)
==9882== by 0x431299: runshfunc (exec.c:5040)
==9882== by 0x430E76: doshfunc (exec.c:4920)
==9882== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9882==
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9881-- Caught __NR_exit; running __libc_freeres()
==9881== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9881-by-pythonnut-on-???
==9881== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9881-by-pythonnut-on-???
==9881== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9881-by-pythonnut-on-???
==9881==
==9881== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9881== don't want to do, unless you know exactly what you're doing,
==9881== or are doing some strange experiment):
==9881== /usr/lib/valgrind/../../bin/vgdb --pid=9881 ...command...
==9881==
==9881== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9881== /path/to/gdb ./zsh
==9881== and then give GDB the following command
==9881== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9881
==9881== --pid is optional if only one valgrind process is running
==9881==
--9881-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9881==
==9881== HEAP SUMMARY:
==9881== in use at exit: 3,116,345 bytes in 69,017 blocks
==9881== total heap usage: 1,585,235 allocs, 1,516,218 frees, 127,891,632 bytes allocated
==9881==
==9881== Searching for pointers to 69,017 not-freed blocks
--9881-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9881-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9881-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9881-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9881-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9881-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9881-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9881-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9881-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9881-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9881-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9881-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9881-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9881-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9881-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9881-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9881-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9881-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9881-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9881-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9881-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9881-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9881-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9881-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9881-- Scanning root segment: 0x701a000..0x701afff (4096)
--9881-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9881-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9881-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9881-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9881-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9881-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9881-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9881-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9881-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9881-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9881== Checked 4,772,704 bytes
==9881==
==9881== LEAK SUMMARY:
==9881== definitely lost: 2,189 bytes in 12 blocks
==9881== indirectly lost: 6,756 bytes in 7 blocks
==9881== possibly lost: 0 bytes in 0 blocks
==9881== still reachable: 3,107,400 bytes in 68,998 blocks
==9881== suppressed: 0 bytes in 0 blocks
==9881== Rerun with --leak-check=full to see details of leaked memory
==9881==
==9881== Use --track-origins=yes to see where uninitialised values come from
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9881==
==9881== 1 errors in context 1 of 2:
==9881== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9881== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9881== by 0x488CD0: stringsubst (subst.c:301)
==9881== by 0x48801B: prefork (subst.c:77)
==9881== by 0x42B318: execcmd (exec.c:2619)
==9881== by 0x428CA0: execpline2 (exec.c:1697)
==9881== by 0x427FD2: execpline (exec.c:1484)
==9881== by 0x427756: execlist (exec.c:1267)
==9881== by 0x42717C: execode (exec.c:1073)
==9881== by 0x431299: runshfunc (exec.c:5040)
==9881== by 0x430E76: doshfunc (exec.c:4920)
==9881== by 0x4302FB: execshfunc (exec.c:4557)
==9881== by 0x42D8C1: execcmd (exec.c:3373)
==9881==
==9881==
==9881== 2 errors in context 2 of 2:
==9881== Conditional jump or move depends on uninitialised value(s)
==9881== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9881== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9881== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9881== by 0x40EFC2: execbuiltin (builtin.c:450)
==9881== by 0x42D8E9: execcmd (exec.c:3378)
==9881== by 0x428CA0: execpline2 (exec.c:1697)
==9881== by 0x427FD2: execpline (exec.c:1484)
==9881== by 0x42779A: execlist (exec.c:1275)
==9881== by 0x42717C: execode (exec.c:1073)
==9881== by 0x431299: runshfunc (exec.c:5040)
==9881== by 0x430E76: doshfunc (exec.c:4920)
==9881== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9881==
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9886-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF188C, len 4
==9886== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9886-by-pythonnut-on-???
==9886== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9886-by-pythonnut-on-???
==9886== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9886-by-pythonnut-on-???
==9886==
==9886== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9886== don't want to do, unless you know exactly what you're doing,
==9886== or are doing some strange experiment):
==9886== /usr/lib/valgrind/../../bin/vgdb --pid=9886 ...command...
==9886==
==9886== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9886== /path/to/gdb ./zsh
==9886== and then give GDB the following command
==9886== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9886
==9886== --pid is optional if only one valgrind process is running
==9886==
client request: code 4d430005, addr 0xFFEFF17EC, len 4
--9886-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9886==
==9886== HEAP SUMMARY:
==9886== in use at exit: 3,116,661 bytes in 69,022 blocks
==9886== total heap usage: 1,585,264 allocs, 1,516,242 frees, 127,904,107 bytes allocated
==9886==
==9886== Searching for pointers to 69,022 not-freed blocks
--9886-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9886-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9886-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9886-- Scanning root segment: 0x4037000..0x403afff (16384)
--9886-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9886-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9886-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9886-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9886-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9886-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9886-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9886-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9886-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9886-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9886-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9886-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9886-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9886-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9886-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9886-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9886-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9886-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9886-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9886-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9886-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9886-- Scanning root segment: 0x701a000..0x701afff (4096)
--9886-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9886-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9886-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9886-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9886-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9886-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9886-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9886-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9886-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9886-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9886== Checked 4,791,328 bytes
==9886==
==9886== LEAK SUMMARY:
==9886== definitely lost: 2,189 bytes in 12 blocks
==9886== indirectly lost: 6,756 bytes in 7 blocks
==9886== possibly lost: 0 bytes in 0 blocks
==9886== still reachable: 3,107,716 bytes in 69,003 blocks
==9886== suppressed: 0 bytes in 0 blocks
==9886== Rerun with --leak-check=full to see details of leaked memory
==9886==
==9886== Use --track-origins=yes to see where uninitialised values come from
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9886==
==9886== 1 errors in context 1 of 2:
==9886== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9886== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9886== by 0x488CD0: stringsubst (subst.c:301)
==9886== by 0x48801B: prefork (subst.c:77)
==9886== by 0x42B318: execcmd (exec.c:2619)
==9886== by 0x428CA0: execpline2 (exec.c:1697)
==9886== by 0x427FD2: execpline (exec.c:1484)
==9886== by 0x427756: execlist (exec.c:1267)
==9886== by 0x42717C: execode (exec.c:1073)
==9886== by 0x431299: runshfunc (exec.c:5040)
==9886== by 0x430E76: doshfunc (exec.c:4920)
==9886== by 0x4302FB: execshfunc (exec.c:4557)
==9886== by 0x42D8C1: execcmd (exec.c:3373)
==9886==
==9886==
==9886== 2 errors in context 2 of 2:
==9886== Conditional jump or move depends on uninitialised value(s)
==9886== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9886== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9886== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9886== by 0x40EFC2: execbuiltin (builtin.c:450)
==9886== by 0x42D8E9: execcmd (exec.c:3378)
==9886== by 0x428CA0: execpline2 (exec.c:1697)
==9886== by 0x427FD2: execpline (exec.c:1484)
==9886== by 0x42779A: execlist (exec.c:1275)
==9886== by 0x42717C: execode (exec.c:1073)
==9886== by 0x431299: runshfunc (exec.c:5040)
==9886== by 0x430E76: doshfunc (exec.c:4920)
==9886== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9886==
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9885-- Caught __NR_exit; running __libc_freeres()
==9885== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9885-by-pythonnut-on-???
==9885== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9885-by-pythonnut-on-???
==9885== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9885-by-pythonnut-on-???
==9885==
==9885== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9885== don't want to do, unless you know exactly what you're doing,
==9885== or are doing some strange experiment):
==9885== /usr/lib/valgrind/../../bin/vgdb --pid=9885 ...command...
==9885==
==9885== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9885== /path/to/gdb ./zsh
==9885== and then give GDB the following command
==9885== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9885
==9885== --pid is optional if only one valgrind process is running
==9885==
--9885-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9885==
==9885== HEAP SUMMARY:
==9885== in use at exit: 3,116,660 bytes in 69,023 blocks
==9885== total heap usage: 1,585,260 allocs, 1,516,237 frees, 127,900,555 bytes allocated
==9885==
==9885== Searching for pointers to 69,023 not-freed blocks
--9885-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9885-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9885-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9885-- Scanning root segment: 0x4037000..0x403afff (16384)
--9885-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9885-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9885-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9885-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9885-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9885-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9885-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9885-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9885-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9885-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9885-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9885-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9885-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9885-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9885-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9885-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9885-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9885-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9885-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9885-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9885-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9885-- Scanning root segment: 0x701a000..0x701afff (4096)
--9885-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9885-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9885-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9885-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9885-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9885-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9885-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9885-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9885-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9885-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9885== Checked 4,791,008 bytes
==9885==
==9885== LEAK SUMMARY:
==9885== definitely lost: 2,189 bytes in 12 blocks
==9885== indirectly lost: 6,756 bytes in 7 blocks
==9885== possibly lost: 0 bytes in 0 blocks
==9885== still reachable: 3,107,715 bytes in 69,004 blocks
==9885== suppressed: 0 bytes in 0 blocks
==9885== Rerun with --leak-check=full to see details of leaked memory
==9885==
==9885== Use --track-origins=yes to see where uninitialised values come from
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9885==
==9885== 1 errors in context 1 of 2:
==9885== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9885== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9885== by 0x488CD0: stringsubst (subst.c:301)
==9885== by 0x48801B: prefork (subst.c:77)
==9885== by 0x42B318: execcmd (exec.c:2619)
==9885== by 0x428CA0: execpline2 (exec.c:1697)
==9885== by 0x427FD2: execpline (exec.c:1484)
==9885== by 0x427756: execlist (exec.c:1267)
==9885== by 0x42717C: execode (exec.c:1073)
==9885== by 0x431299: runshfunc (exec.c:5040)
==9885== by 0x430E76: doshfunc (exec.c:4920)
==9885== by 0x4302FB: execshfunc (exec.c:4557)
==9885== by 0x42D8C1: execcmd (exec.c:3373)
==9885==
==9885==
==9885== 2 errors in context 2 of 2:
==9885== Conditional jump or move depends on uninitialised value(s)
==9885== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9885== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9885== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9885== by 0x40EFC2: execbuiltin (builtin.c:450)
==9885== by 0x42D8E9: execcmd (exec.c:3378)
==9885== by 0x428CA0: execpline2 (exec.c:1697)
==9885== by 0x427FD2: execpline (exec.c:1484)
==9885== by 0x42779A: execlist (exec.c:1275)
==9885== by 0x42717C: execode (exec.c:1073)
==9885== by 0x431299: runshfunc (exec.c:5040)
==9885== by 0x430E76: doshfunc (exec.c:4920)
==9885== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9885==
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF1DDC, len 4
--9891-- Caught __NR_exit; running __libc_freeres()
==9891== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9891-by-pythonnut-on-???
==9891== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9891-by-pythonnut-on-???
==9891== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9891-by-pythonnut-on-???
==9891==
==9891== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9891== don't want to do, unless you know exactly what you're doing,
==9891== or are doing some strange experiment):
==9891== /usr/lib/valgrind/../../bin/vgdb --pid=9891 ...command...
==9891==
==9891== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9891== /path/to/gdb ./zsh
==9891== and then give GDB the following command
==9891== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9891
==9891== --pid is optional if only one valgrind process is running
==9891==
--9891-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9891==
==9891== HEAP SUMMARY:
==9891== in use at exit: 3,116,952 bytes in 69,028 blocks
==9891== total heap usage: 1,585,271 allocs, 1,516,243 frees, 127,905,695 bytes allocated
==9891==
==9891== Searching for pointers to 69,028 not-freed blocks
--9891-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9891-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9891-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9891-- Scanning root segment: 0x4037000..0x403afff (16384)
--9891-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9891-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9891-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9891-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9891-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9891-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9891-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9891-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9891-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9891-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9891-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9891-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9891-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9891-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9891-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9891-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9891-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9891-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9891-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9891-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9891-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9891-- Scanning root segment: 0x701a000..0x701afff (4096)
--9891-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9891-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9891-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9891-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9891-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9891-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9891-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9891-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9891-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9891-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9891== Checked 4,791,024 bytes
==9891==
==9891== LEAK SUMMARY:
==9891== definitely lost: 2,189 bytes in 12 blocks
==9891== indirectly lost: 6,756 bytes in 7 blocks
==9891== possibly lost: 0 bytes in 0 blocks
==9891== still reachable: 3,108,007 bytes in 69,009 blocks
==9891== suppressed: 0 bytes in 0 blocks
==9891== Rerun with --leak-check=full to see details of leaked memory
==9891==
==9891== Use --track-origins=yes to see where uninitialised values come from
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9891==
==9891== 1 errors in context 1 of 2:
==9891== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9891== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9891== by 0x488CD0: stringsubst (subst.c:301)
==9891== by 0x48801B: prefork (subst.c:77)
==9891== by 0x42B318: execcmd (exec.c:2619)
==9891== by 0x428CA0: execpline2 (exec.c:1697)
==9891== by 0x427FD2: execpline (exec.c:1484)
==9891== by 0x427756: execlist (exec.c:1267)
==9891== by 0x42717C: execode (exec.c:1073)
==9891== by 0x431299: runshfunc (exec.c:5040)
==9891== by 0x430E76: doshfunc (exec.c:4920)
==9891== by 0x4302FB: execshfunc (exec.c:4557)
==9891== by 0x42D8C1: execcmd (exec.c:3373)
==9891==
==9891==
==9891== 2 errors in context 2 of 2:
==9891== Conditional jump or move depends on uninitialised value(s)
==9891== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9891== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9891== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9891== by 0x40EFC2: execbuiltin (builtin.c:450)
==9891== by 0x42D8E9: execcmd (exec.c:3378)
==9891== by 0x428CA0: execpline2 (exec.c:1697)
==9891== by 0x427FD2: execpline (exec.c:1484)
==9891== by 0x42779A: execlist (exec.c:1275)
==9891== by 0x42717C: execode (exec.c:1073)
==9891== by 0x431299: runshfunc (exec.c:5040)
==9891== by 0x430E76: doshfunc (exec.c:4920)
==9891== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9891==
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF192C, len 4
--9893-- Caught __NR_exit; running __libc_freeres()
==9893== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9893-by-pythonnut-on-???
==9893== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9893-by-pythonnut-on-???
==9893== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9893-by-pythonnut-on-???
==9893==
==9893== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9893== don't want to do, unless you know exactly what you're doing,
==9893== or are doing some strange experiment):
==9893== /usr/lib/valgrind/../../bin/vgdb --pid=9893 ...command...
==9893==
==9893== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9893== /path/to/gdb ./zsh
==9893== and then give GDB the following command
==9893== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9893
==9893== --pid is optional if only one valgrind process is running
==9893==
--9893-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9893==
==9893== HEAP SUMMARY:
==9893== in use at exit: 3,116,981 bytes in 69,029 blocks
==9893== total heap usage: 1,585,276 allocs, 1,516,247 frees, 127,907,836 bytes allocated
==9893==
==9893== Searching for pointers to 69,029 not-freed blocks
--9893-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9893-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9893-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9893-- Scanning root segment: 0x4037000..0x403afff (16384)
--9893-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9893-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9893-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9893-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9893-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9893-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9893-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9893-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9893-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9893-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9893-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9893-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9893-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9893-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9893-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9893-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9893-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9893-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9893-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9893-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9893-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9893-- Scanning root segment: 0x701a000..0x701afff (4096)
--9893-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9893-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9893-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9893-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9893-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9893-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9893-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9893-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9893-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9893-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9893== Checked 4,791,320 bytes
==9893==
==9893== LEAK SUMMARY:
==9893== definitely lost: 2,189 bytes in 12 blocks
==9893== indirectly lost: 6,756 bytes in 7 blocks
==9893== possibly lost: 0 bytes in 0 blocks
==9893== still reachable: 3,108,036 bytes in 69,010 blocks
==9893== suppressed: 0 bytes in 0 blocks
==9893== Rerun with --leak-check=full to see details of leaked memory
==9893==
==9893== Use --track-origins=yes to see where uninitialised values come from
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9893==
==9893== 1 errors in context 1 of 2:
==9893== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9893== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9893== by 0x488CD0: stringsubst (subst.c:301)
==9893== by 0x48801B: prefork (subst.c:77)
==9893== by 0x42B318: execcmd (exec.c:2619)
==9893== by 0x428CA0: execpline2 (exec.c:1697)
==9893== by 0x427FD2: execpline (exec.c:1484)
==9893== by 0x427756: execlist (exec.c:1267)
==9893== by 0x42717C: execode (exec.c:1073)
==9893== by 0x431299: runshfunc (exec.c:5040)
==9893== by 0x430E76: doshfunc (exec.c:4920)
==9893== by 0x4302FB: execshfunc (exec.c:4557)
==9893== by 0x42D8C1: execcmd (exec.c:3373)
==9893==
==9893==
==9893== 2 errors in context 2 of 2:
==9893== Conditional jump or move depends on uninitialised value(s)
==9893== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9893== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9893== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9893== by 0x40EFC2: execbuiltin (builtin.c:450)
==9893== by 0x42D8E9: execcmd (exec.c:3378)
==9893== by 0x428CA0: execpline2 (exec.c:1697)
==9893== by 0x427FD2: execpline (exec.c:1484)
==9893== by 0x42779A: execlist (exec.c:1275)
==9893== by 0x42717C: execode (exec.c:1073)
==9893== by 0x431299: runshfunc (exec.c:5040)
==9893== by 0x430E76: doshfunc (exec.c:4920)
==9893== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9893==
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF22AC, len 4
client request: code 4d430005, addr 0xFFEFF1C2C, len 4
--9861-- Caught __NR_exit; running __libc_freeres()
--9861-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9861==
==9861== HEAP SUMMARY:
==9861== in use at exit: 3,115,109 bytes in 68,981 blocks
==9861== total heap usage: 1,585,285 allocs, 1,516,304 frees, 127,911,776 bytes allocated
==9861==
==9861== Searching for pointers to 68,981 not-freed blocks
--9861-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9861-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9861-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9861-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9861-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9861-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9861-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9861-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9861-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9861-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9861-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9861-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9861-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9861-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9861-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9861-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9861-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9861-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9861-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9861-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9861-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9861-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9861-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9861-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9861-- Scanning root segment: 0x701a000..0x701afff (4096)
--9861-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9861-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9861-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9861-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9861-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9861-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9861-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9861-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9861-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9861-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9861== Checked 4,769,168 bytes
==9861==
==9861== LEAK SUMMARY:
==9861== definitely lost: 2,189 bytes in 12 blocks
==9861== indirectly lost: 6,756 bytes in 7 blocks
==9861== possibly lost: 0 bytes in 0 blocks
==9861== still reachable: 3,106,164 bytes in 68,962 blocks
==9861== suppressed: 0 bytes in 0 blocks
==9861== Rerun with --leak-check=full to see details of leaked memory
==9861==
==9861== Use --track-origins=yes to see where uninitialised values come from
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861==
==9861== 1 errors in context 1 of 2:
==9861== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9861== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9861== by 0x488CD0: stringsubst (subst.c:301)
==9861== by 0x48801B: prefork (subst.c:77)
==9861== by 0x42B318: execcmd (exec.c:2619)
==9861== by 0x428CA0: execpline2 (exec.c:1697)
==9861== by 0x427FD2: execpline (exec.c:1484)
==9861== by 0x427756: execlist (exec.c:1267)
==9861== by 0x42717C: execode (exec.c:1073)
==9861== by 0x431299: runshfunc (exec.c:5040)
==9861== by 0x430E76: doshfunc (exec.c:4920)
==9861== by 0x4302FB: execshfunc (exec.c:4557)
==9861== by 0x42D8C1: execcmd (exec.c:3373)
==9861==
==9861==
==9861== 2 errors in context 2 of 2:
==9861== Conditional jump or move depends on uninitialised value(s)
==9861== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9861== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9861== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9861== by 0x40EFC2: execbuiltin (builtin.c:450)
==9861== by 0x42D8E9: execcmd (exec.c:3378)
==9861== by 0x428CA0: execpline2 (exec.c:1697)
==9861== by 0x427FD2: execpline (exec.c:1484)
==9861== by 0x42779A: execlist (exec.c:1275)
==9861== by 0x42717C: execode (exec.c:1073)
==9861== by 0x431299: runshfunc (exec.c:5040)
==9861== by 0x430E76: doshfunc (exec.c:4920)
==9861== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9861==
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFFD9EC, len 4
client request: code 4d430005, addr 0xFFEFFD9EC, len 4
==9897== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9897-by-pythonnut-on-???
==9897== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9897-by-pythonnut-on-???
==9897== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9897-by-pythonnut-on-???
==9897==
==9897== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9897== don't want to do, unless you know exactly what you're doing,
==9897== or are doing some strange experiment):
==9897== /usr/lib/valgrind/../../bin/vgdb --pid=9897 ...command...
==9897==
==9897== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9897== /path/to/gdb ./zsh
==9897== and then give GDB the following command
==9897== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9897
==9897== --pid is optional if only one valgrind process is running
==9897==
--9897-- Caught __NR_exit; running __libc_freeres()
--9897-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9897==
==9897== HEAP SUMMARY:
==9897== in use at exit: 3,113,934 bytes in 68,981 blocks
==9897== total heap usage: 1,592,381 allocs, 1,523,400 frees, 128,702,342 bytes allocated
==9897==
==9897== Searching for pointers to 68,981 not-freed blocks
--9897-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9897-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9897-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9897-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9897-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9897-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9897-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9897-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9897-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9897-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9897-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9897-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9897-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9897-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9897-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9897-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9897-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9897-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9897-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9897-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9897-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9897-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9897-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9897-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9897-- Scanning root segment: 0x701a000..0x701afff (4096)
--9897-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9897-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9897-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9897-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9897-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9897-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9897-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9897-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9897-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9897-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9897== Checked 4,770,240 bytes
==9897==
==9897== LEAK SUMMARY:
==9897== definitely lost: 2,189 bytes in 12 blocks
==9897== indirectly lost: 6,756 bytes in 7 blocks
==9897== possibly lost: 0 bytes in 0 blocks
==9897== still reachable: 3,104,989 bytes in 68,962 blocks
==9897== suppressed: 0 bytes in 0 blocks
==9897== Rerun with --leak-check=full to see details of leaked memory
==9897==
==9897== Use --track-origins=yes to see where uninitialised values come from
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9897==
==9897== 1 errors in context 1 of 2:
==9897== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9897== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9897== by 0x488CD0: stringsubst (subst.c:301)
==9897== by 0x48801B: prefork (subst.c:77)
==9897== by 0x42B318: execcmd (exec.c:2619)
==9897== by 0x428CA0: execpline2 (exec.c:1697)
==9897== by 0x427FD2: execpline (exec.c:1484)
==9897== by 0x427756: execlist (exec.c:1267)
==9897== by 0x42717C: execode (exec.c:1073)
==9897== by 0x431299: runshfunc (exec.c:5040)
==9897== by 0x430E76: doshfunc (exec.c:4920)
==9897== by 0x4302FB: execshfunc (exec.c:4557)
==9897== by 0x42D8C1: execcmd (exec.c:3373)
==9897==
==9897==
==9897== 2 errors in context 2 of 2:
==9897== Conditional jump or move depends on uninitialised value(s)
==9897== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9897== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9897== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9897== by 0x40EFC2: execbuiltin (builtin.c:450)
==9897== by 0x42D8E9: execcmd (exec.c:3378)
==9897== by 0x428CA0: execpline2 (exec.c:1697)
==9897== by 0x427FD2: execpline (exec.c:1484)
==9897== by 0x42779A: execlist (exec.c:1275)
==9897== by 0x42717C: execode (exec.c:1073)
==9897== by 0x431299: runshfunc (exec.c:5040)
==9897== by 0x430E76: doshfunc (exec.c:4920)
==9897== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9897==
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9898-by-pythonnut-on-???
==9898== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9898-by-pythonnut-on-???
==9898== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9898-by-pythonnut-on-???
==9898==
==9898== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9898== don't want to do, unless you know exactly what you're doing,
==9898== or are doing some strange experiment):
==9898== /usr/lib/valgrind/../../bin/vgdb --pid=9898 ...command...
==9898==
==9898== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9898== /path/to/gdb ./zsh
==9898== and then give GDB the following command
==9898== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9898
==9898== --pid is optional if only one valgrind process is running
==9898==
==9901== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9901-by-pythonnut-on-???
==9901== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9901-by-pythonnut-on-???
==9901== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9901-by-pythonnut-on-???
==9901==
==9901== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9901== don't want to do, unless you know exactly what you're doing,
==9901== or are doing some strange experiment):
==9901== /usr/lib/valgrind/../../bin/vgdb --pid=9901 ...command...
==9901==
==9901== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9901== /path/to/gdb ./zsh
==9901== and then give GDB the following command
==9901== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9901
==9901== --pid is optional if only one valgrind process is running
==9901==
==9900== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9900-by-pythonnut-on-???
==9900== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9900-by-pythonnut-on-???
==9900== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9900-by-pythonnut-on-???
==9900==
==9900== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9900== don't want to do, unless you know exactly what you're doing,
==9900== or are doing some strange experiment):
==9900== /usr/lib/valgrind/../../bin/vgdb --pid=9900 ...command...
==9900==
==9900== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9900== /path/to/gdb ./zsh
==9900== and then give GDB the following command
==9900== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9900
==9900== --pid is optional if only one valgrind process is running
==9900==
==9904== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9904-by-pythonnut-on-???
==9904== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9904-by-pythonnut-on-???
==9904== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9904-by-pythonnut-on-???
==9904==
==9904== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9904== don't want to do, unless you know exactly what you're doing,
==9904== or are doing some strange experiment):
==9904== /usr/lib/valgrind/../../bin/vgdb --pid=9904 ...command...
==9904==
==9904== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9904== /path/to/gdb ./zsh
==9904== and then give GDB the following command
==9904== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9904
==9904== --pid is optional if only one valgrind process is running
==9904==
==9906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9906-by-pythonnut-on-???
==9906== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9906-by-pythonnut-on-???
==9906== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9906-by-pythonnut-on-???
==9906==
==9906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9906== don't want to do, unless you know exactly what you're doing,
==9906== or are doing some strange experiment):
==9906== /usr/lib/valgrind/../../bin/vgdb --pid=9906 ...command...
==9906==
==9906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9906== /path/to/gdb ./zsh
==9906== and then give GDB the following command
==9906== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9906
==9906== --pid is optional if only one valgrind process is running
==9906==
==9907== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9907-by-pythonnut-on-???
==9907== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9907-by-pythonnut-on-???
==9907== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9907-by-pythonnut-on-???
==9907==
==9907== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9907== don't want to do, unless you know exactly what you're doing,
==9907== or are doing some strange experiment):
==9907== /usr/lib/valgrind/../../bin/vgdb --pid=9907 ...command...
==9907==
==9907== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9907== /path/to/gdb ./zsh
==9907== and then give GDB the following command
==9907== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9907
==9907== --pid is optional if only one valgrind process is running
==9907==
==9908== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9908-by-pythonnut-on-???
==9908== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9908-by-pythonnut-on-???
==9908== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9908-by-pythonnut-on-???
==9908==
==9908== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9908== don't want to do, unless you know exactly what you're doing,
==9908== or are doing some strange experiment):
==9908== /usr/lib/valgrind/../../bin/vgdb --pid=9908 ...command...
==9908==
==9908== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9908== /path/to/gdb ./zsh
==9908== and then give GDB the following command
==9908== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9908
==9908== --pid is optional if only one valgrind process is running
==9908==
--9908-- Caught __NR_exit; running __libc_freeres()
==9911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9911-by-pythonnut-on-???
==9911== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9911-by-pythonnut-on-???
==9911== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9911-by-pythonnut-on-???
==9911==
==9911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9911== don't want to do, unless you know exactly what you're doing,
==9911== or are doing some strange experiment):
==9911== /usr/lib/valgrind/../../bin/vgdb --pid=9911 ...command...
==9911==
==9911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9911== /path/to/gdb ./zsh
==9911== and then give GDB the following command
==9911== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9911
==9911== --pid is optional if only one valgrind process is running
==9911==
client request: code 4d430005, addr 0xFFEFF493C, len 4
--9904-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF028C, len 4
--9908-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9904-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9908==
==9910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9910-by-pythonnut-on-???
==9910== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9910-by-pythonnut-on-???
==9910== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9910-by-pythonnut-on-???
==9910==
==9910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9910== don't want to do, unless you know exactly what you're doing,
==9910== or are doing some strange experiment):
==9910== /usr/lib/valgrind/../../bin/vgdb --pid=9910 ...command...
==9910==
==9910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9910== /path/to/gdb ./zsh
==9910== and then give GDB the following command
==9910== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9910
==9910== --pid is optional if only one valgrind process is running
==9910==
==9908== HEAP SUMMARY:
==9908== in use at exit: 3,112,898 bytes in 68,969 blocks
==9908== total heap usage: 1,592,169 allocs, 1,523,200 frees, 128,480,436 bytes allocated
==9908==
--9910-- Caught __NR_exit; running __libc_freeres()
==9904==
==9904== HEAP SUMMARY:
==9904== in use at exit: 3,119,663 bytes in 69,189 blocks
==9904== total heap usage: 1,592,603 allocs, 1,523,414 frees, 128,713,418 bytes allocated
==9904==
==9908== Searching for pointers to 68,969 not-freed blocks
--9910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9908-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9908-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9908-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9908-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9908-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9908-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9908-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9908-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9908-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9908-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9908-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9908-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9908-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9908-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9908-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9908-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9908-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9908-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9908-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9908-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9908-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9908-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9908-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9908-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9908-- Scanning root segment: 0x701a000..0x701afff (4096)
--9908-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9908-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9908-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9908-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9908-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9908-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9908-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9908-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9908-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9908-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Searching for pointers to 69,189 not-freed blocks
--9904-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9904-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9904-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9904-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9904-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9904-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9904-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9904-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9904-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9904-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9904-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9904-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9904-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9904-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9904-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9904-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9904-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9904-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9904-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9904-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9904-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9904-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9904-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9904-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9904-- Scanning root segment: 0x701a000..0x701afff (4096)
--9904-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9904-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9904-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9904-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9904-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9904-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9904-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9904-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9904-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9904-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9910==
==9910== HEAP SUMMARY:
==9910== in use at exit: 3,114,049 bytes in 68,958 blocks
==9910== total heap usage: 1,592,155 allocs, 1,523,197 frees, 128,591,332 bytes allocated
==9910==
==9910== Searching for pointers to 68,958 not-freed blocks
--9910-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9910-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9910-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9910-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9910-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9910-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9910-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9910-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9910-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9910-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9910-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9910-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9910-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9910-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9910-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9910-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9910-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9910-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9910-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9910-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9910-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9910-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9910-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9910-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9910-- Scanning root segment: 0x701a000..0x701afff (4096)
--9910-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9910-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9910-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9910-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9910-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9910-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9910-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9910-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9910-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9910-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Checked 4,779,408 bytes
==9904==
==9908== Checked 4,768,144 bytes
==9908==
==9904== LEAK SUMMARY:
==9904== definitely lost: 2,189 bytes in 12 blocks
==9904== indirectly lost: 6,756 bytes in 7 blocks
==9904== possibly lost: 0 bytes in 0 blocks
==9904== still reachable: 3,110,718 bytes in 69,170 blocks
==9904== suppressed: 0 bytes in 0 blocks
==9904== Rerun with --leak-check=full to see details of leaked memory
==9904==
==9904== Use --track-origins=yes to see where uninitialised values come from
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9904==
==9904== 1 errors in context 1 of 2:
==9904== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9904== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9904== by 0x488CD0: stringsubst (subst.c:301)
==9904== by 0x48801B: prefork (subst.c:77)
==9904== by 0x42B318: execcmd (exec.c:2619)
==9904== by 0x428CA0: execpline2 (exec.c:1697)
==9904== by 0x427FD2: execpline (exec.c:1484)
==9904== by 0x427756: execlist (exec.c:1267)
==9904== by 0x42717C: execode (exec.c:1073)
==9904== by 0x431299: runshfunc (exec.c:5040)
==9904== by 0x430E76: doshfunc (exec.c:4920)
==9904== by 0x4302FB: execshfunc (exec.c:4557)
==9904== by 0x42D8C1: execcmd (exec.c:3373)
==9904==
==9904==
==9904== 2 errors in context 2 of 2:
==9904== Conditional jump or move depends on uninitialised value(s)
==9904== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9904== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9904== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9904== by 0x40EFC2: execbuiltin (builtin.c:450)
==9904== by 0x42D8E9: execcmd (exec.c:3378)
==9904== by 0x428CA0: execpline2 (exec.c:1697)
==9904== by 0x427FD2: execpline (exec.c:1484)
==9904== by 0x42779A: execlist (exec.c:1275)
==9904== by 0x42717C: execode (exec.c:1073)
==9904== by 0x431299: runshfunc (exec.c:5040)
==9904== by 0x430E76: doshfunc (exec.c:4920)
==9904== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9904==
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908== LEAK SUMMARY:
==9908== definitely lost: 2,189 bytes in 12 blocks
==9908== indirectly lost: 6,756 bytes in 7 blocks
==9908== possibly lost: 0 bytes in 0 blocks
==9908== still reachable: 3,103,953 bytes in 68,950 blocks
==9908== suppressed: 0 bytes in 0 blocks
==9908== Rerun with --leak-check=full to see details of leaked memory
==9908==
==9908== Use --track-origins=yes to see where uninitialised values come from
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908==
==9908== 1 errors in context 1 of 2:
==9908== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9908== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9908== by 0x488CD0: stringsubst (subst.c:301)
==9908== by 0x48801B: prefork (subst.c:77)
==9908== by 0x42B318: execcmd (exec.c:2619)
==9908== by 0x428CA0: execpline2 (exec.c:1697)
==9908== by 0x427FD2: execpline (exec.c:1484)
==9908== by 0x427756: execlist (exec.c:1267)
==9908== by 0x42717C: execode (exec.c:1073)
==9908== by 0x431299: runshfunc (exec.c:5040)
==9908== by 0x430E76: doshfunc (exec.c:4920)
==9908== by 0x4302FB: execshfunc (exec.c:4557)
==9908== by 0x42D8C1: execcmd (exec.c:3373)
==9908==
==9908==
==9908== 2 errors in context 2 of 2:
==9908== Conditional jump or move depends on uninitialised value(s)
==9908== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9908== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9908== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9908== by 0x40EFC2: execbuiltin (builtin.c:450)
==9908== by 0x42D8E9: execcmd (exec.c:3378)
==9908== by 0x428CA0: execpline2 (exec.c:1697)
==9908== by 0x427FD2: execpline (exec.c:1484)
==9908== by 0x42779A: execlist (exec.c:1275)
==9908== by 0x42717C: execode (exec.c:1073)
==9908== by 0x431299: runshfunc (exec.c:5040)
==9908== by 0x430E76: doshfunc (exec.c:4920)
==9908== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9908==
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Caught __NR_exit; running __libc_freeres()
==9910== Checked 4,774,944 bytes
==9910==
--9905-- Caught __NR_exit; running __libc_freeres()
==9905== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9905-by-pythonnut-on-???
==9905== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9905-by-pythonnut-on-???
==9905== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9905-by-pythonnut-on-???
==9905==
==9905== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9905== don't want to do, unless you know exactly what you're doing,
==9905== or are doing some strange experiment):
==9905== /usr/lib/valgrind/../../bin/vgdb --pid=9905 ...command...
==9905==
==9905== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9905== /path/to/gdb ./zsh
==9905== and then give GDB the following command
==9905== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9905
==9905== --pid is optional if only one valgrind process is running
==9905==
==9910== LEAK SUMMARY:
==9910== definitely lost: 2,189 bytes in 12 blocks
==9910== indirectly lost: 6,756 bytes in 7 blocks
==9910== possibly lost: 0 bytes in 0 blocks
==9910== still reachable: 3,105,104 bytes in 68,939 blocks
==9910== suppressed: 0 bytes in 0 blocks
==9910== Rerun with --leak-check=full to see details of leaked memory
==9910==
==9910== Use --track-origins=yes to see where uninitialised values come from
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9910==
==9910== 1 errors in context 1 of 2:
==9910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9910== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9910== by 0x488CD0: stringsubst (subst.c:301)
==9910== by 0x48801B: prefork (subst.c:77)
==9910== by 0x42B318: execcmd (exec.c:2619)
==9910== by 0x428CA0: execpline2 (exec.c:1697)
==9910== by 0x427FD2: execpline (exec.c:1484)
==9910== by 0x427756: execlist (exec.c:1267)
==9910== by 0x42717C: execode (exec.c:1073)
==9910== by 0x431299: runshfunc (exec.c:5040)
==9910== by 0x430E76: doshfunc (exec.c:4920)
==9910== by 0x4302FB: execshfunc (exec.c:4557)
==9910== by 0x42D8C1: execcmd (exec.c:3373)
==9910==
==9910==
==9910== 2 errors in context 2 of 2:
==9910== Conditional jump or move depends on uninitialised value(s)
==9910== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9910== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9910== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9910== by 0x40EFC2: execbuiltin (builtin.c:450)
==9910== by 0x42D8E9: execcmd (exec.c:3378)
==9910== by 0x428CA0: execpline2 (exec.c:1697)
==9910== by 0x427FD2: execpline (exec.c:1484)
==9910== by 0x42779A: execlist (exec.c:1275)
==9910== by 0x42717C: execode (exec.c:1073)
==9910== by 0x431299: runshfunc (exec.c:5040)
==9910== by 0x430E76: doshfunc (exec.c:4920)
==9910== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9910==
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901==
--9905-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901== HEAP SUMMARY:
==9901== in use at exit: 3,117,680 bytes in 69,117 blocks
==9901== total heap usage: 1,592,181 allocs, 1,523,064 frees, 128,474,628 bytes allocated
==9901==
==9905==
==9905== HEAP SUMMARY:
==9905== in use at exit: 3,112,834 bytes in 68,966 blocks
==9905== total heap usage: 1,592,167 allocs, 1,523,201 frees, 128,480,195 bytes allocated
==9905==
client request: code 4d430005, addr 0xFFEFF073C, len 4
==9901== Searching for pointers to 69,117 not-freed blocks
--9901-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9901-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9901-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9901-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9901-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9901-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9901-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9901-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9901-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9901-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9901-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9901-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9901-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9901-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9901-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9901-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9901-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9901-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9901-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9901-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9901-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9901-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9901-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9901-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9901-- Scanning root segment: 0x701a000..0x701afff (4096)
--9901-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9901-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9901-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9901-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9901-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9901-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9901-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9901-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9901-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9901-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9905== Searching for pointers to 68,966 not-freed blocks
--9905-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9905-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9905-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9905-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9905-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9905-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9905-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9905-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9905-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9905-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9905-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9905-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9905-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9905-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9905-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9905-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9905-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9905-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9905-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9905-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9905-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9905-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9905-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9905-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9905-- Scanning root segment: 0x701a000..0x701afff (4096)
--9905-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9905-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9905-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9905-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9905-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9905-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9905-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9905-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9905-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9905-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9901== Checked 4,775,600 bytes
==9901==
==9905== Checked 4,767,456 bytes
==9905==
==9901== LEAK SUMMARY:
==9901== definitely lost: 2,189 bytes in 12 blocks
==9901== indirectly lost: 6,756 bytes in 7 blocks
==9901== possibly lost: 0 bytes in 0 blocks
==9901== still reachable: 3,108,735 bytes in 69,098 blocks
==9901== suppressed: 0 bytes in 0 blocks
==9901== Rerun with --leak-check=full to see details of leaked memory
==9901==
==9901== Use --track-origins=yes to see where uninitialised values come from
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9901==
==9901== 1 errors in context 1 of 2:
==9901== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9901== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9901== by 0x488CD0: stringsubst (subst.c:301)
==9901== by 0x48801B: prefork (subst.c:77)
==9901== by 0x42B318: execcmd (exec.c:2619)
==9901== by 0x428CA0: execpline2 (exec.c:1697)
==9901== by 0x427FD2: execpline (exec.c:1484)
==9901== by 0x427756: execlist (exec.c:1267)
==9901== by 0x42717C: execode (exec.c:1073)
==9901== by 0x431299: runshfunc (exec.c:5040)
==9901== by 0x430E76: doshfunc (exec.c:4920)
==9901== by 0x4302FB: execshfunc (exec.c:4557)
==9901== by 0x42D8C1: execcmd (exec.c:3373)
==9901==
==9901==
==9901== 2 errors in context 2 of 2:
==9901== Conditional jump or move depends on uninitialised value(s)
==9901== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9901== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9901== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9901== by 0x40EFC2: execbuiltin (builtin.c:450)
==9901== by 0x42D8E9: execcmd (exec.c:3378)
==9901== by 0x428CA0: execpline2 (exec.c:1697)
==9901== by 0x427FD2: execpline (exec.c:1484)
==9901== by 0x42779A: execlist (exec.c:1275)
==9901== by 0x42717C: execode (exec.c:1073)
==9901== by 0x431299: runshfunc (exec.c:5040)
==9901== by 0x430E76: doshfunc (exec.c:4920)
==9901== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9901==
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905== LEAK SUMMARY:
==9905== definitely lost: 2,189 bytes in 12 blocks
==9905== indirectly lost: 6,756 bytes in 7 blocks
==9905== possibly lost: 0 bytes in 0 blocks
==9905== still reachable: 3,103,889 bytes in 68,947 blocks
==9905== suppressed: 0 bytes in 0 blocks
==9905== Rerun with --leak-check=full to see details of leaked memory
==9905==
==9905== Use --track-origins=yes to see where uninitialised values come from
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905==
==9905== 1 errors in context 1 of 2:
==9905== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9905== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9905== by 0x488CD0: stringsubst (subst.c:301)
==9905== by 0x48801B: prefork (subst.c:77)
==9905== by 0x42B318: execcmd (exec.c:2619)
==9905== by 0x428CA0: execpline2 (exec.c:1697)
==9905== by 0x427FD2: execpline (exec.c:1484)
==9905== by 0x427756: execlist (exec.c:1267)
==9905== by 0x42717C: execode (exec.c:1073)
==9905== by 0x431299: runshfunc (exec.c:5040)
==9905== by 0x430E76: doshfunc (exec.c:4920)
==9905== by 0x4302FB: execshfunc (exec.c:4557)
==9905== by 0x42D8C1: execcmd (exec.c:3373)
==9905==
==9905==
==9905== 2 errors in context 2 of 2:
==9905== Conditional jump or move depends on uninitialised value(s)
==9905== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9905== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9905== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9905== by 0x40EFC2: execbuiltin (builtin.c:450)
==9905== by 0x42D8E9: execcmd (exec.c:3378)
==9905== by 0x428CA0: execpline2 (exec.c:1697)
==9905== by 0x427FD2: execpline (exec.c:1484)
==9905== by 0x42779A: execlist (exec.c:1275)
==9905== by 0x42717C: execode (exec.c:1073)
==9905== by 0x431299: runshfunc (exec.c:5040)
==9905== by 0x430E76: doshfunc (exec.c:4920)
==9905== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9905==
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9899-by-pythonnut-on-???
==9899== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9899-by-pythonnut-on-???
==9899== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9899-by-pythonnut-on-???
==9899==
==9899== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9899== don't want to do, unless you know exactly what you're doing,
==9899== or are doing some strange experiment):
==9899== /usr/lib/valgrind/../../bin/vgdb --pid=9899 ...command...
==9899==
==9899== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9899== /path/to/gdb ./zsh
==9899== and then give GDB the following command
==9899== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9899
==9899== --pid is optional if only one valgrind process is running
==9899==
--9899-- Caught __NR_exit; running __libc_freeres()
--9930-- Caught __NR_exit; running __libc_freeres()
==9930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9930-by-pythonnut-on-???
==9930== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9930-by-pythonnut-on-???
==9930== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9930-by-pythonnut-on-???
==9930==
==9930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9930== don't want to do, unless you know exactly what you're doing,
==9930== or are doing some strange experiment):
==9930== /usr/lib/valgrind/../../bin/vgdb --pid=9930 ...command...
==9930==
==9930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9930== /path/to/gdb ./zsh
==9930== and then give GDB the following command
==9930== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9930
==9930== --pid is optional if only one valgrind process is running
==9930==
--9899-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899==
--9930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899== HEAP SUMMARY:
==9899== in use at exit: 3,115,695 bytes in 69,046 blocks
==9899== total heap usage: 1,592,139 allocs, 1,523,093 frees, 128,477,878 bytes allocated
==9899==
==9930==
==9930== HEAP SUMMARY:
==9930== in use at exit: 3,112,841 bytes in 68,966 blocks
==9930== total heap usage: 1,592,182 allocs, 1,523,216 frees, 128,485,193 bytes allocated
==9930==
==9899== Searching for pointers to 69,046 not-freed blocks
--9899-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9899-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9899-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9899-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9899-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9899-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9899-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9899-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9899-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9899-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9899-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9899-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9899-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9899-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9899-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9899-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9899-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9899-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9899-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9899-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9899-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9899-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9899-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9899-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9899-- Scanning root segment: 0x701a000..0x701afff (4096)
--9899-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9899-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9899-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9899-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9899-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9899-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9899-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9899-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9899-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9899-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9930== Searching for pointers to 68,966 not-freed blocks
--9930-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9930-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9930-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9930-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9930-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9930-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9930-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9930-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9930-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9930-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9930-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9930-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9930-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9930-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9930-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9930-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9930-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9930-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9930-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9930-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9930-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9930-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9930-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9930-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9930-- Scanning root segment: 0x701a000..0x701afff (4096)
--9930-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9930-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9930-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9930-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9930-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9930-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9930-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9930-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9930-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9930-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9899== Checked 4,772,608 bytes
==9899==
==9930== Checked 4,767,592 bytes
==9930==
==9899== LEAK SUMMARY:
==9899== definitely lost: 2,189 bytes in 12 blocks
==9899== indirectly lost: 6,756 bytes in 7 blocks
==9899== possibly lost: 0 bytes in 0 blocks
==9899== still reachable: 3,106,750 bytes in 69,027 blocks
==9899== suppressed: 0 bytes in 0 blocks
==9899== Rerun with --leak-check=full to see details of leaked memory
==9899==
==9899== Use --track-origins=yes to see where uninitialised values come from
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899==
==9899== 1 errors in context 1 of 2:
==9899== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9899== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9899== by 0x488CD0: stringsubst (subst.c:301)
==9899== by 0x48801B: prefork (subst.c:77)
==9899== by 0x42B318: execcmd (exec.c:2619)
==9899== by 0x428CA0: execpline2 (exec.c:1697)
==9899== by 0x427FD2: execpline (exec.c:1484)
==9899== by 0x427756: execlist (exec.c:1267)
==9899== by 0x42717C: execode (exec.c:1073)
==9899== by 0x431299: runshfunc (exec.c:5040)
==9899== by 0x430E76: doshfunc (exec.c:4920)
==9899== by 0x4302FB: execshfunc (exec.c:4557)
==9899== by 0x42D8C1: execcmd (exec.c:3373)
==9899==
==9899==
==9899== 2 errors in context 2 of 2:
==9899== Conditional jump or move depends on uninitialised value(s)
==9899== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9899== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9899== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9899== by 0x40EFC2: execbuiltin (builtin.c:450)
==9899== by 0x42D8E9: execcmd (exec.c:3378)
==9899== by 0x428CA0: execpline2 (exec.c:1697)
==9899== by 0x427FD2: execpline (exec.c:1484)
==9899== by 0x42779A: execlist (exec.c:1275)
==9899== by 0x42717C: execode (exec.c:1073)
==9899== by 0x431299: runshfunc (exec.c:5040)
==9899== by 0x430E76: doshfunc (exec.c:4920)
==9899== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9899==
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9912-- Caught __NR_exit; running __libc_freeres()
==9930== LEAK SUMMARY:
==9930== definitely lost: 2,189 bytes in 12 blocks
==9930== indirectly lost: 6,756 bytes in 7 blocks
==9930== possibly lost: 0 bytes in 0 blocks
==9930== still reachable: 3,103,896 bytes in 68,947 blocks
==9930== suppressed: 0 bytes in 0 blocks
==9930== Rerun with --leak-check=full to see details of leaked memory
==9930==
==9930== Use --track-origins=yes to see where uninitialised values come from
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9930==
==9930== 1 errors in context 1 of 2:
==9930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9930== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9930== by 0x488CD0: stringsubst (subst.c:301)
==9930== by 0x48801B: prefork (subst.c:77)
==9930== by 0x42B318: execcmd (exec.c:2619)
==9930== by 0x428CA0: execpline2 (exec.c:1697)
==9930== by 0x427FD2: execpline (exec.c:1484)
==9930== by 0x427756: execlist (exec.c:1267)
==9930== by 0x42717C: execode (exec.c:1073)
==9930== by 0x431299: runshfunc (exec.c:5040)
==9930== by 0x430E76: doshfunc (exec.c:4920)
==9930== by 0x4302FB: execshfunc (exec.c:4557)
==9930== by 0x42D8C1: execcmd (exec.c:3373)
==9930==
==9930==
==9930== 2 errors in context 2 of 2:
==9930== Conditional jump or move depends on uninitialised value(s)
==9930== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9930== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9930== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9930== by 0x40EFC2: execbuiltin (builtin.c:450)
==9930== by 0x42D8E9: execcmd (exec.c:3378)
==9930== by 0x428CA0: execpline2 (exec.c:1697)
==9930== by 0x427FD2: execpline (exec.c:1484)
==9930== by 0x42779A: execlist (exec.c:1275)
==9930== by 0x42717C: execode (exec.c:1073)
==9930== by 0x431299: runshfunc (exec.c:5040)
==9930== by 0x430E76: doshfunc (exec.c:4920)
==9930== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9930==
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9912-by-pythonnut-on-???
==9912== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9912-by-pythonnut-on-???
==9912== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9912-by-pythonnut-on-???
==9912==
==9912== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9912== don't want to do, unless you know exactly what you're doing,
==9912== or are doing some strange experiment):
==9912== /usr/lib/valgrind/../../bin/vgdb --pid=9912 ...command...
==9912==
==9912== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9912== /path/to/gdb ./zsh
==9912== and then give GDB the following command
==9912== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9912
==9912== --pid is optional if only one valgrind process is running
==9912==
--9912-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9965-by-pythonnut-on-???
==9965== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9965-by-pythonnut-on-???
==9965== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9965-by-pythonnut-on-???
==9965==
==9965== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9965== don't want to do, unless you know exactly what you're doing,
==9965== or are doing some strange experiment):
==9965== /usr/lib/valgrind/../../bin/vgdb --pid=9965 ...command...
==9965==
==9965== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9965== /path/to/gdb ./zsh
==9965== and then give GDB the following command
==9965== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9965
==9965== --pid is optional if only one valgrind process is running
==9965==
--9965-- Caught __NR_exit; running __libc_freeres()
==9912==
==9912== HEAP SUMMARY:
==9912== in use at exit: 3,114,408 bytes in 68,966 blocks
==9912== total heap usage: 1,592,170 allocs, 1,523,204 frees, 128,595,347 bytes allocated
==9912==
--9964-- Caught __NR_exit; running __libc_freeres()
==9964== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9964-by-pythonnut-on-???
==9964== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9964-by-pythonnut-on-???
==9964== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9964-by-pythonnut-on-???
==9964==
==9964== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9964== don't want to do, unless you know exactly what you're doing,
==9964== or are doing some strange experiment):
==9964== /usr/lib/valgrind/../../bin/vgdb --pid=9964 ...command...
==9964==
==9964== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9964== /path/to/gdb ./zsh
==9964== and then give GDB the following command
==9964== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9964
==9964== --pid is optional if only one valgrind process is running
==9964==
--9965-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9912== Searching for pointers to 68,966 not-freed blocks
--9912-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9912-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9912-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9912-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9912-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9912-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9912-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9912-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9912-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9912-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9912-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9912-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9912-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9912-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9912-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9912-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9912-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9912-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9912-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9912-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9912-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9912-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9912-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9912-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9912-- Scanning root segment: 0x701a000..0x701afff (4096)
--9912-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9912-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9912-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9912-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9912-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9912-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9912-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9912-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9912-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9912-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9965==
==9965== HEAP SUMMARY:
==9965== in use at exit: 3,117,442 bytes in 69,113 blocks
==9965== total heap usage: 1,592,159 allocs, 1,523,046 frees, 128,472,711 bytes allocated
==9965==
==9964==
==9964== HEAP SUMMARY:
==9964== in use at exit: 3,113,001 bytes in 68,967 blocks
==9964== total heap usage: 1,592,199 allocs, 1,523,232 frees, 128,490,044 bytes allocated
==9964==
==9965== Searching for pointers to 69,113 not-freed blocks
--9965-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9965-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9965-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9965-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9965-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9965-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9965-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9965-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9965-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9965-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9965-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9965-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9965-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9965-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9965-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9965-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9965-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9965-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9965-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9965-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9965-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9965-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9965-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9965-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9965-- Scanning root segment: 0x701a000..0x701afff (4096)
--9965-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9965-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9965-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9965-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9965-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9965-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9965-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9965-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9965-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9965-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9964== Searching for pointers to 68,967 not-freed blocks
--9964-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9964-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9964-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9964-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9964-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9964-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9964-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9964-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9964-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9964-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9964-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9964-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9964-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9964-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9964-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9964-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9964-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9964-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9964-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9964-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9964-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9964-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9964-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9964-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9964-- Scanning root segment: 0x701a000..0x701afff (4096)
--9964-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9964-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9964-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9964-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9964-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9964-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9964-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9964-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9964-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9912== Checked 4,775,008 bytes
==9912==
==9912== LEAK SUMMARY:
==9912== definitely lost: 2,189 bytes in 12 blocks
==9912== indirectly lost: 6,756 bytes in 7 blocks
==9912== possibly lost: 0 bytes in 0 blocks
==9912== still reachable: 3,105,463 bytes in 68,947 blocks
==9912== suppressed: 0 bytes in 0 blocks
==9912== Rerun with --leak-check=full to see details of leaked memory
==9912==
==9912== Use --track-origins=yes to see where uninitialised values come from
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912==
==9912== 1 errors in context 1 of 2:
==9912== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9912== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9912== by 0x488CD0: stringsubst (subst.c:301)
==9912== by 0x48801B: prefork (subst.c:77)
==9912== by 0x42B318: execcmd (exec.c:2619)
==9912== by 0x428CA0: execpline2 (exec.c:1697)
==9912== by 0x427FD2: execpline (exec.c:1484)
==9912== by 0x427756: execlist (exec.c:1267)
==9912== by 0x42717C: execode (exec.c:1073)
==9912== by 0x431299: runshfunc (exec.c:5040)
==9912== by 0x430E76: doshfunc (exec.c:4920)
==9912== by 0x4302FB: execshfunc (exec.c:4557)
==9912== by 0x42D8C1: execcmd (exec.c:3373)
==9912==
==9912==
==9912== 2 errors in context 2 of 2:
==9912== Conditional jump or move depends on uninitialised value(s)
==9912== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9912== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9912== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9912== by 0x40EFC2: execbuiltin (builtin.c:450)
==9912== by 0x42D8E9: execcmd (exec.c:3378)
==9912== by 0x428CA0: execpline2 (exec.c:1697)
==9912== by 0x427FD2: execpline (exec.c:1484)
==9912== by 0x42779A: execlist (exec.c:1275)
==9912== by 0x42717C: execode (exec.c:1073)
==9912== by 0x431299: runshfunc (exec.c:5040)
==9912== by 0x430E76: doshfunc (exec.c:4920)
==9912== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9912==
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9907-- Caught __NR_exit; running __libc_freeres()
==9965== Checked 4,775,984 bytes
==9965==
==9964== Checked 4,766,936 bytes
==9964==
--9907-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== LEAK SUMMARY:
==9965== definitely lost: 2,189 bytes in 12 blocks
==9965== indirectly lost: 6,756 bytes in 7 blocks
==9965== possibly lost: 0 bytes in 0 blocks
==9965== still reachable: 3,108,497 bytes in 69,094 blocks
==9965== suppressed: 0 bytes in 0 blocks
==9965== Rerun with --leak-check=full to see details of leaked memory
==9965==
==9965== Use --track-origins=yes to see where uninitialised values come from
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9965==
==9965== 1 errors in context 1 of 2:
==9965== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9965== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9965== by 0x488CD0: stringsubst (subst.c:301)
==9965== by 0x48801B: prefork (subst.c:77)
==9965== by 0x42B318: execcmd (exec.c:2619)
==9965== by 0x428CA0: execpline2 (exec.c:1697)
==9965== by 0x427FD2: execpline (exec.c:1484)
==9965== by 0x427756: execlist (exec.c:1267)
==9965== by 0x42717C: execode (exec.c:1073)
==9965== by 0x431299: runshfunc (exec.c:5040)
==9965== by 0x430E76: doshfunc (exec.c:4920)
==9965== by 0x4302FB: execshfunc (exec.c:4557)
==9965== by 0x42D8C1: execcmd (exec.c:3373)
==9965==
==9965==
==9965== 2 errors in context 2 of 2:
==9965== Conditional jump or move depends on uninitialised value(s)
==9965== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9965== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9965== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9965== by 0x40EFC2: execbuiltin (builtin.c:450)
==9965== by 0x42D8E9: execcmd (exec.c:3378)
==9965== by 0x428CA0: execpline2 (exec.c:1697)
==9965== by 0x427FD2: execpline (exec.c:1484)
==9965== by 0x42779A: execlist (exec.c:1275)
==9965== by 0x42717C: execode (exec.c:1073)
==9965== by 0x431299: runshfunc (exec.c:5040)
==9965== by 0x430E76: doshfunc (exec.c:4920)
==9965== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9965==
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964== LEAK SUMMARY:
==9964== definitely lost: 2,189 bytes in 12 blocks
==9964== indirectly lost: 6,756 bytes in 7 blocks
==9964== possibly lost: 0 bytes in 0 blocks
==9964== still reachable: 3,104,056 bytes in 68,948 blocks
==9964== suppressed: 0 bytes in 0 blocks
==9964== Rerun with --leak-check=full to see details of leaked memory
==9964==
==9964== Use --track-origins=yes to see where uninitialised values come from
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964==
==9964== 1 errors in context 1 of 2:
==9964== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9964== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9964== by 0x488CD0: stringsubst (subst.c:301)
==9964== by 0x48801B: prefork (subst.c:77)
==9964== by 0x42B318: execcmd (exec.c:2619)
==9964== by 0x428CA0: execpline2 (exec.c:1697)
==9964== by 0x427FD2: execpline (exec.c:1484)
==9964== by 0x427756: execlist (exec.c:1267)
==9964== by 0x42717C: execode (exec.c:1073)
==9964== by 0x431299: runshfunc (exec.c:5040)
==9964== by 0x430E76: doshfunc (exec.c:4920)
==9964== by 0x4302FB: execshfunc (exec.c:4557)
==9964== by 0x42D8C1: execcmd (exec.c:3373)
==9964==
==9964==
==9964== 2 errors in context 2 of 2:
==9964== Conditional jump or move depends on uninitialised value(s)
==9964== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9964== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9964== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9964== by 0x40EFC2: execbuiltin (builtin.c:450)
==9964== by 0x42D8E9: execcmd (exec.c:3378)
==9964== by 0x428CA0: execpline2 (exec.c:1697)
==9964== by 0x427FD2: execpline (exec.c:1484)
==9964== by 0x42779A: execlist (exec.c:1275)
==9964== by 0x42717C: execode (exec.c:1073)
==9964== by 0x431299: runshfunc (exec.c:5040)
==9964== by 0x430E76: doshfunc (exec.c:4920)
==9964== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9964==
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9963-by-pythonnut-on-???
==9963== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9963-by-pythonnut-on-???
==9963== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9963-by-pythonnut-on-???
==9963==
==9963== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9963== don't want to do, unless you know exactly what you're doing,
==9963== or are doing some strange experiment):
==9963== /usr/lib/valgrind/../../bin/vgdb --pid=9963 ...command...
==9963==
==9963== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9963== /path/to/gdb ./zsh
==9963== and then give GDB the following command
==9963== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9963
==9963== --pid is optional if only one valgrind process is running
==9963==
==9907==
==9907== HEAP SUMMARY:
==9907== in use at exit: 3,113,546 bytes in 68,947 blocks
==9907== total heap usage: 1,592,179 allocs, 1,523,232 frees, 128,597,350 bytes allocated
==9907==
==9967== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9967-by-pythonnut-on-???
==9967== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9967-by-pythonnut-on-???
==9967== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9967-by-pythonnut-on-???
==9967==
==9967== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9967== don't want to do, unless you know exactly what you're doing,
==9967== or are doing some strange experiment):
==9967== /usr/lib/valgrind/../../bin/vgdb --pid=9967 ...command...
==9967==
==9967== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9967== /path/to/gdb ./zsh
==9967== and then give GDB the following command
==9967== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9967
==9967== --pid is optional if only one valgrind process is running
==9967==
==9966== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9966-by-pythonnut-on-???
==9966== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9966-by-pythonnut-on-???
==9966== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9966-by-pythonnut-on-???
==9966==
==9966== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9966== don't want to do, unless you know exactly what you're doing,
==9966== or are doing some strange experiment):
==9966== /usr/lib/valgrind/../../bin/vgdb --pid=9966 ...command...
==9966==
==9966== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9966== /path/to/gdb ./zsh
==9966== and then give GDB the following command
==9966== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9966
==9966== --pid is optional if only one valgrind process is running
==9966==
==9968== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9968-by-pythonnut-on-???
==9968== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9968-by-pythonnut-on-???
==9968== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9968-by-pythonnut-on-???
==9968==
==9968== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9968== don't want to do, unless you know exactly what you're doing,
==9968== or are doing some strange experiment):
==9968== /usr/lib/valgrind/../../bin/vgdb --pid=9968 ...command...
==9968==
==9968== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9968== /path/to/gdb ./zsh
==9968== and then give GDB the following command
==9968== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9968
==9968== --pid is optional if only one valgrind process is running
==9968==
==9907== Searching for pointers to 68,947 not-freed blocks
--9907-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9907-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9907-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9907-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9907-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9907-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9907-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9907-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9907-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9907-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9907-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9907-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9907-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9907-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9907-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9907-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9907-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9907-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9907-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9907-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9907-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9907-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9907-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9907-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966-- Caught __NR_exit; running __libc_freeres()
--9907-- Scanning root segment: 0x701a000..0x701afff (4096)
--9907-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9907-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9907-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9907-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9907-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9907-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9907-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9907-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9907-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9907-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFECD7C, len 4
==9970== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9970-by-pythonnut-on-???
==9970== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9970-by-pythonnut-on-???
==9970== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9970-by-pythonnut-on-???
==9970==
==9970== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9970== don't want to do, unless you know exactly what you're doing,
==9970== or are doing some strange experiment):
==9970== /usr/lib/valgrind/../../bin/vgdb --pid=9970 ...command...
==9970==
==9970== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9970== /path/to/gdb ./zsh
==9970== and then give GDB the following command
==9970== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9970
==9970== --pid is optional if only one valgrind process is running
==9970==
--9966-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966==
==9969== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9969-by-pythonnut-on-???
==9969== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9969-by-pythonnut-on-???
==9969== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9969-by-pythonnut-on-???
==9969==
==9969== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9969== don't want to do, unless you know exactly what you're doing,
==9969== or are doing some strange experiment):
==9969== /usr/lib/valgrind/../../bin/vgdb --pid=9969 ...command...
==9969==
==9969== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9969== /path/to/gdb ./zsh
==9969== and then give GDB the following command
==9969== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9969
==9969== --pid is optional if only one valgrind process is running
==9969==
--9969-- Caught __NR_exit; running __libc_freeres()
==9966== HEAP SUMMARY:
==9966== in use at exit: 3,113,175 bytes in 68,972 blocks
==9966== total heap usage: 1,592,246 allocs, 1,523,274 frees, 128,498,996 bytes allocated
==9966==
--9969-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966== Searching for pointers to 68,972 not-freed blocks
--9966-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9966-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9966-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9966-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9966-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9966-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9966-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9966-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9966-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9966-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9966-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9966-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9966-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9966-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9966-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9966-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9966-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9966-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9966-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9966-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9966-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9966-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9966-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9966-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966-- Scanning root segment: 0x701a000..0x701afff (4096)
--9966-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9966-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9966-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9966-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9966-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9966-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9966-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9966-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9966-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9966-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9969==
==9969== HEAP SUMMARY:
==9969== in use at exit: 3,120,378 bytes in 69,179 blocks
==9969== total heap usage: 1,592,290 allocs, 1,523,111 frees, 128,599,239 bytes allocated
==9969==
==9907== Checked 4,772,392 bytes
==9907==
==9969== Searching for pointers to 69,179 not-freed blocks
--9969-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9969-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9969-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9969-- Scanning root segment: 0x4037000..0x403afff (16384)
--9969-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9969-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9969-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9969-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9969-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9969-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9969-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9969-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9969-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9969-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9969-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9969-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9969-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9969-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9969-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9969-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9969-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9969-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9969-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9969-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9969-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9969-- Scanning root segment: 0x701a000..0x701afff (4096)
--9969-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9969-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9969-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9969-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9969-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9969-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9969-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9969-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9969-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9969-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9907== LEAK SUMMARY:
==9907== definitely lost: 2,189 bytes in 12 blocks
==9907== indirectly lost: 6,756 bytes in 7 blocks
==9907== possibly lost: 0 bytes in 0 blocks
==9907== still reachable: 3,104,601 bytes in 68,928 blocks
==9907== suppressed: 0 bytes in 0 blocks
==9907== Rerun with --leak-check=full to see details of leaked memory
==9907==
==9907== Use --track-origins=yes to see where uninitialised values come from
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9907==
==9907== 1 errors in context 1 of 2:
==9907== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9907== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9907== by 0x488CD0: stringsubst (subst.c:301)
==9907== by 0x48801B: prefork (subst.c:77)
==9907== by 0x42B318: execcmd (exec.c:2619)
==9907== by 0x428CA0: execpline2 (exec.c:1697)
==9907== by 0x427FD2: execpline (exec.c:1484)
==9907== by 0x427756: execlist (exec.c:1267)
==9907== by 0x42717C: execode (exec.c:1073)
==9907== by 0x431299: runshfunc (exec.c:5040)
==9907== by 0x430E76: doshfunc (exec.c:4920)
==9907== by 0x4302FB: execshfunc (exec.c:4557)
==9907== by 0x42D8C1: execcmd (exec.c:3373)
==9907==
==9907==
==9907== 2 errors in context 2 of 2:
==9907== Conditional jump or move depends on uninitialised value(s)
==9907== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9907== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9907== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9907== by 0x40EFC2: execbuiltin (builtin.c:450)
==9907== by 0x42D8E9: execcmd (exec.c:3378)
==9907== by 0x428CA0: execpline2 (exec.c:1697)
==9907== by 0x427FD2: execpline (exec.c:1484)
==9907== by 0x42779A: execlist (exec.c:1275)
==9907== by 0x42717C: execode (exec.c:1073)
==9907== by 0x431299: runshfunc (exec.c:5040)
==9907== by 0x430E76: doshfunc (exec.c:4920)
==9907== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9907==
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974-- Caught __NR_exit; running __libc_freeres()
==9974== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9974-by-pythonnut-on-???
==9974== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9974-by-pythonnut-on-???
==9974== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9974-by-pythonnut-on-???
==9974==
==9974== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9974== don't want to do, unless you know exactly what you're doing,
==9974== or are doing some strange experiment):
==9974== /usr/lib/valgrind/../../bin/vgdb --pid=9974 ...command...
==9974==
==9974== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9974== /path/to/gdb ./zsh
==9974== and then give GDB the following command
==9974== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9974
==9974== --pid is optional if only one valgrind process is running
==9974==
==9966== Checked 4,767,040 bytes
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
==9966==
--9974-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9974==
==9966== LEAK SUMMARY:
==9966== definitely lost: 2,189 bytes in 12 blocks
==9966== indirectly lost: 6,756 bytes in 7 blocks
==9966== possibly lost: 0 bytes in 0 blocks
==9966== still reachable: 3,104,230 bytes in 68,953 blocks
==9966== suppressed: 0 bytes in 0 blocks
==9966== Rerun with --leak-check=full to see details of leaked memory
==9966==
==9966== Use --track-origins=yes to see where uninitialised values come from
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9966==
==9966== 1 errors in context 1 of 2:
==9966== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9966== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9966== by 0x488CD0: stringsubst (subst.c:301)
==9966== by 0x48801B: prefork (subst.c:77)
==9966== by 0x42B318: execcmd (exec.c:2619)
==9966== by 0x428CA0: execpline2 (exec.c:1697)
==9966== by 0x427FD2: execpline (exec.c:1484)
==9966== by 0x427756: execlist (exec.c:1267)
==9966== by 0x42717C: execode (exec.c:1073)
==9966== by 0x431299: runshfunc (exec.c:5040)
==9966== by 0x430E76: doshfunc (exec.c:4920)
==9966== by 0x4302FB: execshfunc (exec.c:4557)
==9966== by 0x42D8C1: execcmd (exec.c:3373)
==9966==
==9966==
==9966== 2 errors in context 2 of 2:
==9966== Conditional jump or move depends on uninitialised value(s)
==9966== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9966== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9966== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9966== by 0x40EFC2: execbuiltin (builtin.c:450)
==9966== by 0x42D8E9: execcmd (exec.c:3378)
==9966== by 0x428CA0: execpline2 (exec.c:1697)
==9966== by 0x427FD2: execpline (exec.c:1484)
==9966== by 0x42779A: execlist (exec.c:1275)
==9966== by 0x42717C: execode (exec.c:1073)
==9966== by 0x431299: runshfunc (exec.c:5040)
==9966== by 0x430E76: doshfunc (exec.c:4920)
==9966== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9966==
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974== HEAP SUMMARY:
==9974== in use at exit: 3,115,319 bytes in 69,009 blocks
==9974== total heap usage: 1,592,246 allocs, 1,523,237 frees, 128,606,023 bytes allocated
==9974==
==9969== Checked 4,799,448 bytes
==9969==
--9976-- Caught __NR_exit; running __libc_freeres()
==9974== Searching for pointers to 69,009 not-freed blocks
--9974-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9974-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9976== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9976-by-pythonnut-on-???
--9974-- Scanning root segment: 0x4022000..0x4026fff (20480)
==9976== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9976-by-pythonnut-on-???
==9976== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9976-by-pythonnut-on-???
==9976==
==9976== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9976== don't want to do, unless you know exactly what you're doing,
==9976== or are doing some strange experiment):
==9976== /usr/lib/valgrind/../../bin/vgdb --pid=9976 ...command...
==9976==
==9976== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9976== /path/to/gdb ./zsh
==9976== and then give GDB the following command
==9976== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9976
==9976== --pid is optional if only one valgrind process is running
==9976==
--9974-- Scanning root segment: 0x4037000..0x403afff (16384)
--9974-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9974-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9974-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9974-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9974-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9974-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9974-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9974-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9974-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9974-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9974-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9974-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9974-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9974-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9974-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9974-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9974-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==9969== LEAK SUMMARY:
==9969== definitely lost: 2,189 bytes in 12 blocks
==9969== indirectly lost: 6,756 bytes in 7 blocks
==9969== possibly lost: 0 bytes in 0 blocks
==9969== still reachable: 3,111,433 bytes in 69,160 blocks
==9969== suppressed: 0 bytes in 0 blocks
==9969== Rerun with --leak-check=full to see details of leaked memory
==9969==
==9969== Use --track-origins=yes to see where uninitialised values come from
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9969==
==9969== 1 errors in context 1 of 2:
==9969== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9969== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9969== by 0x488CD0: stringsubst (subst.c:301)
==9969== by 0x48801B: prefork (subst.c:77)
==9969== by 0x42B318: execcmd (exec.c:2619)
==9969== by 0x428CA0: execpline2 (exec.c:1697)
==9969== by 0x427FD2: execpline (exec.c:1484)
==9969== by 0x427756: execlist (exec.c:1267)
==9969== by 0x42717C: execode (exec.c:1073)
==9969== by 0x431299: runshfunc (exec.c:5040)
==9969== by 0x430E76: doshfunc (exec.c:4920)
==9969== by 0x4302FB: execshfunc (exec.c:4557)
==9969== by 0x42D8C1: execcmd (exec.c:3373)
==9969==
==9969==
==9969== 2 errors in context 2 of 2:
--9974-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9969== Conditional jump or move depends on uninitialised value(s)
==9969== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9969== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9969== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9969== by 0x40EFC2: execbuiltin (builtin.c:450)
--9974-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9969== by 0x42D8E9: execcmd (exec.c:3378)
==9969== by 0x428CA0: execpline2 (exec.c:1697)
==9969== by 0x427FD2: execpline (exec.c:1484)
==9969== by 0x42779A: execlist (exec.c:1275)
--9974-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9969== by 0x42717C: execode (exec.c:1073)
==9969== by 0x431299: runshfunc (exec.c:5040)
==9969== by 0x430E76: doshfunc (exec.c:4920)
==9969== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9969==
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9974-- Scanning root segment: 0x701a000..0x701afff (4096)
--9974-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9974-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9974-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9974-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9974-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9974-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9974-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9974-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9974-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9974-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9976-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976==
==9977== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9977-by-pythonnut-on-???
==9977== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9977-by-pythonnut-on-???
==9977== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9977-by-pythonnut-on-???
==9977==
==9977== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9977== don't want to do, unless you know exactly what you're doing,
==9977== or are doing some strange experiment):
==9977== /usr/lib/valgrind/../../bin/vgdb --pid=9977 ...command...
==9977==
==9977== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9977== /path/to/gdb ./zsh
==9977== and then give GDB the following command
==9977== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9977
==9977== --pid is optional if only one valgrind process is running
==9977==
==9976== HEAP SUMMARY:
==9976== in use at exit: 3,113,111 bytes in 68,972 blocks
==9976== total heap usage: 1,592,226 allocs, 1,523,254 frees, 128,496,766 bytes allocated
==9976==
==9978== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9978-by-pythonnut-on-???
==9978== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9978-by-pythonnut-on-???
==9978== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9978-by-pythonnut-on-???
==9978==
==9978== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9978== don't want to do, unless you know exactly what you're doing,
==9978== or are doing some strange experiment):
==9978== /usr/lib/valgrind/../../bin/vgdb --pid=9978 ...command...
==9978==
==9978== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9978== /path/to/gdb ./zsh
==9978== and then give GDB the following command
==9978== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9978
==9978== --pid is optional if only one valgrind process is running
==9978==
==9976== Searching for pointers to 68,972 not-freed blocks
--9976-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9976-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9976-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9976-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9978-- Caught __NR_exit; running __libc_freeres()
--9976-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9976-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9976-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9976-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9976-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9976-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9976-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9976-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9976-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9976-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9976-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9976-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9976-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9976-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9976-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9976-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9976-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9976-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9976-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9976-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9976-- Scanning root segment: 0x701a000..0x701afff (4096)
--9976-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9976-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9976-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9976-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9976-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9976-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9976-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9976-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9976-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9976-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9978-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9978==
==9978== HEAP SUMMARY:
==9978== in use at exit: 3,193,757 bytes in 69,186 blocks
==9978== total heap usage: 1,592,298 allocs, 1,523,112 frees, 128,675,770 bytes allocated
==9978==
==9974== Checked 4,791,040 bytes
==9974==
==9978== Searching for pointers to 69,186 not-freed blocks
--9978-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9978-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9978-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9978-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9978-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9978-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9978-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9978-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9978-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9978-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9978-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9978-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9978-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9978-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9978-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9978-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9978-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9978-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9978-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9978-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9978-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9978-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9978-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9978-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9978-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9978-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9978-- Scanning root segment: 0x701a000..0x701afff (4096)
--9978-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9978-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9978-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9978-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9978-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9978-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9978-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9978-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9978-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9978-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9974== LEAK SUMMARY:
==9974== definitely lost: 2,189 bytes in 12 blocks
==9974== indirectly lost: 6,756 bytes in 7 blocks
==9974== possibly lost: 0 bytes in 0 blocks
==9974== still reachable: 3,106,374 bytes in 68,990 blocks
==9974== suppressed: 0 bytes in 0 blocks
==9974== Rerun with --leak-check=full to see details of leaked memory
==9974==
==9974== Use --track-origins=yes to see where uninitialised values come from
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974==
==9974== 1 errors in context 1 of 2:
==9974== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9974== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9974== by 0x488CD0: stringsubst (subst.c:301)
==9974== by 0x48801B: prefork (subst.c:77)
==9974== by 0x42B318: execcmd (exec.c:2619)
==9974== by 0x428CA0: execpline2 (exec.c:1697)
==9974== by 0x427FD2: execpline (exec.c:1484)
==9974== by 0x427756: execlist (exec.c:1267)
==9974== by 0x42717C: execode (exec.c:1073)
==9974== by 0x431299: runshfunc (exec.c:5040)
==9974== by 0x430E76: doshfunc (exec.c:4920)
==9974== by 0x4302FB: execshfunc (exec.c:4557)
==9974== by 0x42D8C1: execcmd (exec.c:3373)
==9974==
==9974==
==9974== 2 errors in context 2 of 2:
==9974== Conditional jump or move depends on uninitialised value(s)
==9974== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9974== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9974== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9974== by 0x40EFC2: execbuiltin (builtin.c:450)
==9974== by 0x42D8E9: execcmd (exec.c:3378)
==9974== by 0x428CA0: execpline2 (exec.c:1697)
==9974== by 0x427FD2: execpline (exec.c:1484)
==9974== by 0x42779A: execlist (exec.c:1275)
==9974== by 0x42717C: execode (exec.c:1073)
==9974== by 0x431299: runshfunc (exec.c:5040)
==9974== by 0x430E76: doshfunc (exec.c:4920)
==9974== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9974==
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9973-- Caught __NR_exit; running __libc_freeres()
==9973== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9973-by-pythonnut-on-???
==9973== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9973-by-pythonnut-on-???
==9973== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9973-by-pythonnut-on-???
==9973==
==9973== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9973== don't want to do, unless you know exactly what you're doing,
==9973== or are doing some strange experiment):
==9973== /usr/lib/valgrind/../../bin/vgdb --pid=9973 ...command...
==9973==
==9973== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9973== /path/to/gdb ./zsh
==9973== and then give GDB the following command
==9973== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9973
==9973== --pid is optional if only one valgrind process is running
==9973==
==9976== Checked 4,766,968 bytes
==9976==
--9973-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976== LEAK SUMMARY:
==9976== definitely lost: 2,189 bytes in 12 blocks
==9976== indirectly lost: 6,756 bytes in 7 blocks
==9976== possibly lost: 0 bytes in 0 blocks
==9976== still reachable: 3,104,166 bytes in 68,953 blocks
==9976== suppressed: 0 bytes in 0 blocks
==9976== Rerun with --leak-check=full to see details of leaked memory
==9976==
==9976== Use --track-origins=yes to see where uninitialised values come from
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9976==
==9976== 1 errors in context 1 of 2:
==9976== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9976== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9976== by 0x488CD0: stringsubst (subst.c:301)
==9976== by 0x48801B: prefork (subst.c:77)
==9976== by 0x42B318: execcmd (exec.c:2619)
==9976== by 0x428CA0: execpline2 (exec.c:1697)
==9976== by 0x427FD2: execpline (exec.c:1484)
==9976== by 0x427756: execlist (exec.c:1267)
==9976== by 0x42717C: execode (exec.c:1073)
==9976== by 0x431299: runshfunc (exec.c:5040)
==9976== by 0x430E76: doshfunc (exec.c:4920)
==9976== by 0x4302FB: execshfunc (exec.c:4557)
==9976== by 0x42D8C1: execcmd (exec.c:3373)
==9976==
==9976==
==9976== 2 errors in context 2 of 2:
==9976== Conditional jump or move depends on uninitialised value(s)
==9976== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9976== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9976== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9976== by 0x40EFC2: execbuiltin (builtin.c:450)
==9976== by 0x42D8E9: execcmd (exec.c:3378)
==9976== by 0x428CA0: execpline2 (exec.c:1697)
==9976== by 0x427FD2: execpline (exec.c:1484)
==9976== by 0x42779A: execlist (exec.c:1275)
==9976== by 0x42717C: execode (exec.c:1073)
==9976== by 0x431299: runshfunc (exec.c:5040)
==9976== by 0x430E76: doshfunc (exec.c:4920)
==9976== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9976==
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973==
==9973== HEAP SUMMARY:
==9973== in use at exit: 3,115,255 bytes in 69,006 blocks
==9973== total heap usage: 1,592,248 allocs, 1,523,242 frees, 128,606,567 bytes allocated
==9973==
==9973== Searching for pointers to 69,006 not-freed blocks
--9973-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9973-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9973-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9973-- Scanning root segment: 0x4037000..0x403afff (16384)
--9973-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9973-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9973-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9973-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9973-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9973-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9973-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9973-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9973-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9973-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9973-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9973-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9973-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9973-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9973-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9973-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9973-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9973-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9973-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9973-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9973-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9973-- Scanning root segment: 0x701a000..0x701afff (4096)
--9973-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9973-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9973-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9973-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9973-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9973-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9973-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9973-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9973-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9973-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9979== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9979-by-pythonnut-on-???
==9979== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9979-by-pythonnut-on-???
==9979== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9979-by-pythonnut-on-???
==9979==
==9979== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9979== don't want to do, unless you know exactly what you're doing,
==9979== or are doing some strange experiment):
==9979== /usr/lib/valgrind/../../bin/vgdb --pid=9979 ...command...
==9979==
==9979== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9979== /path/to/gdb ./zsh
==9979== and then give GDB the following command
==9979== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9979
==9979== --pid is optional if only one valgrind process is running
==9979==
==9978== Checked 4,984,352 bytes
==9978==
--9979-- Caught __NR_exit; running __libc_freeres()
==9978== LEAK SUMMARY:
==9978== definitely lost: 2,189 bytes in 12 blocks
==9978== indirectly lost: 6,756 bytes in 7 blocks
==9978== possibly lost: 0 bytes in 0 blocks
==9978== still reachable: 3,184,812 bytes in 69,167 blocks
==9978== suppressed: 0 bytes in 0 blocks
==9978== Rerun with --leak-check=full to see details of leaked memory
==9978==
==9978== Use --track-origins=yes to see where uninitialised values come from
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9978==
==9978== 1 errors in context 1 of 2:
==9978== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9978== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9978== by 0x488CD0: stringsubst (subst.c:301)
==9978== by 0x48801B: prefork (subst.c:77)
==9978== by 0x42B318: execcmd (exec.c:2619)
==9978== by 0x428CA0: execpline2 (exec.c:1697)
==9978== by 0x427FD2: execpline (exec.c:1484)
==9978== by 0x427756: execlist (exec.c:1267)
==9978== by 0x42717C: execode (exec.c:1073)
==9978== by 0x431299: runshfunc (exec.c:5040)
==9978== by 0x430E76: doshfunc (exec.c:4920)
==9978== by 0x4302FB: execshfunc (exec.c:4557)
==9978== by 0x42D8C1: execcmd (exec.c:3373)
==9978==
==9978==
==9978== 2 errors in context 2 of 2:
==9978== Conditional jump or move depends on uninitialised value(s)
==9978== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9978== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9978== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9978== by 0x40EFC2: execbuiltin (builtin.c:450)
==9978== by 0x42D8E9: execcmd (exec.c:3378)
==9978== by 0x428CA0: execpline2 (exec.c:1697)
==9978== by 0x427FD2: execpline (exec.c:1484)
==9978== by 0x42779A: execlist (exec.c:1275)
==9978== by 0x42717C: execode (exec.c:1073)
==9978== by 0x431299: runshfunc (exec.c:5040)
==9978== by 0x430E76: doshfunc (exec.c:4920)
==9978== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9978==
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9979-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9979==
==9979== HEAP SUMMARY:
==9979== in use at exit: 3,113,140 bytes in 68,973 blocks
==9979== total heap usage: 1,592,239 allocs, 1,523,266 frees, 128,499,454 bytes allocated
==9979==
==9979== Searching for pointers to 68,973 not-freed blocks
--9979-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9979-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9979-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9979-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9979-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9979-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9979-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9979-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9979-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9979-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9979-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9979-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9979-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9979-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9979-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9979-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9979-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9979-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9979-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9979-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9979-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9979-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9979-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9979-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9979-- Scanning root segment: 0x701a000..0x701afff (4096)
--9979-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9979-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9979-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9979-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9979-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9979-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9979-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9979-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9979-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9979-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9973== Checked 4,790,352 bytes
==9973==
==9973== LEAK SUMMARY:
==9973== definitely lost: 2,189 bytes in 12 blocks
==9973== indirectly lost: 6,756 bytes in 7 blocks
==9973== possibly lost: 0 bytes in 0 blocks
==9973== still reachable: 3,106,310 bytes in 68,987 blocks
==9973== suppressed: 0 bytes in 0 blocks
==9973== Rerun with --leak-check=full to see details of leaked memory
==9973==
==9973== Use --track-origins=yes to see where uninitialised values come from
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973==
==9973== 1 errors in context 1 of 2:
==9973== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9973== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9973== by 0x488CD0: stringsubst (subst.c:301)
==9973== by 0x48801B: prefork (subst.c:77)
==9973== by 0x42B318: execcmd (exec.c:2619)
==9973== by 0x428CA0: execpline2 (exec.c:1697)
==9973== by 0x427FD2: execpline (exec.c:1484)
==9973== by 0x427756: execlist (exec.c:1267)
==9973== by 0x42717C: execode (exec.c:1073)
==9973== by 0x431299: runshfunc (exec.c:5040)
==9973== by 0x430E76: doshfunc (exec.c:4920)
==9973== by 0x4302FB: execshfunc (exec.c:4557)
==9973== by 0x42D8C1: execcmd (exec.c:3373)
==9973==
==9973==
==9973== 2 errors in context 2 of 2:
==9973== Conditional jump or move depends on uninitialised value(s)
==9973== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9973== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9973== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9973== by 0x40EFC2: execbuiltin (builtin.c:450)
==9973== by 0x42D8E9: execcmd (exec.c:3378)
==9973== by 0x428CA0: execpline2 (exec.c:1697)
==9973== by 0x427FD2: execpline (exec.c:1484)
==9973== by 0x42779A: execlist (exec.c:1275)
==9973== by 0x42717C: execode (exec.c:1073)
==9973== by 0x431299: runshfunc (exec.c:5040)
==9973== by 0x430E76: doshfunc (exec.c:4920)
==9973== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9973==
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9980-by-pythonnut-on-???
==9980== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9980-by-pythonnut-on-???
==9980== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9980-by-pythonnut-on-???
==9980==
==9980== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9980== don't want to do, unless you know exactly what you're doing,
==9980== or are doing some strange experiment):
==9980== /usr/lib/valgrind/../../bin/vgdb --pid=9980 ...command...
==9980==
==9980== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9980== /path/to/gdb ./zsh
==9980== and then give GDB the following command
==9980== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9980
==9980== --pid is optional if only one valgrind process is running
==9980==
--9980-- Caught __NR_exit; running __libc_freeres()
--9980-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9980==
==9980== HEAP SUMMARY:
==9980== in use at exit: 3,115,259 bytes in 69,006 blocks
==9980== total heap usage: 1,592,264 allocs, 1,523,258 frees, 128,611,563 bytes allocated
==9980==
==9979== Checked 4,766,480 bytes
==9979==
==9979== LEAK SUMMARY:
==9979== definitely lost: 2,189 bytes in 12 blocks
==9979== indirectly lost: 6,756 bytes in 7 blocks
==9979== possibly lost: 0 bytes in 0 blocks
==9979== still reachable: 3,104,195 bytes in 68,954 blocks
==9979== suppressed: 0 bytes in 0 blocks
==9979== Rerun with --leak-check=full to see details of leaked memory
==9979==
==9979== Use --track-origins=yes to see where uninitialised values come from
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9979==
==9979== 1 errors in context 1 of 2:
==9979== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9979== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9979== by 0x488CD0: stringsubst (subst.c:301)
==9979== by 0x48801B: prefork (subst.c:77)
==9979== by 0x42B318: execcmd (exec.c:2619)
==9979== by 0x428CA0: execpline2 (exec.c:1697)
==9979== by 0x427FD2: execpline (exec.c:1484)
==9979== by 0x427756: execlist (exec.c:1267)
==9979== by 0x42717C: execode (exec.c:1073)
==9979== by 0x431299: runshfunc (exec.c:5040)
==9979== by 0x430E76: doshfunc (exec.c:4920)
==9979== by 0x4302FB: execshfunc (exec.c:4557)
==9979== by 0x42D8C1: execcmd (exec.c:3373)
==9979==
==9979==
==9979== 2 errors in context 2 of 2:
==9979== Conditional jump or move depends on uninitialised value(s)
==9979== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9979== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9979== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9979== by 0x40EFC2: execbuiltin (builtin.c:450)
==9979== by 0x42D8E9: execcmd (exec.c:3378)
==9979== by 0x428CA0: execpline2 (exec.c:1697)
==9979== by 0x427FD2: execpline (exec.c:1484)
==9979== by 0x42779A: execlist (exec.c:1275)
==9979== by 0x42717C: execode (exec.c:1073)
==9979== by 0x431299: runshfunc (exec.c:5040)
==9979== by 0x430E76: doshfunc (exec.c:4920)
==9979== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9979==
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== Searching for pointers to 69,006 not-freed blocks
--9980-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9980-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9980-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9980-- Scanning root segment: 0x4037000..0x403afff (16384)
--9980-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9980-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9980-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9980-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9980-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9980-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9980-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9980-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9980-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9980-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9980-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9980-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9980-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9980-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9980-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9980-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9980-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9980-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9980-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9980-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9980-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9980-- Scanning root segment: 0x701a000..0x701afff (4096)
--9980-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9980-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9980-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9980-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9980-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9980-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9980-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9980-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9980-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9980-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9981-by-pythonnut-on-???
==9981== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9981-by-pythonnut-on-???
==9981== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9981-by-pythonnut-on-???
==9981==
==9981== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9981== don't want to do, unless you know exactly what you're doing,
==9981== or are doing some strange experiment):
==9981== /usr/lib/valgrind/../../bin/vgdb --pid=9981 ...command...
==9981==
==9981== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9981== /path/to/gdb ./zsh
==9981== and then give GDB the following command
==9981== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9981
==9981== --pid is optional if only one valgrind process is running
==9981==
--9981-- Caught __NR_exit; running __libc_freeres()
--9981-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9981==
==9981== HEAP SUMMARY:
==9981== in use at exit: 3,111,651 bytes in 68,913 blocks
==9981== total heap usage: 1,592,209 allocs, 1,523,296 frees, 128,502,445 bytes allocated
==9981==
==9980== Checked 4,790,360 bytes
==9980==
==9981== Searching for pointers to 68,913 not-freed blocks
--9981-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9981-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9981-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9981-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9981-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9981-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9981-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9981-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9981-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9981-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9981-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9981-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9981-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9981-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9981-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9981-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9981-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9981-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9981-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9981-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9981-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9981-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9981-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9981-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9981-- Scanning root segment: 0x701a000..0x701afff (4096)
--9981-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9981-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9981-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9981-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9981-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9981-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9981-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9981-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9981-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9981-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9980== LEAK SUMMARY:
==9980== definitely lost: 2,189 bytes in 12 blocks
==9980== indirectly lost: 6,756 bytes in 7 blocks
==9980== possibly lost: 0 bytes in 0 blocks
==9980== still reachable: 3,106,314 bytes in 68,987 blocks
==9980== suppressed: 0 bytes in 0 blocks
==9980== Rerun with --leak-check=full to see details of leaked memory
==9980==
==9980== Use --track-origins=yes to see where uninitialised values come from
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980==
==9980== 1 errors in context 1 of 2:
==9980== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9980== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9980== by 0x488CD0: stringsubst (subst.c:301)
==9980== by 0x48801B: prefork (subst.c:77)
==9980== by 0x42B318: execcmd (exec.c:2619)
==9980== by 0x428CA0: execpline2 (exec.c:1697)
==9980== by 0x427FD2: execpline (exec.c:1484)
==9980== by 0x427756: execlist (exec.c:1267)
==9980== by 0x42717C: execode (exec.c:1073)
==9980== by 0x431299: runshfunc (exec.c:5040)
==9980== by 0x430E76: doshfunc (exec.c:4920)
==9980== by 0x4302FB: execshfunc (exec.c:4557)
==9980== by 0x42D8C1: execcmd (exec.c:3373)
==9980==
==9980==
==9980== 2 errors in context 2 of 2:
==9980== Conditional jump or move depends on uninitialised value(s)
==9980== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9980== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9980== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9980== by 0x40EFC2: execbuiltin (builtin.c:450)
==9980== by 0x42D8E9: execcmd (exec.c:3378)
==9980== by 0x428CA0: execpline2 (exec.c:1697)
==9980== by 0x427FD2: execpline (exec.c:1484)
==9980== by 0x42779A: execlist (exec.c:1275)
==9980== by 0x42717C: execode (exec.c:1073)
==9980== by 0x431299: runshfunc (exec.c:5040)
==9980== by 0x430E76: doshfunc (exec.c:4920)
==9980== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9980==
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9982-by-pythonnut-on-???
==9982== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9982-by-pythonnut-on-???
==9982== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9982-by-pythonnut-on-???
==9982==
==9982== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9982== don't want to do, unless you know exactly what you're doing,
==9982== or are doing some strange experiment):
==9982== /usr/lib/valgrind/../../bin/vgdb --pid=9982 ...command...
==9982==
==9982== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9982== /path/to/gdb ./zsh
==9982== and then give GDB the following command
==9982== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9982
==9982== --pid is optional if only one valgrind process is running
==9982==
--9982-- Caught __NR_exit; running __libc_freeres()
--9982-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982==
==9982== HEAP SUMMARY:
==9982== in use at exit: 3,115,258 bytes in 69,006 blocks
==9982== total heap usage: 1,592,269 allocs, 1,523,263 frees, 128,613,676 bytes allocated
==9982==
--9977-- Caught __NR_exit; running __libc_freeres()
==9982== Searching for pointers to 69,006 not-freed blocks
--9982-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9982-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9982-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9982-- Scanning root segment: 0x4037000..0x403afff (16384)
--9982-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9982-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9982-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9982-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9982-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9982-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9982-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9982-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9982-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9982-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9982-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9982-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9982-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9982-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9982-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9982-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9982-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9982-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9982-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9982-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9982-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9982-- Scanning root segment: 0x701a000..0x701afff (4096)
--9982-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9982-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9982-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9982-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9982-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9982-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9982-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9982-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9982-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9982-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== Checked 4,765,936 bytes
==9981==
--9977-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9977==
==9977== HEAP SUMMARY:
==9977== in use at exit: 3,157,330 bytes in 69,186 blocks
==9977== total heap usage: 1,596,016 allocs, 1,526,830 frees, 129,903,927 bytes allocated
==9977==
==9981== LEAK SUMMARY:
==9981== definitely lost: 2,189 bytes in 12 blocks
==9981== indirectly lost: 6,756 bytes in 7 blocks
==9981== possibly lost: 0 bytes in 0 blocks
==9981== still reachable: 3,102,706 bytes in 68,894 blocks
==9981== suppressed: 0 bytes in 0 blocks
==9981== Rerun with --leak-check=full to see details of leaked memory
==9981==
==9981== Use --track-origins=yes to see where uninitialised values come from
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9981==
==9981== 1 errors in context 1 of 2:
==9981== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9981== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9981== by 0x488CD0: stringsubst (subst.c:301)
==9981== by 0x48801B: prefork (subst.c:77)
==9981== by 0x42B318: execcmd (exec.c:2619)
==9981== by 0x428CA0: execpline2 (exec.c:1697)
==9981== by 0x427FD2: execpline (exec.c:1484)
==9981== by 0x427756: execlist (exec.c:1267)
==9981== by 0x42717C: execode (exec.c:1073)
==9981== by 0x431299: runshfunc (exec.c:5040)
==9981== by 0x430E76: doshfunc (exec.c:4920)
==9981== by 0x4302FB: execshfunc (exec.c:4557)
==9981== by 0x42D8C1: execcmd (exec.c:3373)
==9981==
==9981==
==9981== 2 errors in context 2 of 2:
==9981== Conditional jump or move depends on uninitialised value(s)
==9981== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9981== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9981== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9981== by 0x40EFC2: execbuiltin (builtin.c:450)
==9981== by 0x42D8E9: execcmd (exec.c:3378)
==9981== by 0x428CA0: execpline2 (exec.c:1697)
==9981== by 0x427FD2: execpline (exec.c:1484)
==9981== by 0x42779A: execlist (exec.c:1275)
==9981== by 0x42717C: execode (exec.c:1073)
==9981== by 0x431299: runshfunc (exec.c:5040)
==9981== by 0x430E76: doshfunc (exec.c:4920)
==9981== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9981==
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977== Searching for pointers to 69,186 not-freed blocks
--9977-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9977-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9977-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9977-- Scanning root segment: 0x4037000..0x4043fff (53248)
--9977-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9977-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9977-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9977-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9977-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9977-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9977-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9977-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9977-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9977-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9977-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9977-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9977-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9977-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9977-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9977-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9977-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9977-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9977-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9977-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9977-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9977-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9977-- Scanning root segment: 0x701a000..0x701afff (4096)
--9977-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9977-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9977-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9977-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9977-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9977-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9977-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9977-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9977-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9977-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9984-- Caught __NR_exit; running __libc_freeres()
==9984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9984-by-pythonnut-on-???
==9984== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9984-by-pythonnut-on-???
==9984== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9984-by-pythonnut-on-???
==9984==
==9984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9984== don't want to do, unless you know exactly what you're doing,
==9984== or are doing some strange experiment):
==9984== /usr/lib/valgrind/../../bin/vgdb --pid=9984 ...command...
==9984==
==9984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9984== /path/to/gdb ./zsh
==9984== and then give GDB the following command
==9984== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9984
==9984== --pid is optional if only one valgrind process is running
==9984==
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==9982== Checked 4,790,360 bytes
==9982==
--9984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982== LEAK SUMMARY:
==9982== definitely lost: 2,189 bytes in 12 blocks
==9982== indirectly lost: 6,756 bytes in 7 blocks
==9982== possibly lost: 0 bytes in 0 blocks
==9982== still reachable: 3,106,313 bytes in 68,987 blocks
==9982== suppressed: 0 bytes in 0 blocks
==9982== Rerun with --leak-check=full to see details of leaked memory
==9982==
==9982== Use --track-origins=yes to see where uninitialised values come from
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982==
==9982== 1 errors in context 1 of 2:
==9982== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9982== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9982== by 0x488CD0: stringsubst (subst.c:301)
==9982== by 0x48801B: prefork (subst.c:77)
==9982== by 0x42B318: execcmd (exec.c:2619)
==9982== by 0x428CA0: execpline2 (exec.c:1697)
==9982== by 0x427FD2: execpline (exec.c:1484)
==9982== by 0x427756: execlist (exec.c:1267)
==9982== by 0x42717C: execode (exec.c:1073)
==9982== by 0x431299: runshfunc (exec.c:5040)
==9982== by 0x430E76: doshfunc (exec.c:4920)
==9982== by 0x4302FB: execshfunc (exec.c:4557)
==9982== by 0x42D8C1: execcmd (exec.c:3373)
==9982==
==9982==
==9982== 2 errors in context 2 of 2:
==9982== Conditional jump or move depends on uninitialised value(s)
==9982== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9982== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9982== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9982== by 0x40EFC2: execbuiltin (builtin.c:450)
==9982== by 0x42D8E9: execcmd (exec.c:3378)
==9982== by 0x428CA0: execpline2 (exec.c:1697)
==9982== by 0x427FD2: execpline (exec.c:1484)
==9982== by 0x42779A: execlist (exec.c:1275)
==9982== by 0x42717C: execode (exec.c:1073)
==9982== by 0x431299: runshfunc (exec.c:5040)
==9982== by 0x430E76: doshfunc (exec.c:4920)
==9982== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9982==
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984==
==9984== HEAP SUMMARY:
==9984== in use at exit: 3,123,883 bytes in 69,153 blocks
==9984== total heap usage: 1,592,581 allocs, 1,523,428 frees, 128,531,730 bytes allocated
==9984==
==9986== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9986-by-pythonnut-on-???
==9986== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9986-by-pythonnut-on-???
==9986== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9986-by-pythonnut-on-???
==9986==
==9986== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9986== don't want to do, unless you know exactly what you're doing,
==9986== or are doing some strange experiment):
==9986== /usr/lib/valgrind/../../bin/vgdb --pid=9986 ...command...
==9986==
==9986== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9986== /path/to/gdb ./zsh
==9986== and then give GDB the following command
==9986== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9986
==9986== --pid is optional if only one valgrind process is running
==9986==
--9986-- Caught __NR_exit; running __libc_freeres()
==9977== Checked 4,947,240 bytes
==9977==
==9984== Searching for pointers to 69,153 not-freed blocks
--9984-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9984-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9984-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9984-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9984-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9984-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9984-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9984-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9984-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9984-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9984-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9984-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9984-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9984-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9984-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9984-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9984-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9984-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9984-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9984-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9984-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9984-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9984-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9984-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9984-- Scanning root segment: 0x701a000..0x701afff (4096)
--9984-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9984-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9984-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9984-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9984-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9984-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9984-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9984-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9984-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9984-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9986-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9986==
==9986== HEAP SUMMARY:
==9986== in use at exit: 3,115,257 bytes in 69,006 blocks
==9986== total heap usage: 1,592,274 allocs, 1,523,268 frees, 128,615,789 bytes allocated
==9986==
==9977== LEAK SUMMARY:
==9977== definitely lost: 2,189 bytes in 12 blocks
==9977== indirectly lost: 6,756 bytes in 7 blocks
==9977== possibly lost: 0 bytes in 0 blocks
==9977== still reachable: 3,148,385 bytes in 69,167 blocks
==9977== suppressed: 0 bytes in 0 blocks
==9977== Rerun with --leak-check=full to see details of leaked memory
==9977==
==9977== Use --track-origins=yes to see where uninitialised values come from
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977==
==9977== 1 errors in context 1 of 2:
==9977== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9977== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9977== by 0x488CD0: stringsubst (subst.c:301)
==9977== by 0x48801B: prefork (subst.c:77)
==9977== by 0x42B318: execcmd (exec.c:2619)
==9977== by 0x428CA0: execpline2 (exec.c:1697)
==9977== by 0x427FD2: execpline (exec.c:1484)
==9977== by 0x427756: execlist (exec.c:1267)
==9977== by 0x42717C: execode (exec.c:1073)
==9977== by 0x431299: runshfunc (exec.c:5040)
==9977== by 0x430E76: doshfunc (exec.c:4920)
==9977== by 0x4302FB: execshfunc (exec.c:4557)
==9977== by 0x42D8C1: execcmd (exec.c:3373)
==9977==
==9977==
==9977== 2 errors in context 2 of 2:
==9977== Conditional jump or move depends on uninitialised value(s)
==9977== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9977== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9977== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9977== by 0x40EFC2: execbuiltin (builtin.c:450)
==9977== by 0x42D8E9: execcmd (exec.c:3378)
==9977== by 0x428CA0: execpline2 (exec.c:1697)
==9977== by 0x427FD2: execpline (exec.c:1484)
==9977== by 0x42779A: execlist (exec.c:1275)
==9977== by 0x42717C: execode (exec.c:1073)
==9977== by 0x431299: runshfunc (exec.c:5040)
==9977== by 0x430E76: doshfunc (exec.c:4920)
==9977== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9977==
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Searching for pointers to 69,006 not-freed blocks
--9986-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9986-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9986-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9986-- Scanning root segment: 0x4037000..0x403afff (16384)
--9986-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9986-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9986-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9986-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9986-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9986-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9986-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9986-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9986-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9986-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9986-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9986-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9986-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9986-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9986-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9986-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9986-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9986-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9986-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9986-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9986-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9986-- Scanning root segment: 0x701a000..0x701afff (4096)
--9986-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9986-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9986-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9986-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9986-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9986-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9986-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9986-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9986-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9986-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9989-by-pythonnut-on-???
==9989== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9989-by-pythonnut-on-???
==9989== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9989-by-pythonnut-on-???
==9989==
==9989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9989== don't want to do, unless you know exactly what you're doing,
==9989== or are doing some strange experiment):
==9989== /usr/lib/valgrind/../../bin/vgdb --pid=9989 ...command...
==9989==
==9989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9989== /path/to/gdb ./zsh
==9989== and then give GDB the following command
==9989== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9989
==9989== --pid is optional if only one valgrind process is running
==9989==
--9989-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEDFFC, len 4
--9990-- Caught __NR_exit; running __libc_freeres()
--9989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9990-by-pythonnut-on-???
==9990== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9990-by-pythonnut-on-???
==9990== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9990-by-pythonnut-on-???
==9990==
==9990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9990== don't want to do, unless you know exactly what you're doing,
==9990== or are doing some strange experiment):
==9990== /usr/lib/valgrind/../../bin/vgdb --pid=9990 ...command...
==9990==
==9990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9990== /path/to/gdb ./zsh
==9990== and then give GDB the following command
==9990== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9990
==9990== --pid is optional if only one valgrind process is running
==9990==
==9989==
==9989== HEAP SUMMARY:
==9989== in use at exit: 3,163,544 bytes in 69,186 blocks
==9989== total heap usage: 1,592,303 allocs, 1,523,117 frees, 128,684,264 bytes allocated
==9989==
--9990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990==
==9984== Checked 4,785,176 bytes
==9984==
==9990== HEAP SUMMARY:
==9990== in use at exit: 3,142,072 bytes in 69,186 blocks
==9990== total heap usage: 1,592,309 allocs, 1,523,123 frees, 128,686,384 bytes allocated
==9990==
==9989== Searching for pointers to 69,186 not-freed blocks
--9989-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9989-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9989-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9989-- Scanning root segment: 0x4037000..0x4047fff (69632)
--9989-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9989-- Scanning root segment: 0x41d6000..0x4204fff (192512)
--9989-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9989-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9989-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9989-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9989-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9989-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9989-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9989-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9989-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9989-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9989-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9989-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9989-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9989-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9989-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9989-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9989-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9989-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9989-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9989-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9989-- Scanning root segment: 0x701a000..0x701afff (4096)
--9989-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9989-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9989-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9989-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9989-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9989-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9989-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9989-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9989-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9989-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9984== LEAK SUMMARY:
==9984== definitely lost: 2,189 bytes in 12 blocks
==9984== indirectly lost: 6,756 bytes in 7 blocks
==9984== possibly lost: 0 bytes in 0 blocks
==9984== still reachable: 3,114,938 bytes in 69,134 blocks
==9984== suppressed: 0 bytes in 0 blocks
==9984== Rerun with --leak-check=full to see details of leaked memory
==9984==
==9984== Use --track-origins=yes to see where uninitialised values come from
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984==
==9984== 1 errors in context 1 of 2:
==9984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9984== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9984== by 0x488CD0: stringsubst (subst.c:301)
==9984== by 0x48801B: prefork (subst.c:77)
==9984== by 0x42B318: execcmd (exec.c:2619)
==9984== by 0x428CA0: execpline2 (exec.c:1697)
==9984== by 0x427FD2: execpline (exec.c:1484)
==9984== by 0x427756: execlist (exec.c:1267)
==9984== by 0x42717C: execode (exec.c:1073)
==9984== by 0x431299: runshfunc (exec.c:5040)
==9984== by 0x430E76: doshfunc (exec.c:4920)
==9984== by 0x4302FB: execshfunc (exec.c:4557)
==9984== by 0x42D8C1: execcmd (exec.c:3373)
==9984==
==9984==
==9984== 2 errors in context 2 of 2:
==9984== Conditional jump or move depends on uninitialised value(s)
==9984== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9984== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9984== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9984== by 0x40EFC2: execbuiltin (builtin.c:450)
==9984== by 0x42D8E9: execcmd (exec.c:3378)
==9984== by 0x428CA0: execpline2 (exec.c:1697)
==9984== by 0x427FD2: execpline (exec.c:1484)
==9984== by 0x42779A: execlist (exec.c:1275)
==9984== by 0x42717C: execode (exec.c:1073)
==9984== by 0x431299: runshfunc (exec.c:5040)
==9984== by 0x430E76: doshfunc (exec.c:4920)
==9984== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9984==
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Checked 4,790,360 bytes
==9986==
--9983-- Caught __NR_exit; running __libc_freeres()
==9990== Searching for pointers to 69,186 not-freed blocks
--9990-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9990-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9990-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9990-- Scanning root segment: 0x4037000..0x4047fff (69632)
--9990-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9990-- Scanning root segment: 0x41d6000..0x4204fff (192512)
==9983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9983-by-pythonnut-on-???
==9983== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9983-by-pythonnut-on-???
==9983== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9983-by-pythonnut-on-???
==9983==
==9983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9983== don't want to do, unless you know exactly what you're doing,
==9983== or are doing some strange experiment):
==9983== /usr/lib/valgrind/../../bin/vgdb --pid=9983 ...command...
==9983==
==9983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9983== /path/to/gdb ./zsh
==9983== and then give GDB the following command
==9983== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9983
==9983== --pid is optional if only one valgrind process is running
==9983==
--9990-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9990-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9990-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9990-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9990-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9990-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9990-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9990-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9990-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9990-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9990-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9990-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9990-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9990-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9990-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9990-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9990-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9990-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9990-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9990-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9990-- Scanning root segment: 0x701a000..0x701afff (4096)
--9990-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9990-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9990-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9990-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9990-- Scanning root segment: 0xb268000..0xb268fff (4096)
==9986== LEAK SUMMARY:
==9986== definitely lost: 2,189 bytes in 12 blocks
--9990-- Scanning root segment: 0xb46a000..0xb46afff (4096)
==9986== indirectly lost: 6,756 bytes in 7 blocks
==9986== possibly lost: 0 bytes in 0 blocks
==9986== still reachable: 3,106,312 bytes in 68,987 blocks
==9986== suppressed: 0 bytes in 0 blocks
==9986== Rerun with --leak-check=full to see details of leaked memory
==9986==
--9990-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9990-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
==9986== Use --track-origins=yes to see where uninitialised values come from
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986==
==9986== 1 errors in context 1 of 2:
==9986== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--9990-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
==9986== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9986== by 0x488CD0: stringsubst (subst.c:301)
==9986== by 0x48801B: prefork (subst.c:77)
==9986== by 0x42B318: execcmd (exec.c:2619)
--9990-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9986== by 0x428CA0: execpline2 (exec.c:1697)
==9986== by 0x427FD2: execpline (exec.c:1484)
==9986== by 0x427756: execlist (exec.c:1267)
==9986== by 0x42717C: execode (exec.c:1073)
==9986== by 0x431299: runshfunc (exec.c:5040)
==9986== by 0x430E76: doshfunc (exec.c:4920)
==9986== by 0x4302FB: execshfunc (exec.c:4557)
==9986== by 0x42D8C1: execcmd (exec.c:3373)
==9986==
==9986==
==9986== 2 errors in context 2 of 2:
==9986== Conditional jump or move depends on uninitialised value(s)
==9986== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9986== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9986== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9986== by 0x40EFC2: execbuiltin (builtin.c:450)
==9986== by 0x42D8E9: execcmd (exec.c:3378)
==9986== by 0x428CA0: execpline2 (exec.c:1697)
==9986== by 0x427FD2: execpline (exec.c:1484)
==9986== by 0x42779A: execlist (exec.c:1275)
==9986== by 0x42717C: execode (exec.c:1073)
==9986== by 0x431299: runshfunc (exec.c:5040)
==9986== by 0x430E76: doshfunc (exec.c:4920)
==9986== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9986==
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9992-by-pythonnut-on-???
==9992== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9992-by-pythonnut-on-???
==9992== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9992-by-pythonnut-on-???
==9992==
==9992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9992== don't want to do, unless you know exactly what you're doing,
==9992== or are doing some strange experiment):
==9992== /usr/lib/valgrind/../../bin/vgdb --pid=9992 ...command...
==9992==
==9992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9992== /path/to/gdb ./zsh
==9992== and then give GDB the following command
==9992== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9992
==9992== --pid is optional if only one valgrind process is running
==9992==
--9992-- Caught __NR_exit; running __libc_freeres()
==9983==
==9983== HEAP SUMMARY:
==9983== in use at exit: 3,123,819 bytes in 69,150 blocks
==9983== total heap usage: 1,592,579 allocs, 1,523,429 frees, 128,531,489 bytes allocated
==9983==
--9992-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992==
==9992== HEAP SUMMARY:
==9992== in use at exit: 3,115,256 bytes in 69,006 blocks
==9992== total heap usage: 1,592,279 allocs, 1,523,273 frees, 128,617,902 bytes allocated
==9992==
==9983== Searching for pointers to 69,150 not-freed blocks
--9983-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9983-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9983-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9983-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9983-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9983-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9983-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9983-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9983-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9983-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9983-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9983-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9983-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9983-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9983-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9983-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9983-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9983-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9983-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9983-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9983-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9983-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9983-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9983-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9983-- Scanning root segment: 0x701a000..0x701afff (4096)
--9983-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9983-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9983-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9983-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9983-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9983-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9983-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9983-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9983-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9983-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== Checked 5,088,288 bytes
==9989==
==9992== Searching for pointers to 69,006 not-freed blocks
--9992-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9992-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9992-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9992-- Scanning root segment: 0x4037000..0x403afff (16384)
--9992-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9992-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9992-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9992-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9992-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9992-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9992-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9992-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9992-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9992-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9992-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9992-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9992-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9992-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9992-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9992-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9992-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9992-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9992-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9992-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9992-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9992-- Scanning root segment: 0x701a000..0x701afff (4096)
--9992-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9992-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9992-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9992-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9992-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9992-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9992-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9992-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9992-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9992-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== LEAK SUMMARY:
==9989== definitely lost: 2,189 bytes in 12 blocks
==9989== indirectly lost: 6,756 bytes in 7 blocks
==9989== possibly lost: 0 bytes in 0 blocks
==9989== still reachable: 3,154,599 bytes in 69,167 blocks
==9989== suppressed: 0 bytes in 0 blocks
==9989== Rerun with --leak-check=full to see details of leaked memory
==9989==
==9989== Use --track-origins=yes to see where uninitialised values come from
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9989==
==9989== 1 errors in context 1 of 2:
==9989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9989== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9989== by 0x488CD0: stringsubst (subst.c:301)
==9989== by 0x48801B: prefork (subst.c:77)
==9989== by 0x42B318: execcmd (exec.c:2619)
==9989== by 0x428CA0: execpline2 (exec.c:1697)
==9989== by 0x427FD2: execpline (exec.c:1484)
==9989== by 0x427756: execlist (exec.c:1267)
==9989== by 0x42717C: execode (exec.c:1073)
==9989== by 0x431299: runshfunc (exec.c:5040)
==9989== by 0x430E76: doshfunc (exec.c:4920)
==9989== by 0x4302FB: execshfunc (exec.c:4557)
==9989== by 0x42D8C1: execcmd (exec.c:3373)
==9989==
==9989==
==9989== 2 errors in context 2 of 2:
==9989== Conditional jump or move depends on uninitialised value(s)
==9989== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9989== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9989== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9989== by 0x40EFC2: execbuiltin (builtin.c:450)
==9989== by 0x42D8E9: execcmd (exec.c:3378)
==9989== by 0x428CA0: execpline2 (exec.c:1697)
==9989== by 0x427FD2: execpline (exec.c:1484)
==9989== by 0x42779A: execlist (exec.c:1275)
==9989== by 0x42717C: execode (exec.c:1073)
==9989== by 0x431299: runshfunc (exec.c:5040)
==9989== by 0x430E76: doshfunc (exec.c:4920)
==9989== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9989==
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990== Checked 5,066,936 bytes
==9990==
==9990== LEAK SUMMARY:
==9990== definitely lost: 2,213 bytes in 13 blocks
==9990== indirectly lost: 6,796 bytes in 9 blocks
==9990== possibly lost: 0 bytes in 0 blocks
==9990== still reachable: 3,133,063 bytes in 69,164 blocks
==9990== suppressed: 0 bytes in 0 blocks
==9990== Rerun with --leak-check=full to see details of leaked memory
==9990==
==9990== Use --track-origins=yes to see where uninitialised values come from
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990==
==9990== 1 errors in context 1 of 2:
==9990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9990== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9990== by 0x488CD0: stringsubst (subst.c:301)
==9990== by 0x48801B: prefork (subst.c:77)
==9990== by 0x42B318: execcmd (exec.c:2619)
==9990== by 0x428CA0: execpline2 (exec.c:1697)
==9990== by 0x427FD2: execpline (exec.c:1484)
==9990== by 0x427756: execlist (exec.c:1267)
==9990== by 0x42717C: execode (exec.c:1073)
==9990== by 0x431299: runshfunc (exec.c:5040)
==9990== by 0x430E76: doshfunc (exec.c:4920)
==9990== by 0x4302FB: execshfunc (exec.c:4557)
==9990== by 0x42D8C1: execcmd (exec.c:3373)
==9990==
==9990==
==9990== 2 errors in context 2 of 2:
==9990== Conditional jump or move depends on uninitialised value(s)
==9990== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9990== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9990== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9990== by 0x40EFC2: execbuiltin (builtin.c:450)
==9990== by 0x42D8E9: execcmd (exec.c:3378)
==9990== by 0x428CA0: execpline2 (exec.c:1697)
==9990== by 0x427FD2: execpline (exec.c:1484)
==9990== by 0x42779A: execlist (exec.c:1275)
==9990== by 0x42717C: execode (exec.c:1073)
==9990== by 0x431299: runshfunc (exec.c:5040)
==9990== by 0x430E76: doshfunc (exec.c:4920)
==9990== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9990==
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9993== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9993-by-pythonnut-on-???
==9993== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9993-by-pythonnut-on-???
==9993== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9993-by-pythonnut-on-???
==9993==
==9993== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9993== don't want to do, unless you know exactly what you're doing,
==9993== or are doing some strange experiment):
==9993== /usr/lib/valgrind/../../bin/vgdb --pid=9993 ...command...
==9993==
==9993== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9993== /path/to/gdb ./zsh
==9993== and then give GDB the following command
==9993== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9993
==9993== --pid is optional if only one valgrind process is running
==9993==
client request: code 4d430005, addr 0xFFEFEE97C, len 4
--9968-- Caught __NR_exit; running __libc_freeres()
==9983== Checked 4,784,488 bytes
==9983==
==9992== Checked 4,790,360 bytes
==9992==
--9968-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9983== LEAK SUMMARY:
==9983== definitely lost: 2,189 bytes in 12 blocks
==9983== indirectly lost: 6,756 bytes in 7 blocks
==9983== possibly lost: 0 bytes in 0 blocks
==9983== still reachable: 3,114,874 bytes in 69,131 blocks
==9983== suppressed: 0 bytes in 0 blocks
==9983== Rerun with --leak-check=full to see details of leaked memory
==9983==
==9983== Use --track-origins=yes to see where uninitialised values come from
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9983==
==9983== 1 errors in context 1 of 2:
==9983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9983== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9983== by 0x488CD0: stringsubst (subst.c:301)
==9983== by 0x48801B: prefork (subst.c:77)
==9983== by 0x42B318: execcmd (exec.c:2619)
==9983== by 0x428CA0: execpline2 (exec.c:1697)
==9983== by 0x427FD2: execpline (exec.c:1484)
==9983== by 0x427756: execlist (exec.c:1267)
==9983== by 0x42717C: execode (exec.c:1073)
==9983== by 0x431299: runshfunc (exec.c:5040)
==9983== by 0x430E76: doshfunc (exec.c:4920)
==9983== by 0x4302FB: execshfunc (exec.c:4557)
==9983== by 0x42D8C1: execcmd (exec.c:3373)
==9983==
==9983==
==9983== 2 errors in context 2 of 2:
==9983== Conditional jump or move depends on uninitialised value(s)
==9983== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9983== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9983== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9983== by 0x40EFC2: execbuiltin (builtin.c:450)
==9983== by 0x42D8E9: execcmd (exec.c:3378)
==9983== by 0x428CA0: execpline2 (exec.c:1697)
==9983== by 0x427FD2: execpline (exec.c:1484)
==9983== by 0x42779A: execlist (exec.c:1275)
==9983== by 0x42717C: execode (exec.c:1073)
==9983== by 0x431299: runshfunc (exec.c:5040)
==9983== by 0x430E76: doshfunc (exec.c:4920)
==9983== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9983==
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968==
==9968== HEAP SUMMARY:
==9968== in use at exit: 3,119,891 bytes in 69,168 blocks
==9968== total heap usage: 1,592,310 allocs, 1,523,142 frees, 128,686,952 bytes allocated
==9968==
==9992== LEAK SUMMARY:
==9992== definitely lost: 2,189 bytes in 12 blocks
==9992== indirectly lost: 6,756 bytes in 7 blocks
==9992== possibly lost: 0 bytes in 0 blocks
==9992== still reachable: 3,106,311 bytes in 68,987 blocks
==9992== suppressed: 0 bytes in 0 blocks
==9992== Rerun with --leak-check=full to see details of leaked memory
==9992==
==9992== Use --track-origins=yes to see where uninitialised values come from
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9992==
==9992== 1 errors in context 1 of 2:
==9992== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9992== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9992== by 0x488CD0: stringsubst (subst.c:301)
==9992== by 0x48801B: prefork (subst.c:77)
==9992== by 0x42B318: execcmd (exec.c:2619)
==9992== by 0x428CA0: execpline2 (exec.c:1697)
==9992== by 0x427FD2: execpline (exec.c:1484)
==9992== by 0x427756: execlist (exec.c:1267)
==9992== by 0x42717C: execode (exec.c:1073)
==9992== by 0x431299: runshfunc (exec.c:5040)
==9992== by 0x430E76: doshfunc (exec.c:4920)
==9992== by 0x4302FB: execshfunc (exec.c:4557)
==9992== by 0x42D8C1: execcmd (exec.c:3373)
==9992==
==9992==
==9992== 2 errors in context 2 of 2:
==9992== Conditional jump or move depends on uninitialised value(s)
==9992== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9992== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9992== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9992== by 0x40EFC2: execbuiltin (builtin.c:450)
==9992== by 0x42D8E9: execcmd (exec.c:3378)
==9992== by 0x428CA0: execpline2 (exec.c:1697)
==9992== by 0x427FD2: execpline (exec.c:1484)
==9992== by 0x42779A: execlist (exec.c:1275)
==9992== by 0x42717C: execode (exec.c:1073)
==9992== by 0x431299: runshfunc (exec.c:5040)
==9992== by 0x430E76: doshfunc (exec.c:4920)
==9992== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9992==
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9994-- Caught __NR_exit; running __libc_freeres()
==9995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9995-by-pythonnut-on-???
==9995== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9995-by-pythonnut-on-???
==9995== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9995-by-pythonnut-on-???
==9995==
==9995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9995== don't want to do, unless you know exactly what you're doing,
==9995== or are doing some strange experiment):
==9995== /usr/lib/valgrind/../../bin/vgdb --pid=9995 ...command...
==9995==
==9995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9995== /path/to/gdb ./zsh
==9995== and then give GDB the following command
==9995== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9995
==9995== --pid is optional if only one valgrind process is running
==9995==
--9995-- Caught __NR_exit; running __libc_freeres()
==9968== Searching for pointers to 69,168 not-freed blocks
--9968-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9968-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9968-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9968-- Scanning root segment: 0x4037000..0x403afff (16384)
--9968-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9968-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9968-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9968-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9968-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9968-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9968-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9968-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9968-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9968-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9968-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9968-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9968-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9968-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9968-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9968-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9968-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9968-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9968-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9968-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9968-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9968-- Scanning root segment: 0x701a000..0x701afff (4096)
--9968-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9968-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9968-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9968-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9968-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9968-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9968-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9968-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9968-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9968-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9994-by-pythonnut-on-???
==9994== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9994-by-pythonnut-on-???
==9994== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9994-by-pythonnut-on-???
==9994==
==9994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9994== don't want to do, unless you know exactly what you're doing,
==9994== or are doing some strange experiment):
==9994== /usr/lib/valgrind/../../bin/vgdb --pid=9994 ...command...
==9994==
==9994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9994== /path/to/gdb ./zsh
==9994== and then give GDB the following command
==9994== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9994
==9994== --pid is optional if only one valgrind process is running
==9994==
--9994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9995-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9994==
==9994== HEAP SUMMARY:
==9994== in use at exit: 3,123,826 bytes in 69,150 blocks
==9994== total heap usage: 1,592,594 allocs, 1,523,444 frees, 128,536,487 bytes allocated
==9994==
==9995==
==9995== HEAP SUMMARY:
==9995== in use at exit: 3,115,255 bytes in 69,006 blocks
==9995== total heap usage: 1,592,284 allocs, 1,523,278 frees, 128,620,015 bytes allocated
==9995==
==9994== Searching for pointers to 69,150 not-freed blocks
--9994-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9994-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9994-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9994-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9994-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9994-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9994-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9994-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9994-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9994-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9994-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9994-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9994-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9994-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9994-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9994-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9994-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9994-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9994-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9994-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9994-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9994-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9994-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9994-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9994-- Scanning root segment: 0x701a000..0x701afff (4096)
--9994-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9994-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9994-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9994-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9994-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9994-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9994-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9994-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9994-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9994-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9995== Searching for pointers to 69,006 not-freed blocks
--9995-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9995-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9995-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9995-- Scanning root segment: 0x4037000..0x403afff (16384)
--9995-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9995-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9995-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9995-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9995-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9995-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9995-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9995-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9995-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9995-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9995-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9995-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9995-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9995-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9995-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9995-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9995-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9995-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9995-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9995-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9995-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9995-- Scanning root segment: 0x701a000..0x701afff (4096)
--9995-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9995-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9995-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9995-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9995-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9995-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9995-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9995-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9995-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9995-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9968== Checked 4,796,920 bytes
==9968==
==9968== LEAK SUMMARY:
==9968== definitely lost: 2,189 bytes in 12 blocks
==9968== indirectly lost: 6,756 bytes in 7 blocks
==9968== possibly lost: 0 bytes in 0 blocks
==9968== still reachable: 3,110,946 bytes in 69,149 blocks
==9968== suppressed: 0 bytes in 0 blocks
==9968== Rerun with --leak-check=full to see details of leaked memory
==9968==
==9968== Use --track-origins=yes to see where uninitialised values come from
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968==
==9968== 1 errors in context 1 of 2:
==9968== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9968== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9968== by 0x488CD0: stringsubst (subst.c:301)
==9968== by 0x48801B: prefork (subst.c:77)
==9968== by 0x42B318: execcmd (exec.c:2619)
==9968== by 0x428CA0: execpline2 (exec.c:1697)
==9968== by 0x427FD2: execpline (exec.c:1484)
==9968== by 0x427756: execlist (exec.c:1267)
==9968== by 0x42717C: execode (exec.c:1073)
==9968== by 0x431299: runshfunc (exec.c:5040)
==9968== by 0x430E76: doshfunc (exec.c:4920)
==9968== by 0x4302FB: execshfunc (exec.c:4557)
==9968== by 0x42D8C1: execcmd (exec.c:3373)
==9968==
==9968==
==9968== 2 errors in context 2 of 2:
==9968== Conditional jump or move depends on uninitialised value(s)
==9968== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9968== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9968== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9968== by 0x40EFC2: execbuiltin (builtin.c:450)
==9968== by 0x42D8E9: execcmd (exec.c:3378)
==9968== by 0x428CA0: execpline2 (exec.c:1697)
==9968== by 0x427FD2: execpline (exec.c:1484)
==9968== by 0x42779A: execlist (exec.c:1275)
==9968== by 0x42717C: execode (exec.c:1073)
==9968== by 0x431299: runshfunc (exec.c:5040)
==9968== by 0x430E76: doshfunc (exec.c:4920)
==9968== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9968==
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994== Checked 4,784,632 bytes
==9994==
==9996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9996-by-pythonnut-on-???
==9996== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9996-by-pythonnut-on-???
==9996== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9996-by-pythonnut-on-???
==9996==
==9996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9996== don't want to do, unless you know exactly what you're doing,
==9996== or are doing some strange experiment):
==9996== /usr/lib/valgrind/../../bin/vgdb --pid=9996 ...command...
==9996==
==9996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9996== /path/to/gdb ./zsh
==9996== and then give GDB the following command
==9996== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9996
==9996== --pid is optional if only one valgrind process is running
==9996==
==9995== Checked 4,790,360 bytes
==9995==
--9996-- Caught __NR_exit; running __libc_freeres()
==9994== LEAK SUMMARY:
==9994== definitely lost: 2,189 bytes in 12 blocks
==9994== indirectly lost: 6,756 bytes in 7 blocks
==9994== possibly lost: 0 bytes in 0 blocks
==9994== still reachable: 3,114,881 bytes in 69,131 blocks
==9994== suppressed: 0 bytes in 0 blocks
==9994== Rerun with --leak-check=full to see details of leaked memory
==9994==
==9994== Use --track-origins=yes to see where uninitialised values come from
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994==
==9994== 1 errors in context 1 of 2:
==9994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9994== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9994== by 0x488CD0: stringsubst (subst.c:301)
==9994== by 0x48801B: prefork (subst.c:77)
==9994== by 0x42B318: execcmd (exec.c:2619)
==9994== by 0x428CA0: execpline2 (exec.c:1697)
==9994== by 0x427FD2: execpline (exec.c:1484)
==9994== by 0x427756: execlist (exec.c:1267)
==9994== by 0x42717C: execode (exec.c:1073)
==9994== by 0x431299: runshfunc (exec.c:5040)
==9994== by 0x430E76: doshfunc (exec.c:4920)
==9994== by 0x4302FB: execshfunc (exec.c:4557)
==9994== by 0x42D8C1: execcmd (exec.c:3373)
==9994==
==9994==
==9994== 2 errors in context 2 of 2:
==9994== Conditional jump or move depends on uninitialised value(s)
==9994== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9994== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9994== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9994== by 0x40EFC2: execbuiltin (builtin.c:450)
==9994== by 0x42D8E9: execcmd (exec.c:3378)
==9994== by 0x428CA0: execpline2 (exec.c:1697)
==9994== by 0x427FD2: execpline (exec.c:1484)
==9994== by 0x42779A: execlist (exec.c:1275)
==9994== by 0x42717C: execode (exec.c:1073)
==9994== by 0x431299: runshfunc (exec.c:5040)
==9994== by 0x430E76: doshfunc (exec.c:4920)
==9994== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9994==
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEF77C, len 4
==9995== LEAK SUMMARY:
==9995== definitely lost: 2,189 bytes in 12 blocks
==9995== indirectly lost: 6,756 bytes in 7 blocks
==9995== possibly lost: 0 bytes in 0 blocks
==9995== still reachable: 3,106,310 bytes in 68,987 blocks
==9995== suppressed: 0 bytes in 0 blocks
==9995== Rerun with --leak-check=full to see details of leaked memory
==9995==
==9995== Use --track-origins=yes to see where uninitialised values come from
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9995==
==9995== 1 errors in context 1 of 2:
==9995== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9995== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9995== by 0x488CD0: stringsubst (subst.c:301)
==9995== by 0x48801B: prefork (subst.c:77)
==9995== by 0x42B318: execcmd (exec.c:2619)
==9995== by 0x428CA0: execpline2 (exec.c:1697)
==9995== by 0x427FD2: execpline (exec.c:1484)
==9995== by 0x427756: execlist (exec.c:1267)
==9995== by 0x42717C: execode (exec.c:1073)
==9995== by 0x431299: runshfunc (exec.c:5040)
==9995== by 0x430E76: doshfunc (exec.c:4920)
==9995== by 0x4302FB: execshfunc (exec.c:4557)
==9995== by 0x42D8C1: execcmd (exec.c:3373)
==9995==
==9995==
==9995== 2 errors in context 2 of 2:
==9995== Conditional jump or move depends on uninitialised value(s)
==9995== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9995== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9995== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9995== by 0x40EFC2: execbuiltin (builtin.c:450)
==9995== by 0x42D8E9: execcmd (exec.c:3378)
==9995== by 0x428CA0: execpline2 (exec.c:1697)
==9995== by 0x427FD2: execpline (exec.c:1484)
==9995== by 0x42779A: execlist (exec.c:1275)
==9995== by 0x42717C: execode (exec.c:1073)
==9995== by 0x431299: runshfunc (exec.c:5040)
==9995== by 0x430E76: doshfunc (exec.c:4920)
==9995== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9995==
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9999-by-pythonnut-on-???
==9999== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9999-by-pythonnut-on-???
==9999== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9999-by-pythonnut-on-???
==9999==
==9999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9999== don't want to do, unless you know exactly what you're doing,
==9999== or are doing some strange experiment):
==9999== /usr/lib/valgrind/../../bin/vgdb --pid=9999 ...command...
==9999==
==9999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9999== /path/to/gdb ./zsh
==9999== and then give GDB the following command
==9999== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9999
==9999== --pid is optional if only one valgrind process is running
==9999==
==9998== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9998-by-pythonnut-on-???
==9998== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-9998-by-pythonnut-on-???
==9998== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-9998-by-pythonnut-on-???
==9998==
==9998== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9998== don't want to do, unless you know exactly what you're doing,
==9998== or are doing some strange experiment):
==9998== /usr/lib/valgrind/../../bin/vgdb --pid=9998 ...command...
==9998==
==9998== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9998== /path/to/gdb ./zsh
==9998== and then give GDB the following command
==9998== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9998
==9998== --pid is optional if only one valgrind process is running
==9998==
--9999-- Caught __NR_exit; running __libc_freeres()
--9996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996==
--9998-- Caught __NR_exit; running __libc_freeres()
==9996== HEAP SUMMARY:
==9996== in use at exit: 3,157,401 bytes in 69,169 blocks
==9996== total heap usage: 1,592,274 allocs, 1,523,105 frees, 128,637,790 bytes allocated
==9996==
--9999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9998-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996== Searching for pointers to 69,169 not-freed blocks
--9996-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9996-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9999==
--9996-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9996-- Scanning root segment: 0x4037000..0x404cfff (90112)
--9996-- Scanning root segment: 0x41d6000..0x41edfff (98304)
--9996-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9996-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9996-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9996-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9996-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9996-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9996-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9996-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9996-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9996-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9996-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9996-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9996-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9996-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9996-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9996-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9996-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9996-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9996-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9999== HEAP SUMMARY:
==9999== in use at exit: 3,115,254 bytes in 69,006 blocks
==9999== total heap usage: 1,592,292 allocs, 1,523,286 frees, 128,623,668 bytes allocated
==9999==
--9996-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9996-- Scanning root segment: 0x701a000..0x701afff (4096)
--9996-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9996-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9996-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9996-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9996-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9996-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9996-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9996-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9996-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9996-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9998==
==9998== HEAP SUMMARY:
==9998== in use at exit: 3,123,922 bytes in 69,150 blocks
==9998== total heap usage: 1,592,610 allocs, 1,523,460 frees, 128,541,274 bytes allocated
==9998==
==9998== Searching for pointers to 69,150 not-freed blocks
--9998-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9998-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9998-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9998-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9998-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9998-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9998-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9998-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9998-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9998-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9998-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9998-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9998-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9998-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9998-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9998-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9998-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9998-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9998-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9998-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9998-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9998-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9998-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9998-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9998-- Scanning root segment: 0x701a000..0x701afff (4096)
--9998-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9998-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9998-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9998-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9998-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9998-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9998-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9998-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9998-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9998-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9999== Searching for pointers to 69,006 not-freed blocks
--9999-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9999-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9999-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9999-- Scanning root segment: 0x4037000..0x403afff (16384)
--9999-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9999-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9999-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9999-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9999-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9999-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9999-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9999-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9999-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9999-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9999-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9999-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9999-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9999-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9999-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9999-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9999-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9999-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9999-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9999-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9999-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9999-- Scanning root segment: 0x701a000..0x701afff (4096)
--9999-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9999-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9999-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9999-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9999-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9999-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9999-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9999-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9999-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9999-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9996== Checked 4,990,792 bytes
==9996==
==9996== LEAK SUMMARY:
==9996== definitely lost: 2,189 bytes in 12 blocks
==9996== indirectly lost: 6,756 bytes in 7 blocks
==9996== possibly lost: 0 bytes in 0 blocks
==9996== still reachable: 3,148,456 bytes in 69,150 blocks
==9996== suppressed: 0 bytes in 0 blocks
==9996== Rerun with --leak-check=full to see details of leaked memory
==9996==
==9996== Use --track-origins=yes to see where uninitialised values come from
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9996==
==9996== 1 errors in context 1 of 2:
==9996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9996== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9996== by 0x488CD0: stringsubst (subst.c:301)
==9996== by 0x48801B: prefork (subst.c:77)
==9996== by 0x42B318: execcmd (exec.c:2619)
==9996== by 0x428CA0: execpline2 (exec.c:1697)
==9996== by 0x427FD2: execpline (exec.c:1484)
==9996== by 0x427756: execlist (exec.c:1267)
==9996== by 0x42717C: execode (exec.c:1073)
==9996== by 0x431299: runshfunc (exec.c:5040)
==9996== by 0x430E76: doshfunc (exec.c:4920)
==9996== by 0x4302FB: execshfunc (exec.c:4557)
==9996== by 0x42D8C1: execcmd (exec.c:3373)
==9996==
==9996==
==9996== 2 errors in context 2 of 2:
==9996== Conditional jump or move depends on uninitialised value(s)
==9996== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9996== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9996== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9996== by 0x40EFC2: execbuiltin (builtin.c:450)
==9996== by 0x42D8E9: execcmd (exec.c:3378)
==9996== by 0x428CA0: execpline2 (exec.c:1697)
==9996== by 0x427FD2: execpline (exec.c:1484)
==9996== by 0x42779A: execlist (exec.c:1275)
==9996== by 0x42717C: execode (exec.c:1073)
==9996== by 0x431299: runshfunc (exec.c:5040)
==9996== by 0x430E76: doshfunc (exec.c:4920)
==9996== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9996==
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Caught __NR_exit; running __libc_freeres()
==9998== Checked 4,783,912 bytes
==9998==
==9999== Checked 4,790,360 bytes
==9999==
==9998== LEAK SUMMARY:
==9998== definitely lost: 2,189 bytes in 12 blocks
==9998== indirectly lost: 6,756 bytes in 7 blocks
==9998== possibly lost: 0 bytes in 0 blocks
==9998== still reachable: 3,114,977 bytes in 69,131 blocks
==9998== suppressed: 0 bytes in 0 blocks
==9998== Rerun with --leak-check=full to see details of leaked memory
==9998==
==9998== Use --track-origins=yes to see where uninitialised values come from
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9998==
==9998== 1 errors in context 1 of 2:
==9998== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9998== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9998== by 0x488CD0: stringsubst (subst.c:301)
==9998== by 0x48801B: prefork (subst.c:77)
==9998== by 0x42B318: execcmd (exec.c:2619)
==9998== by 0x428CA0: execpline2 (exec.c:1697)
==9998== by 0x427FD2: execpline (exec.c:1484)
==9998== by 0x427756: execlist (exec.c:1267)
==9998== by 0x42717C: execode (exec.c:1073)
==9998== by 0x431299: runshfunc (exec.c:5040)
==9998== by 0x430E76: doshfunc (exec.c:4920)
==9998== by 0x4302FB: execshfunc (exec.c:4557)
==9998== by 0x42D8C1: execcmd (exec.c:3373)
==9998==
==9998==
==9998== 2 errors in context 2 of 2:
==9998== Conditional jump or move depends on uninitialised value(s)
==9998== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9998== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9998== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9998== by 0x40EFC2: execbuiltin (builtin.c:450)
==9998== by 0x42D8E9: execcmd (exec.c:3378)
==9998== by 0x428CA0: execpline2 (exec.c:1697)
==9998== by 0x427FD2: execpline (exec.c:1484)
==9998== by 0x42779A: execlist (exec.c:1275)
==9998== by 0x42717C: execode (exec.c:1073)
==9998== by 0x431299: runshfunc (exec.c:5040)
==9998== by 0x430E76: doshfunc (exec.c:4920)
==9998== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9998==
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9967==
==9967== HEAP SUMMARY:
==9967== in use at exit: 3,118,632 bytes in 69,135 blocks
==9967== total heap usage: 1,592,277 allocs, 1,523,142 frees, 128,638,366 bytes allocated
==9967==
==9999== LEAK SUMMARY:
==9999== definitely lost: 2,189 bytes in 12 blocks
==9999== indirectly lost: 6,756 bytes in 7 blocks
==9999== possibly lost: 0 bytes in 0 blocks
==9999== still reachable: 3,106,309 bytes in 68,987 blocks
==9999== suppressed: 0 bytes in 0 blocks
==9999== Rerun with --leak-check=full to see details of leaked memory
==9999==
==9999== Use --track-origins=yes to see where uninitialised values come from
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999==
==9999== 1 errors in context 1 of 2:
==9999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9999== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9999== by 0x488CD0: stringsubst (subst.c:301)
==9999== by 0x48801B: prefork (subst.c:77)
==9999== by 0x42B318: execcmd (exec.c:2619)
==9999== by 0x428CA0: execpline2 (exec.c:1697)
==9999== by 0x427FD2: execpline (exec.c:1484)
==9999== by 0x427756: execlist (exec.c:1267)
==9999== by 0x42717C: execode (exec.c:1073)
==9999== by 0x431299: runshfunc (exec.c:5040)
==9999== by 0x430E76: doshfunc (exec.c:4920)
==9999== by 0x4302FB: execshfunc (exec.c:4557)
==9999== by 0x42D8C1: execcmd (exec.c:3373)
==9999==
==9999==
==9999== 2 errors in context 2 of 2:
==9999== Conditional jump or move depends on uninitialised value(s)
==9999== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9999== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9999== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9999== by 0x40EFC2: execbuiltin (builtin.c:450)
==9999== by 0x42D8E9: execcmd (exec.c:3378)
==9999== by 0x428CA0: execpline2 (exec.c:1697)
==9999== by 0x427FD2: execpline (exec.c:1484)
==9999== by 0x42779A: execlist (exec.c:1275)
==9999== by 0x42717C: execode (exec.c:1073)
==9999== by 0x431299: runshfunc (exec.c:5040)
==9999== by 0x430E76: doshfunc (exec.c:4920)
==9999== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9999==
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10000-by-pythonnut-on-???
==10000== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10000-by-pythonnut-on-???
==10000== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10000-by-pythonnut-on-???
==10000==
==10000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10000== don't want to do, unless you know exactly what you're doing,
==10000== or are doing some strange experiment):
==10000== /usr/lib/valgrind/../../bin/vgdb --pid=10000 ...command...
==10000==
==10000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10000== /path/to/gdb ./zsh
==10000== and then give GDB the following command
==10000== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10000
==10000== --pid is optional if only one valgrind process is running
==10000==
--10001-- Caught __NR_exit; running __libc_freeres()
==10001== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10001-by-pythonnut-on-???
==10001== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10001-by-pythonnut-on-???
==10001== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10001-by-pythonnut-on-???
==10001==
==10001== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10001== don't want to do, unless you know exactly what you're doing,
==10001== or are doing some strange experiment):
==10001== /usr/lib/valgrind/../../bin/vgdb --pid=10001 ...command...
==10001==
==10001== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10001== /path/to/gdb ./zsh
==10001== and then give GDB the following command
==10001== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10001
==10001== --pid is optional if only one valgrind process is running
==10001==
--10000-- Caught __NR_exit; running __libc_freeres()
==9967== Searching for pointers to 69,135 not-freed blocks
--9967-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9967-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9967-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9967-- Scanning root segment: 0x4037000..0x403afff (16384)
--9967-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9967-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9967-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9967-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9967-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9967-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9967-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9967-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9967-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9967-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9967-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9967-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9967-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9967-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9967-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9967-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9967-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9967-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9967-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9967-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9967-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9967-- Scanning root segment: 0x701a000..0x701afff (4096)
--9967-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9967-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9967-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9967-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9967-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9967-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9967-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9967-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9967-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9967-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10001-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10001==
==10001== HEAP SUMMARY:
==10001== in use at exit: 3,115,257 bytes in 69,006 blocks
==10001== total heap usage: 1,592,294 allocs, 1,523,288 frees, 128,624,245 bytes allocated
==10001==
==10000==
==10000== HEAP SUMMARY:
==10000== in use at exit: 3,124,164 bytes in 69,156 blocks
==10000== total heap usage: 1,592,658 allocs, 1,523,502 frees, 128,550,290 bytes allocated
==10000==
==10001== Searching for pointers to 69,006 not-freed blocks
--10001-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10001-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10001-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10001-- Scanning root segment: 0x4037000..0x403afff (16384)
--10001-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10001-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10001-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10001-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10001-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10001-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10001-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10001-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10001-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10001-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10001-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10001-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10001-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10001-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10001-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10001-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10001-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10001-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10001-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10001-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10001-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10001-- Scanning root segment: 0x701a000..0x701afff (4096)
--10001-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10001-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10001-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10001-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10001-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10001-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10001-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10001-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10001-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10001-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10000== Searching for pointers to 69,156 not-freed blocks
--10000-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10000-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10000-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10000-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10000-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10000-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10000-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10000-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10000-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10000-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10000-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10000-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10000-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10000-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10000-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10000-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10000-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10000-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10000-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10000-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10000-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10000-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10000-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10000-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10000-- Scanning root segment: 0x701a000..0x701afff (4096)
--10000-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10000-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10000-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10000-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10000-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10000-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10000-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10000-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10000-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10000-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9967== Checked 4,793,912 bytes
==9967==
==9967== LEAK SUMMARY:
==9967== definitely lost: 2,189 bytes in 12 blocks
==9967== indirectly lost: 6,756 bytes in 7 blocks
==9967== possibly lost: 0 bytes in 0 blocks
==9967== still reachable: 3,109,687 bytes in 69,116 blocks
==9967== suppressed: 0 bytes in 0 blocks
==9967== Rerun with --leak-check=full to see details of leaked memory
==9967==
==9967== Use --track-origins=yes to see where uninitialised values come from
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9967==
==9967== 1 errors in context 1 of 2:
==9967== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9967== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9967== by 0x488CD0: stringsubst (subst.c:301)
==9967== by 0x48801B: prefork (subst.c:77)
==9967== by 0x42B318: execcmd (exec.c:2619)
==9967== by 0x428CA0: execpline2 (exec.c:1697)
==9967== by 0x427FD2: execpline (exec.c:1484)
==9967== by 0x427756: execlist (exec.c:1267)
==9967== by 0x42717C: execode (exec.c:1073)
==9967== by 0x431299: runshfunc (exec.c:5040)
==9967== by 0x430E76: doshfunc (exec.c:4920)
==9967== by 0x4302FB: execshfunc (exec.c:4557)
==9967== by 0x42D8C1: execcmd (exec.c:3373)
==9967==
==9967==
==9967== 2 errors in context 2 of 2:
==9967== Conditional jump or move depends on uninitialised value(s)
==9967== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9967== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9967== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9967== by 0x40EFC2: execbuiltin (builtin.c:450)
==9967== by 0x42D8E9: execcmd (exec.c:3378)
==9967== by 0x428CA0: execpline2 (exec.c:1697)
==9967== by 0x427FD2: execpline (exec.c:1484)
==9967== by 0x42779A: execlist (exec.c:1275)
==9967== by 0x42717C: execode (exec.c:1073)
==9967== by 0x431299: runshfunc (exec.c:5040)
==9967== by 0x430E76: doshfunc (exec.c:4920)
==9967== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9967==
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001== Checked 4,790,360 bytes
==10001==
==10000== Checked 4,784,080 bytes
==10000==
==10001== LEAK SUMMARY:
==10001== definitely lost: 2,189 bytes in 12 blocks
==10001== indirectly lost: 6,756 bytes in 7 blocks
==10001== possibly lost: 0 bytes in 0 blocks
==10001== still reachable: 3,106,312 bytes in 68,987 blocks
==10001== suppressed: 0 bytes in 0 blocks
==10001== Rerun with --leak-check=full to see details of leaked memory
==10001==
==10001== Use --track-origins=yes to see where uninitialised values come from
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001==
==10001== 1 errors in context 1 of 2:
==10001== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10001== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10001== by 0x488CD0: stringsubst (subst.c:301)
==10001== by 0x48801B: prefork (subst.c:77)
==10001== by 0x42B318: execcmd (exec.c:2619)
==10001== by 0x428CA0: execpline2 (exec.c:1697)
==10001== by 0x427FD2: execpline (exec.c:1484)
==10001== by 0x427756: execlist (exec.c:1267)
==10001== by 0x42717C: execode (exec.c:1073)
==10001== by 0x431299: runshfunc (exec.c:5040)
==10001== by 0x430E76: doshfunc (exec.c:4920)
==10001== by 0x4302FB: execshfunc (exec.c:4557)
==10001== by 0x42D8C1: execcmd (exec.c:3373)
==10001==
==10001==
==10001== 2 errors in context 2 of 2:
==10001== Conditional jump or move depends on uninitialised value(s)
==10001== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10001== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10001== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10001== by 0x40EFC2: execbuiltin (builtin.c:450)
==10001== by 0x42D8E9: execcmd (exec.c:3378)
==10001== by 0x428CA0: execpline2 (exec.c:1697)
==10001== by 0x427FD2: execpline (exec.c:1484)
==10001== by 0x42779A: execlist (exec.c:1275)
==10001== by 0x42717C: execode (exec.c:1073)
==10001== by 0x431299: runshfunc (exec.c:5040)
==10001== by 0x430E76: doshfunc (exec.c:4920)
==10001== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10001==
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== LEAK SUMMARY:
==10000== definitely lost: 2,189 bytes in 12 blocks
==10000== indirectly lost: 6,756 bytes in 7 blocks
==10000== possibly lost: 0 bytes in 0 blocks
==10000== still reachable: 3,115,219 bytes in 69,137 blocks
==10000== suppressed: 0 bytes in 0 blocks
==10000== Rerun with --leak-check=full to see details of leaked memory
==10000==
==10000== Use --track-origins=yes to see where uninitialised values come from
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000==
==10000== 1 errors in context 1 of 2:
==10000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10000== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10000== by 0x488CD0: stringsubst (subst.c:301)
==10000== by 0x48801B: prefork (subst.c:77)
==10000== by 0x42B318: execcmd (exec.c:2619)
==10000== by 0x428CA0: execpline2 (exec.c:1697)
==10000== by 0x427FD2: execpline (exec.c:1484)
==10000== by 0x427756: execlist (exec.c:1267)
==10000== by 0x42717C: execode (exec.c:1073)
==10000== by 0x431299: runshfunc (exec.c:5040)
==10000== by 0x430E76: doshfunc (exec.c:4920)
==10000== by 0x4302FB: execshfunc (exec.c:4557)
==10000== by 0x42D8C1: execcmd (exec.c:3373)
==10000==
==10000==
==10000== 2 errors in context 2 of 2:
==10000== Conditional jump or move depends on uninitialised value(s)
==10000== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10000== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10000== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10000== by 0x40EFC2: execbuiltin (builtin.c:450)
==10000== by 0x42D8E9: execcmd (exec.c:3378)
==10000== by 0x428CA0: execpline2 (exec.c:1697)
==10000== by 0x427FD2: execpline (exec.c:1484)
==10000== by 0x42779A: execlist (exec.c:1275)
==10000== by 0x42717C: execode (exec.c:1073)
==10000== by 0x431299: runshfunc (exec.c:5040)
==10000== by 0x430E76: doshfunc (exec.c:4920)
==10000== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10000==
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10004-by-pythonnut-on-???
==10004== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10004-by-pythonnut-on-???
==10004== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10004-by-pythonnut-on-???
==10004==
==10004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10004== don't want to do, unless you know exactly what you're doing,
==10004== or are doing some strange experiment):
==10004== /usr/lib/valgrind/../../bin/vgdb --pid=10004 ...command...
==10004==
==10004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10004== /path/to/gdb ./zsh
==10004== and then give GDB the following command
==10004== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10004
==10004== --pid is optional if only one valgrind process is running
==10004==
--10006-- Caught __NR_exit; running __libc_freeres()
==10006== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10006-by-pythonnut-on-???
==10006== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10006-by-pythonnut-on-???
==10006== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10006-by-pythonnut-on-???
==10006==
==10006== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10006== don't want to do, unless you know exactly what you're doing,
==10006== or are doing some strange experiment):
==10006== /usr/lib/valgrind/../../bin/vgdb --pid=10006 ...command...
==10006==
==10006== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10006== /path/to/gdb ./zsh
==10006== and then give GDB the following command
==10006== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10006
==10006== --pid is optional if only one valgrind process is running
==10006==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--10005-- Caught __NR_exit; running __libc_freeres()
--10006-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10005-by-pythonnut-on-???
==10005== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10005-by-pythonnut-on-???
==10005== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10005-by-pythonnut-on-???
==10005==
==10005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10005== don't want to do, unless you know exactly what you're doing,
==10005== or are doing some strange experiment):
==10005== /usr/lib/valgrind/../../bin/vgdb --pid=10005 ...command...
==10005==
==10005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10005== /path/to/gdb ./zsh
==10005== and then give GDB the following command
==10005== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10005
==10005== --pid is optional if only one valgrind process is running
==10005==
==10006==
==10006== HEAP SUMMARY:
==10006== in use at exit: 3,115,507 bytes in 69,011 blocks
==10006== total heap usage: 1,592,300 allocs, 1,523,289 frees, 128,627,859 bytes allocated
==10006==
--10005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005==
==10005== HEAP SUMMARY:
==10005== in use at exit: 3,124,100 bytes in 69,156 blocks
==10005== total heap usage: 1,592,638 allocs, 1,523,482 frees, 128,548,060 bytes allocated
==10005==
==10006== Searching for pointers to 69,011 not-freed blocks
--10006-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10006-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10006-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10006-- Scanning root segment: 0x4037000..0x403afff (16384)
--10006-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10006-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10006-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10006-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10006-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10006-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10006-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10006-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10006-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10006-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10006-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10006-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10006-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10006-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10006-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10006-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10006-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10006-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10006-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10006-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10006-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10006-- Scanning root segment: 0x701a000..0x701afff (4096)
--10006-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10006-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10006-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10006-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10006-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10006-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10006-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10006-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10006-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10006-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10005== Searching for pointers to 69,156 not-freed blocks
--10005-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10005-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10005-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10005-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10005-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10005-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10005-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10005-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10005-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10005-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10005-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10005-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10005-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10005-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10005-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10005-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10005-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10005-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10005-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10005-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10005-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10005-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10005-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10005-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10005-- Scanning root segment: 0x701a000..0x701afff (4096)
--10005-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10005-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10005-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10005-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10005-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10005-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10005-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10005-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10005-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10005-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10006== Checked 4,791,232 bytes
==10006==
==10006== LEAK SUMMARY:
==10006== definitely lost: 2,189 bytes in 12 blocks
==10006== indirectly lost: 6,756 bytes in 7 blocks
==10006== possibly lost: 0 bytes in 0 blocks
==10006== still reachable: 3,106,562 bytes in 68,992 blocks
==10006== suppressed: 0 bytes in 0 blocks
==10006== Rerun with --leak-check=full to see details of leaked memory
==10006==
==10006== Use --track-origins=yes to see where uninitialised values come from
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10006==
==10006== 1 errors in context 1 of 2:
==10006== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10006== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10006== by 0x488CD0: stringsubst (subst.c:301)
==10006== by 0x48801B: prefork (subst.c:77)
==10006== by 0x42B318: execcmd (exec.c:2619)
==10006== by 0x428CA0: execpline2 (exec.c:1697)
==10006== by 0x427FD2: execpline (exec.c:1484)
==10006== by 0x427756: execlist (exec.c:1267)
==10006== by 0x42717C: execode (exec.c:1073)
==10006== by 0x431299: runshfunc (exec.c:5040)
==10006== by 0x430E76: doshfunc (exec.c:4920)
==10006== by 0x4302FB: execshfunc (exec.c:4557)
==10006== by 0x42D8C1: execcmd (exec.c:3373)
==10006==
==10006==
==10006== 2 errors in context 2 of 2:
==10006== Conditional jump or move depends on uninitialised value(s)
==10006== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10006== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10006== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10006== by 0x40EFC2: execbuiltin (builtin.c:450)
==10006== by 0x42D8E9: execcmd (exec.c:3378)
==10006== by 0x428CA0: execpline2 (exec.c:1697)
==10006== by 0x427FD2: execpline (exec.c:1484)
==10006== by 0x42779A: execlist (exec.c:1275)
==10006== by 0x42717C: execode (exec.c:1073)
==10006== by 0x431299: runshfunc (exec.c:5040)
==10006== by 0x430E76: doshfunc (exec.c:4920)
==10006== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10006==
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Caught __NR_exit; running __libc_freeres()
==10005== Checked 4,784,008 bytes
==10005==
==10005== LEAK SUMMARY:
==10005== definitely lost: 2,189 bytes in 12 blocks
==10005== indirectly lost: 6,756 bytes in 7 blocks
==10005== possibly lost: 0 bytes in 0 blocks
==10005== still reachable: 3,115,155 bytes in 69,137 blocks
==10005== suppressed: 0 bytes in 0 blocks
==10005== Rerun with --leak-check=full to see details of leaked memory
==10005==
==10005== Use --track-origins=yes to see where uninitialised values come from
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10005==
==10005== 1 errors in context 1 of 2:
==10005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10005== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10005== by 0x488CD0: stringsubst (subst.c:301)
==10005== by 0x48801B: prefork (subst.c:77)
==10005== by 0x42B318: execcmd (exec.c:2619)
==10005== by 0x428CA0: execpline2 (exec.c:1697)
==10005== by 0x427FD2: execpline (exec.c:1484)
==10005== by 0x427756: execlist (exec.c:1267)
==10005== by 0x42717C: execode (exec.c:1073)
==10005== by 0x431299: runshfunc (exec.c:5040)
==10005== by 0x430E76: doshfunc (exec.c:4920)
==10005== by 0x4302FB: execshfunc (exec.c:4557)
==10005== by 0x42D8C1: execcmd (exec.c:3373)
==10005==
==10005==
==10005== 2 errors in context 2 of 2:
==10005== Conditional jump or move depends on uninitialised value(s)
==10005== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10005== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10005== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10005== by 0x40EFC2: execbuiltin (builtin.c:450)
==10005== by 0x42D8E9: execcmd (exec.c:3378)
==10005== by 0x428CA0: execpline2 (exec.c:1697)
==10005== by 0x427FD2: execpline (exec.c:1484)
==10005== by 0x42779A: execlist (exec.c:1275)
==10005== by 0x42717C: execode (exec.c:1073)
==10005== by 0x431299: runshfunc (exec.c:5040)
==10005== by 0x430E76: doshfunc (exec.c:4920)
==10005== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10005==
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10004==
==10004== HEAP SUMMARY:
==10004== in use at exit: 3,115,283 bytes in 69,008 blocks
==10004== total heap usage: 1,592,303 allocs, 1,523,295 frees, 128,628,435 bytes allocated
==10004==
==10008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10008-by-pythonnut-on-???
==10008== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10008-by-pythonnut-on-???
==10008== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10008-by-pythonnut-on-???
==10008==
==10008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10008== don't want to do, unless you know exactly what you're doing,
==10008== or are doing some strange experiment):
==10008== /usr/lib/valgrind/../../bin/vgdb --pid=10008 ...command...
==10008==
==10008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10008== /path/to/gdb ./zsh
==10008== and then give GDB the following command
==10008== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10008
==10008== --pid is optional if only one valgrind process is running
==10008==
==10004== Searching for pointers to 69,008 not-freed blocks
--10004-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10004-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10004-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10004-- Scanning root segment: 0x4037000..0x403afff (16384)
--10004-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10004-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10004-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10004-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10004-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10004-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10004-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10004-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10004-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10004-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10004-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10004-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10004-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10004-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10004-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10004-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10004-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10004-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10004-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10004-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10004-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10004-- Scanning root segment: 0x701a000..0x701afff (4096)
--10004-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10004-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10004-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10004-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10004-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10004-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10004-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10004-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10004-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10004-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10008-- Caught __NR_exit; running __libc_freeres()
--10008-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10008==
==10008== HEAP SUMMARY:
==10008== in use at exit: 3,124,129 bytes in 69,157 blocks
==10008== total heap usage: 1,592,651 allocs, 1,523,494 frees, 128,550,748 bytes allocated
==10008==
==10008== Searching for pointers to 69,157 not-freed blocks
--10008-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10008-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10008-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10008-- Scanning root segment: 0x4037000..0x403afff (16384)
--10008-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10008-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10008-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10008-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10008-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10008-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10008-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10008-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10008-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10008-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10008-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10008-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10008-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10008-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10008-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10008-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10008-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10008-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10008-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10008-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10008-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10008-- Scanning root segment: 0x701a000..0x701afff (4096)
--10008-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10008-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10008-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10008-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10008-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10008-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10008-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10008-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10008-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10008-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10004== Checked 4,790,376 bytes
==10004==
==10004== LEAK SUMMARY:
==10004== definitely lost: 2,189 bytes in 12 blocks
==10004== indirectly lost: 6,756 bytes in 7 blocks
==10004== possibly lost: 0 bytes in 0 blocks
==10004== still reachable: 3,106,338 bytes in 68,989 blocks
==10004== suppressed: 0 bytes in 0 blocks
==10004== Rerun with --leak-check=full to see details of leaked memory
==10004==
==10004== Use --track-origins=yes to see where uninitialised values come from
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004==
==10004== 1 errors in context 1 of 2:
==10004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10004== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10004== by 0x488CD0: stringsubst (subst.c:301)
==10004== by 0x48801B: prefork (subst.c:77)
==10004== by 0x42B318: execcmd (exec.c:2619)
==10004== by 0x428CA0: execpline2 (exec.c:1697)
==10004== by 0x427FD2: execpline (exec.c:1484)
==10004== by 0x427756: execlist (exec.c:1267)
==10004== by 0x42717C: execode (exec.c:1073)
==10004== by 0x431299: runshfunc (exec.c:5040)
==10004== by 0x430E76: doshfunc (exec.c:4920)
==10004== by 0x4302FB: execshfunc (exec.c:4557)
==10004== by 0x42D8C1: execcmd (exec.c:3373)
==10004==
==10004==
==10004== 2 errors in context 2 of 2:
==10004== Conditional jump or move depends on uninitialised value(s)
==10004== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10004== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10004== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10004== by 0x40EFC2: execbuiltin (builtin.c:450)
==10004== by 0x42D8E9: execcmd (exec.c:3378)
==10004== by 0x428CA0: execpline2 (exec.c:1697)
==10004== by 0x427FD2: execpline (exec.c:1484)
==10004== by 0x42779A: execlist (exec.c:1275)
==10004== by 0x42717C: execode (exec.c:1073)
==10004== by 0x431299: runshfunc (exec.c:5040)
==10004== by 0x430E76: doshfunc (exec.c:4920)
==10004== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10004==
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9906-- Caught __NR_exit; running __libc_freeres()
--9906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9906==
==9906== HEAP SUMMARY:
==9906== in use at exit: 3,112,789 bytes in 68,931 blocks
==9906== total heap usage: 1,592,302 allocs, 1,523,371 frees, 128,630,225 bytes allocated
==9906==
==10008== Checked 4,799,904 bytes
==10008==
==9906== Searching for pointers to 68,931 not-freed blocks
--9906-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9906-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9906-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9906-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9906-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9906-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9906-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9906-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9906-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9906-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9906-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9906-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9906-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9906-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9906-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9906-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9906-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9906-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9906-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9906-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9906-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9906-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9906-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9906-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9906-- Scanning root segment: 0x701a000..0x701afff (4096)
--9906-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9906-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9906-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9906-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9906-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9906-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9906-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9906-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9906-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9906-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10008== LEAK SUMMARY:
==10008== definitely lost: 2,189 bytes in 12 blocks
==10008== indirectly lost: 6,756 bytes in 7 blocks
==10008== possibly lost: 0 bytes in 0 blocks
==10008== still reachable: 3,115,184 bytes in 69,138 blocks
==10008== suppressed: 0 bytes in 0 blocks
==10008== Rerun with --leak-check=full to see details of leaked memory
==10008==
==10008== Use --track-origins=yes to see where uninitialised values come from
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10008==
==10008== 1 errors in context 1 of 2:
==10008== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10008== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10008== by 0x488CD0: stringsubst (subst.c:301)
==10008== by 0x48801B: prefork (subst.c:77)
==10008== by 0x42B318: execcmd (exec.c:2619)
==10008== by 0x428CA0: execpline2 (exec.c:1697)
==10008== by 0x427FD2: execpline (exec.c:1484)
==10008== by 0x427756: execlist (exec.c:1267)
==10008== by 0x42717C: execode (exec.c:1073)
==10008== by 0x431299: runshfunc (exec.c:5040)
==10008== by 0x430E76: doshfunc (exec.c:4920)
==10008== by 0x4302FB: execshfunc (exec.c:4557)
==10008== by 0x42D8C1: execcmd (exec.c:3373)
==10008==
==10008==
==10008== 2 errors in context 2 of 2:
==10008== Conditional jump or move depends on uninitialised value(s)
==10008== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10008== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10008== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10008== by 0x40EFC2: execbuiltin (builtin.c:450)
==10008== by 0x42D8E9: execcmd (exec.c:3378)
==10008== by 0x428CA0: execpline2 (exec.c:1697)
==10008== by 0x427FD2: execpline (exec.c:1484)
==10008== by 0x42779A: execlist (exec.c:1275)
==10008== by 0x42717C: execode (exec.c:1073)
==10008== by 0x431299: runshfunc (exec.c:5040)
==10008== by 0x430E76: doshfunc (exec.c:4920)
==10008== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10008==
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10009-by-pythonnut-on-???
==10009== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10009-by-pythonnut-on-???
==10009== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10009-by-pythonnut-on-???
==10009==
==10009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10009== don't want to do, unless you know exactly what you're doing,
==10009== or are doing some strange experiment):
==10009== /usr/lib/valgrind/../../bin/vgdb --pid=10009 ...command...
==10009==
==10009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10009== /path/to/gdb ./zsh
==10009== and then give GDB the following command
==10009== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10009
==10009== --pid is optional if only one valgrind process is running
==10009==
==10010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10010-by-pythonnut-on-???
==10010== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10010-by-pythonnut-on-???
==10010== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10010-by-pythonnut-on-???
==10010==
==10010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10010== don't want to do, unless you know exactly what you're doing,
==10010== or are doing some strange experiment):
==10010== /usr/lib/valgrind/../../bin/vgdb --pid=10010 ...command...
==10010==
==10010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10010== /path/to/gdb ./zsh
==10010== and then give GDB the following command
==10010== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10010
==10010== --pid is optional if only one valgrind process is running
==10010==
==9906== Checked 4,768,520 bytes
==9906==
--10011-- Caught __NR_exit; running __libc_freeres()
--10009-- Caught __NR_exit; running __libc_freeres()
==9906== LEAK SUMMARY:
==9906== definitely lost: 2,189 bytes in 12 blocks
==9906== indirectly lost: 6,756 bytes in 7 blocks
==9906== possibly lost: 0 bytes in 0 blocks
==9906== still reachable: 3,103,844 bytes in 68,912 blocks
==9906== suppressed: 0 bytes in 0 blocks
==9906== Rerun with --leak-check=full to see details of leaked memory
==9906==
==9906== Use --track-origins=yes to see where uninitialised values come from
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9906==
==9906== 1 errors in context 1 of 2:
==9906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9906== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9906== by 0x488CD0: stringsubst (subst.c:301)
==9906== by 0x48801B: prefork (subst.c:77)
==9906== by 0x42B318: execcmd (exec.c:2619)
==9906== by 0x428CA0: execpline2 (exec.c:1697)
==9906== by 0x427FD2: execpline (exec.c:1484)
==9906== by 0x427756: execlist (exec.c:1267)
==9906== by 0x42717C: execode (exec.c:1073)
==9906== by 0x431299: runshfunc (exec.c:5040)
==9906== by 0x430E76: doshfunc (exec.c:4920)
==9906== by 0x4302FB: execshfunc (exec.c:4557)
==9906== by 0x42D8C1: execcmd (exec.c:3373)
==9906==
==9906==
==9906== 2 errors in context 2 of 2:
==9906== Conditional jump or move depends on uninitialised value(s)
==9906== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9906== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9906== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9906== by 0x40EFC2: execbuiltin (builtin.c:450)
==9906== by 0x42D8E9: execcmd (exec.c:3378)
==9906== by 0x428CA0: execpline2 (exec.c:1697)
==9906== by 0x427FD2: execpline (exec.c:1484)
==9906== by 0x42779A: execlist (exec.c:1275)
==9906== by 0x42717C: execode (exec.c:1073)
==9906== by 0x431299: runshfunc (exec.c:5040)
==9906== by 0x430E76: doshfunc (exec.c:4920)
==9906== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9906==
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10011-by-pythonnut-on-???
==10011== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10011-by-pythonnut-on-???
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==10011== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10011-by-pythonnut-on-???
==10011==
==10011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10011== don't want to do, unless you know exactly what you're doing,
==10011== or are doing some strange experiment):
==10011== /usr/lib/valgrind/../../bin/vgdb --pid=10011 ...command...
==10011==
==10011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10011== /path/to/gdb ./zsh
==10011== and then give GDB the following command
==10011== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10011
==10011== --pid is optional if only one valgrind process is running
==10011==
--10011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10013-by-pythonnut-on-???
==10013== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10013-by-pythonnut-on-???
==10013== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10013-by-pythonnut-on-???
==10013==
==10013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10013== don't want to do, unless you know exactly what you're doing,
==10013== or are doing some strange experiment):
==10013== /usr/lib/valgrind/../../bin/vgdb --pid=10013 ...command...
==10013==
==10013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10013== /path/to/gdb ./zsh
==10013== and then give GDB the following command
==10013== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10013
==10013== --pid is optional if only one valgrind process is running
==10013==
--10009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10011==
==10011== HEAP SUMMARY:
==10011== in use at exit: 3,124,601 bytes in 69,169 blocks
==10011== total heap usage: 1,594,304 allocs, 1,525,135 frees, 128,640,509 bytes allocated
==10011==
==10009==
==10015== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10015-by-pythonnut-on-???
==10015== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10015-by-pythonnut-on-???
==10015== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10015-by-pythonnut-on-???
==10015==
==10015== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10015== don't want to do, unless you know exactly what you're doing,
==10015== or are doing some strange experiment):
==10015== /usr/lib/valgrind/../../bin/vgdb --pid=10015 ...command...
==10015==
==10015== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10015== /path/to/gdb ./zsh
==10015== and then give GDB the following command
==10015== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10015
==10015== --pid is optional if only one valgrind process is running
==10015==
==10009== HEAP SUMMARY:
==10009== in use at exit: 3,153,741 bytes in 69,133 blocks
==10009== total heap usage: 1,592,204 allocs, 1,523,071 frees, 128,618,029 bytes allocated
==10009==
client request: code 4d430005, addr 0xFFEFF263C, len 4
==10014== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10014-by-pythonnut-on-???
==10014== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10014-by-pythonnut-on-???
==10014== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10014-by-pythonnut-on-???
==10014==
==10014== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10014== don't want to do, unless you know exactly what you're doing,
==10014== or are doing some strange experiment):
==10014== /usr/lib/valgrind/../../bin/vgdb --pid=10014 ...command...
==10014==
==10014== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10014== /path/to/gdb ./zsh
==10014== and then give GDB the following command
==10014== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10014
==10014== --pid is optional if only one valgrind process is running
==10014==
--10014-- Caught __NR_exit; running __libc_freeres()
==10011== Searching for pointers to 69,169 not-freed blocks
--10011-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10011-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10011-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10011-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10011-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10011-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10011-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10011-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10011-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10011-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10011-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10011-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10011-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10011-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10011-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10011-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10011-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10011-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10011-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10011-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10011-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10011-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10011-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10011-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10011-- Scanning root segment: 0x701a000..0x701afff (4096)
--10011-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10011-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10011-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10011-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10011-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10011-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10011-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10011-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10011-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10011-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10009== Searching for pointers to 69,133 not-freed blocks
--10009-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10009-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10009-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10009-- Scanning root segment: 0x4037000..0x4047fff (69632)
--10009-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10009-- Scanning root segment: 0x41d6000..0x421efff (299008)
--10009-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10009-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10009-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10009-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10009-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10009-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10009-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10009-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10009-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10009-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10009-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10009-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10009-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10009-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10009-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10009-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10009-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10009-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10009-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10009-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10009-- Scanning root segment: 0x701a000..0x701afff (4096)
--10009-- Scanning root segment: 0x881b000..0x8838fff (122880)
--10009-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10009-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10009-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10009-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10009-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10009-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10009-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10009-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10009-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10009-- Scanning root segment: 0xbe86000..0xbe99fff (81920)
--10009-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10014-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014==
==10014== HEAP SUMMARY:
==10014== in use at exit: 3,113,357 bytes in 68,943 blocks
==10014== total heap usage: 1,592,129 allocs, 1,523,186 frees, 128,585,032 bytes allocated
==10014==
==10014== Searching for pointers to 68,943 not-freed blocks
--10014-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10014-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10014-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10014-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10014-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10014-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10014-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10014-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10014-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10014-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10014-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10014-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10014-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10014-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10014-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10014-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10014-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10014-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10014-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10014-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10014-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10014-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10014-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10014-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10014-- Scanning root segment: 0x701a000..0x701afff (4096)
--10014-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10014-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10014-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10014-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10014-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10014-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10014-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10014-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10014-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10014-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10011== Checked 4,785,832 bytes
==10011==
==10011== LEAK SUMMARY:
==10011== definitely lost: 2,197 bytes in 13 blocks
==10011== indirectly lost: 6,756 bytes in 7 blocks
==10011== possibly lost: 0 bytes in 0 blocks
==10011== still reachable: 3,115,648 bytes in 69,149 blocks
==10011== suppressed: 0 bytes in 0 blocks
==10011== Rerun with --leak-check=full to see details of leaked memory
==10011==
==10011== Use --track-origins=yes to see where uninitialised values come from
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011==
==10011== 1 errors in context 1 of 2:
==10011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10011== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10011== by 0x488CD0: stringsubst (subst.c:301)
==10011== by 0x48801B: prefork (subst.c:77)
==10011== by 0x42B318: execcmd (exec.c:2619)
==10011== by 0x428CA0: execpline2 (exec.c:1697)
==10011== by 0x427FD2: execpline (exec.c:1484)
==10011== by 0x427756: execlist (exec.c:1267)
==10011== by 0x42717C: execode (exec.c:1073)
==10011== by 0x431299: runshfunc (exec.c:5040)
==10011== by 0x430E76: doshfunc (exec.c:4920)
==10011== by 0x4302FB: execshfunc (exec.c:4557)
==10011== by 0x42D8C1: execcmd (exec.c:3373)
==10011==
==10011==
==10011== 2 errors in context 2 of 2:
==10011== Conditional jump or move depends on uninitialised value(s)
==10011== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10011== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10011== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10011== by 0x40EFC2: execbuiltin (builtin.c:450)
==10011== by 0x42D8E9: execcmd (exec.c:3378)
==10011== by 0x428CA0: execpline2 (exec.c:1697)
==10011== by 0x427FD2: execpline (exec.c:1484)
==10011== by 0x42779A: execlist (exec.c:1275)
==10011== by 0x42717C: execode (exec.c:1073)
==10011== by 0x431299: runshfunc (exec.c:5040)
==10011== by 0x430E76: doshfunc (exec.c:4920)
==10011== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10011==
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== Checked 5,386,464 bytes
==10009==
--10010-- Caught __NR_exit; running __libc_freeres()
==10009== LEAK SUMMARY:
==10009== definitely lost: 2,189 bytes in 12 blocks
==10009== indirectly lost: 6,756 bytes in 7 blocks
==10009== possibly lost: 0 bytes in 0 blocks
==10009== still reachable: 3,144,796 bytes in 69,114 blocks
==10009== suppressed: 0 bytes in 0 blocks
==10009== Rerun with --leak-check=full to see details of leaked memory
==10009==
==10009== Use --track-origins=yes to see where uninitialised values come from
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009==
==10009== 1 errors in context 1 of 2:
==10009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10009== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10009== by 0x488CD0: stringsubst (subst.c:301)
==10009== by 0x48801B: prefork (subst.c:77)
==10009== by 0x42B318: execcmd (exec.c:2619)
==10009== by 0x428CA0: execpline2 (exec.c:1697)
==10009== by 0x427FD2: execpline (exec.c:1484)
==10009== by 0x427756: execlist (exec.c:1267)
==10009== by 0x42717C: execode (exec.c:1073)
==10009== by 0x431299: runshfunc (exec.c:5040)
==10009== by 0x430E76: doshfunc (exec.c:4920)
==10009== by 0x4302FB: execshfunc (exec.c:4557)
==10009== by 0x42D8C1: execcmd (exec.c:3373)
==10009==
==10009==
==10009== 2 errors in context 2 of 2:
==10009== Conditional jump or move depends on uninitialised value(s)
==10009== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10009== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10009== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10009== by 0x40EFC2: execbuiltin (builtin.c:450)
==10009== by 0x42D8E9: execcmd (exec.c:3378)
==10009== by 0x428CA0: execpline2 (exec.c:1697)
==10009== by 0x427FD2: execpline (exec.c:1484)
==10009== by 0x42779A: execlist (exec.c:1275)
==10009== by 0x42717C: execode (exec.c:1073)
==10009== by 0x431299: runshfunc (exec.c:5040)
==10009== by 0x430E76: doshfunc (exec.c:4920)
==10009== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10009==
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014== Checked 4,771,136 bytes
==10010==
==10014==
==10010== HEAP SUMMARY:
==10010== in use at exit: 3,124,537 bytes in 69,166 blocks
==10010== total heap usage: 1,594,302 allocs, 1,525,136 frees, 128,640,268 bytes allocated
==10010==
--10016-- Caught __NR_exit; running __libc_freeres()
==10016== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10016-by-pythonnut-on-???
==10016== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10016-by-pythonnut-on-???
==10016== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10016-by-pythonnut-on-???
==10016==
==10016== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10016== don't want to do, unless you know exactly what you're doing,
==10016== or are doing some strange experiment):
==10016== /usr/lib/valgrind/../../bin/vgdb --pid=10016 ...command...
==10016==
==10016== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10016== /path/to/gdb ./zsh
==10016== and then give GDB the following command
==10016== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10016
==10016== --pid is optional if only one valgrind process is running
==10016==
==10014== LEAK SUMMARY:
==10014== definitely lost: 2,189 bytes in 12 blocks
==10014== indirectly lost: 6,756 bytes in 7 blocks
==10014== possibly lost: 0 bytes in 0 blocks
==10014== still reachable: 3,104,412 bytes in 68,924 blocks
==10014== suppressed: 0 bytes in 0 blocks
==10014== Rerun with --leak-check=full to see details of leaked memory
==10014==
==10014== Use --track-origins=yes to see where uninitialised values come from
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10014==
==10014== 1 errors in context 1 of 2:
==10014== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10014== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10014== by 0x488CD0: stringsubst (subst.c:301)
==10014== by 0x48801B: prefork (subst.c:77)
==10014== by 0x42B318: execcmd (exec.c:2619)
==10014== by 0x428CA0: execpline2 (exec.c:1697)
==10014== by 0x427FD2: execpline (exec.c:1484)
==10014== by 0x427756: execlist (exec.c:1267)
==10014== by 0x42717C: execode (exec.c:1073)
==10014== by 0x431299: runshfunc (exec.c:5040)
==10014== by 0x430E76: doshfunc (exec.c:4920)
==10014== by 0x4302FB: execshfunc (exec.c:4557)
==10014== by 0x42D8C1: execcmd (exec.c:3373)
==10014==
==10014==
==10014== 2 errors in context 2 of 2:
==10014== Conditional jump or move depends on uninitialised value(s)
==10014== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10014== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10014== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10014== by 0x40EFC2: execbuiltin (builtin.c:450)
==10014== by 0x42D8E9: execcmd (exec.c:3378)
==10014== by 0x428CA0: execpline2 (exec.c:1697)
==10014== by 0x427FD2: execpline (exec.c:1484)
==10014== by 0x42779A: execlist (exec.c:1275)
==10014== by 0x42717C: execode (exec.c:1073)
==10014== by 0x431299: runshfunc (exec.c:5040)
==10014== by 0x430E76: doshfunc (exec.c:4920)
==10014== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10014==
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10016-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10010== Searching for pointers to 69,166 not-freed blocks
--10010-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10010-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10010-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10010-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10010-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10010-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10010-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10010-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10010-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10010-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10010-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10010-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10010-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10010-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10010-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10010-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10010-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10010-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10010-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10010-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10010-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10010-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10010-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10010-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10010-- Scanning root segment: 0x701a000..0x701afff (4096)
--10010-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10010-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10010-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10010-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10010-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10010-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10010-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10010-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10010-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10010-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10016==
==10016== HEAP SUMMARY:
==10016== in use at exit: 3,144,080 bytes in 69,928 blocks
==10016== total heap usage: 1,593,029 allocs, 1,523,101 frees, 128,633,903 bytes allocated
==10016==
client request: code 4d430005, addr 0xFFEFF2AEC, len 4
==10016== Searching for pointers to 69,928 not-freed blocks
--10016-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10016-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10016-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10016-- Scanning root segment: 0x4037000..0x4047fff (69632)
--10016-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10016-- Scanning root segment: 0x41d6000..0x421efff (299008)
--10016-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10016-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10016-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10016-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10016-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10016-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10016-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10016-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10016-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10016-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10016-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10016-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10016-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10016-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10016-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10016-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10016-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10016-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10016-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10016-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10016-- Scanning root segment: 0x701a000..0x701afff (4096)
--10016-- Scanning root segment: 0x881b000..0x8838fff (122880)
--10016-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10016-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10016-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10016-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10016-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10016-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10016-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10016-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10016-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10016-- Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10016-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10010== Checked 4,785,144 bytes
==10010==
==10010== LEAK SUMMARY:
==10010== definitely lost: 2,197 bytes in 13 blocks
==10010== indirectly lost: 6,756 bytes in 7 blocks
==10010== possibly lost: 0 bytes in 0 blocks
==10010== still reachable: 3,115,584 bytes in 69,146 blocks
==10010== suppressed: 0 bytes in 0 blocks
==10010== Rerun with --leak-check=full to see details of leaked memory
==10010==
==10010== Use --track-origins=yes to see where uninitialised values come from
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10010==
==10010== 1 errors in context 1 of 2:
==10010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10010== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10010== by 0x488CD0: stringsubst (subst.c:301)
==10010== by 0x48801B: prefork (subst.c:77)
==10010== by 0x42B318: execcmd (exec.c:2619)
==10010== by 0x428CA0: execpline2 (exec.c:1697)
==10010== by 0x427FD2: execpline (exec.c:1484)
==10010== by 0x427756: execlist (exec.c:1267)
==10010== by 0x42717C: execode (exec.c:1073)
==10010== by 0x431299: runshfunc (exec.c:5040)
==10010== by 0x430E76: doshfunc (exec.c:4920)
==10010== by 0x4302FB: execshfunc (exec.c:4557)
==10010== by 0x42D8C1: execcmd (exec.c:3373)
==10010==
==10010==
==10010== 2 errors in context 2 of 2:
==10010== Conditional jump or move depends on uninitialised value(s)
==10010== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10010== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10010== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10010== by 0x40EFC2: execbuiltin (builtin.c:450)
==10010== by 0x42D8E9: execcmd (exec.c:3378)
==10010== by 0x428CA0: execpline2 (exec.c:1697)
==10010== by 0x427FD2: execpline (exec.c:1484)
==10010== by 0x42779A: execlist (exec.c:1275)
==10010== by 0x42717C: execode (exec.c:1073)
==10010== by 0x431299: runshfunc (exec.c:5040)
==10010== by 0x430E76: doshfunc (exec.c:4920)
==10010== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10010==
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016== Checked 5,700,080 bytes
==10016==
--10017-- Caught __NR_exit; running __libc_freeres()
--10065-- Caught __NR_exit; running __libc_freeres()
==10065== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10065-by-pythonnut-on-???
==10065== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10065-by-pythonnut-on-???
==10065== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10065-by-pythonnut-on-???
==10065==
==10065== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10065== don't want to do, unless you know exactly what you're doing,
==10065== or are doing some strange experiment):
==10065== /usr/lib/valgrind/../../bin/vgdb --pid=10065 ...command...
==10065==
==10065== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10065== /path/to/gdb ./zsh
==10065== and then give GDB the following command
==10065== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10065
==10065== --pid is optional if only one valgrind process is running
==10065==
==10017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10017-by-pythonnut-on-???
==10017== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10017-by-pythonnut-on-???
==10017== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10017-by-pythonnut-on-???
==10017==
==10017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10017== don't want to do, unless you know exactly what you're doing,
==10017== or are doing some strange experiment):
==10017== /usr/lib/valgrind/../../bin/vgdb --pid=10017 ...command...
==10017==
==10017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10017== /path/to/gdb ./zsh
==10017== and then give GDB the following command
==10017== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10017
==10017== --pid is optional if only one valgrind process is running
==10017==
==10016== LEAK SUMMARY:
==10016== definitely lost: 2,189 bytes in 12 blocks
==10016== indirectly lost: 6,756 bytes in 7 blocks
==10016== possibly lost: 0 bytes in 0 blocks
==10016== still reachable: 3,135,135 bytes in 69,909 blocks
==10016== suppressed: 0 bytes in 0 blocks
==10016== Rerun with --leak-check=full to see details of leaked memory
==10016==
==10016== Use --track-origins=yes to see where uninitialised values come from
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016==
==10016== 1 errors in context 1 of 2:
==10016== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10016== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10016== by 0x488CD0: stringsubst (subst.c:301)
==10016== by 0x48801B: prefork (subst.c:77)
==10016== by 0x42B318: execcmd (exec.c:2619)
==10016== by 0x428CA0: execpline2 (exec.c:1697)
==10016== by 0x427FD2: execpline (exec.c:1484)
==10016== by 0x427756: execlist (exec.c:1267)
==10016== by 0x42717C: execode (exec.c:1073)
==10016== by 0x431299: runshfunc (exec.c:5040)
==10016== by 0x430E76: doshfunc (exec.c:4920)
==10016== by 0x4302FB: execshfunc (exec.c:4557)
==10016== by 0x42D8C1: execcmd (exec.c:3373)
==10016==
==10016==
==10016== 2 errors in context 2 of 2:
==10016== Conditional jump or move depends on uninitialised value(s)
==10016== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10016== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10016== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10016== by 0x40EFC2: execbuiltin (builtin.c:450)
==10016== by 0x42D8E9: execcmd (exec.c:3378)
==10016== by 0x428CA0: execpline2 (exec.c:1697)
==10016== by 0x427FD2: execpline (exec.c:1484)
==10016== by 0x42779A: execlist (exec.c:1275)
==10016== by 0x42717C: execode (exec.c:1073)
==10016== by 0x431299: runshfunc (exec.c:5040)
==10016== by 0x430E76: doshfunc (exec.c:4920)
==10016== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10016==
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10017-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10065-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10065==
==10017==
==10065== HEAP SUMMARY:
==10065== in use at exit: 3,124,544 bytes in 69,166 blocks
==10065== total heap usage: 1,594,317 allocs, 1,525,151 frees, 128,645,266 bytes allocated
==10065==
==10017== HEAP SUMMARY:
==10017== in use at exit: 3,113,716 bytes in 68,951 blocks
==10017== total heap usage: 1,592,144 allocs, 1,523,193 frees, 128,589,047 bytes allocated
==10017==
==10068== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10068-by-pythonnut-on-???
==10068== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10068-by-pythonnut-on-???
==10068== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10068-by-pythonnut-on-???
==10068==
==10068== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10068== don't want to do, unless you know exactly what you're doing,
==10068== or are doing some strange experiment):
==10068== /usr/lib/valgrind/../../bin/vgdb --pid=10068 ...command...
==10068==
==10068== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10068== /path/to/gdb ./zsh
==10068== and then give GDB the following command
==10068== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10068
==10068== --pid is optional if only one valgrind process is running
==10068==
--10068-- Caught __NR_exit; running __libc_freeres()
==10065== Searching for pointers to 69,166 not-freed blocks
--10065-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10065-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10065-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10065-- Scanning root segment: 0x4223000..0x4223fff (4096)
==10017== Searching for pointers to 68,951 not-freed blocks
--10017-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10065-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10065-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10017-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10065-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10065-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10065-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10017-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10017-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10017-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10017-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10065-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10017-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10017-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10017-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10017-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10017-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10017-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065-- Scanning root segment: 0x701a000..0x701afff (4096)
--10017-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10065-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10017-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10017-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10065-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10065-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10065-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10065-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10065-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10065-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10017-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017-- Scanning root segment: 0x701a000..0x701afff (4096)
--10017-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10017-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10017-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10017-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10017-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10017-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10017-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10017-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10017-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10068-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10068==
==10068== HEAP SUMMARY:
==10068== in use at exit: 3,144,192 bytes in 69,929 blocks
==10068== total heap usage: 1,593,047 allocs, 1,523,118 frees, 128,638,745 bytes allocated
==10068==
==10068== Searching for pointers to 69,929 not-freed blocks
--10068-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10068-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10068-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10068-- Scanning root segment: 0x4037000..0x4047fff (69632)
--10068-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10068-- Scanning root segment: 0x41d6000..0x421efff (299008)
--10068-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10068-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10068-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10068-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10068-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10068-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10068-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10068-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10068-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10068-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10068-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10068-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10068-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10068-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10068-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10068-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10068-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10068-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10068-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10068-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10068-- Scanning root segment: 0x701a000..0x701afff (4096)
--10068-- Scanning root segment: 0x881b000..0x8838fff (122880)
--10068-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10068-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10068-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10068-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10068-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10068-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10068-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10068-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10068-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10068-- Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10068-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10065== Checked 4,785,280 bytes
==10065==
==10017== Checked 4,771,200 bytes
==10017==
==10065== LEAK SUMMARY:
==10065== definitely lost: 2,197 bytes in 13 blocks
==10065== indirectly lost: 6,756 bytes in 7 blocks
==10065== possibly lost: 0 bytes in 0 blocks
==10065== still reachable: 3,115,591 bytes in 69,146 blocks
==10065== suppressed: 0 bytes in 0 blocks
==10065== Rerun with --leak-check=full to see details of leaked memory
==10065==
==10065== Use --track-origins=yes to see where uninitialised values come from
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10065==
==10065== 1 errors in context 1 of 2:
==10065== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10065== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10065== by 0x488CD0: stringsubst (subst.c:301)
==10065== by 0x48801B: prefork (subst.c:77)
==10065== by 0x42B318: execcmd (exec.c:2619)
==10065== by 0x428CA0: execpline2 (exec.c:1697)
==10065== by 0x427FD2: execpline (exec.c:1484)
==10065== by 0x427756: execlist (exec.c:1267)
==10065== by 0x42717C: execode (exec.c:1073)
==10065== by 0x431299: runshfunc (exec.c:5040)
==10065== by 0x430E76: doshfunc (exec.c:4920)
==10065== by 0x4302FB: execshfunc (exec.c:4557)
==10065== by 0x42D8C1: execcmd (exec.c:3373)
==10065==
==10065==
==10065== 2 errors in context 2 of 2:
==10065== Conditional jump or move depends on uninitialised value(s)
==10065== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10065== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10065== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10065== by 0x40EFC2: execbuiltin (builtin.c:450)
==10065== by 0x42D8E9: execcmd (exec.c:3378)
==10065== by 0x428CA0: execpline2 (exec.c:1697)
==10065== by 0x427FD2: execpline (exec.c:1484)
==10065== by 0x42779A: execlist (exec.c:1275)
==10065== by 0x42717C: execode (exec.c:1073)
==10065== by 0x431299: runshfunc (exec.c:5040)
==10065== by 0x430E76: doshfunc (exec.c:4920)
==10065== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10065==
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017== LEAK SUMMARY:
==10017== definitely lost: 2,189 bytes in 12 blocks
==10017== indirectly lost: 6,756 bytes in 7 blocks
==10017== possibly lost: 0 bytes in 0 blocks
==10017== still reachable: 3,104,771 bytes in 68,932 blocks
==10017== suppressed: 0 bytes in 0 blocks
==10017== Rerun with --leak-check=full to see details of leaked memory
==10017==
==10017== Use --track-origins=yes to see where uninitialised values come from
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017==
==10017== 1 errors in context 1 of 2:
==10017== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10017== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10017== by 0x488CD0: stringsubst (subst.c:301)
==10017== by 0x48801B: prefork (subst.c:77)
==10017== by 0x42B318: execcmd (exec.c:2619)
==10017== by 0x428CA0: execpline2 (exec.c:1697)
==10017== by 0x427FD2: execpline (exec.c:1484)
==10017== by 0x427756: execlist (exec.c:1267)
==10017== by 0x42717C: execode (exec.c:1073)
==10017== by 0x431299: runshfunc (exec.c:5040)
==10017== by 0x430E76: doshfunc (exec.c:4920)
==10017== by 0x4302FB: execshfunc (exec.c:4557)
==10017== by 0x42D8C1: execcmd (exec.c:3373)
==10017==
==10017==
==10017== 2 errors in context 2 of 2:
==10017== Conditional jump or move depends on uninitialised value(s)
==10017== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10017== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10017== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10017== by 0x40EFC2: execbuiltin (builtin.c:450)
==10017== by 0x42D8E9: execcmd (exec.c:3378)
==10017== by 0x428CA0: execpline2 (exec.c:1697)
==10017== by 0x427FD2: execpline (exec.c:1484)
==10017== by 0x42779A: execlist (exec.c:1275)
==10017== by 0x42717C: execode (exec.c:1073)
==10017== by 0x431299: runshfunc (exec.c:5040)
==10017== by 0x430E76: doshfunc (exec.c:4920)
==10017== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10017==
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10013-- Caught __NR_exit; running __libc_freeres()
--10069-- Caught __NR_exit; running __libc_freeres()
==10068== Checked 5,700,184 bytes
==10068==
--10013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10069-by-pythonnut-on-???
==10069== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10069-by-pythonnut-on-???
==10069== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10069-by-pythonnut-on-???
==10069==
==10069== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10069== don't want to do, unless you know exactly what you're doing,
==10069== or are doing some strange experiment):
==10069== /usr/lib/valgrind/../../bin/vgdb --pid=10069 ...command...
==10069==
==10069== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10069== /path/to/gdb ./zsh
==10069== and then give GDB the following command
==10069== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10069
==10069== --pid is optional if only one valgrind process is running
==10069==
==10013==
==10013== HEAP SUMMARY:
==10013== in use at exit: 3,112,854 bytes in 68,932 blocks
==10013== total heap usage: 1,592,153 allocs, 1,523,221 frees, 128,591,050 bytes allocated
==10013==
==10068== LEAK SUMMARY:
==10068== definitely lost: 2,189 bytes in 12 blocks
==10068== indirectly lost: 6,756 bytes in 7 blocks
==10068== possibly lost: 0 bytes in 0 blocks
==10068== still reachable: 3,135,247 bytes in 69,910 blocks
==10068== suppressed: 0 bytes in 0 blocks
==10068== Rerun with --leak-check=full to see details of leaked memory
==10068==
==10068== Use --track-origins=yes to see where uninitialised values come from
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10068==
==10068== 1 errors in context 1 of 2:
==10068== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10068== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10068== by 0x488CD0: stringsubst (subst.c:301)
==10068== by 0x48801B: prefork (subst.c:77)
==10068== by 0x42B318: execcmd (exec.c:2619)
==10068== by 0x428CA0: execpline2 (exec.c:1697)
==10068== by 0x427FD2: execpline (exec.c:1484)
==10068== by 0x427756: execlist (exec.c:1267)
==10068== by 0x42717C: execode (exec.c:1073)
==10068== by 0x431299: runshfunc (exec.c:5040)
==10068== by 0x430E76: doshfunc (exec.c:4920)
==10068== by 0x4302FB: execshfunc (exec.c:4557)
==10068== by 0x42D8C1: execcmd (exec.c:3373)
==10068==
==10068==
==10068== 2 errors in context 2 of 2:
==10068== Conditional jump or move depends on uninitialised value(s)
==10068== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10068== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10068== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10068== by 0x40EFC2: execbuiltin (builtin.c:450)
==10068== by 0x42D8E9: execcmd (exec.c:3378)
==10068== by 0x428CA0: execpline2 (exec.c:1697)
==10068== by 0x427FD2: execpline (exec.c:1484)
==10068== by 0x42779A: execlist (exec.c:1275)
==10068== by 0x42717C: execode (exec.c:1073)
==10068== by 0x431299: runshfunc (exec.c:5040)
==10068== by 0x430E76: doshfunc (exec.c:4920)
==10068== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10068==
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10069-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069==
==10069== HEAP SUMMARY:
==10069== in use at exit: 3,124,640 bytes in 69,166 blocks
==10069== total heap usage: 1,594,333 allocs, 1,525,167 frees, 128,650,053 bytes allocated
==10069==
==10070== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10070-by-pythonnut-on-???
==10070== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10070-by-pythonnut-on-???
==10070== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10070-by-pythonnut-on-???
==10070==
==10070== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10070== don't want to do, unless you know exactly what you're doing,
==10070== or are doing some strange experiment):
==10070== /usr/lib/valgrind/../../bin/vgdb --pid=10070 ...command...
==10070==
==10070== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10070== /path/to/gdb ./zsh
==10070== and then give GDB the following command
==10070== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10070
==10070== --pid is optional if only one valgrind process is running
==10070==
==10013== Searching for pointers to 68,932 not-freed blocks
--10013-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10013-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10013-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10013-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10013-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10013-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10013-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10013-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10013-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10013-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10013-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10013-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10013-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10013-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10013-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10013-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10013-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10013-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10013-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070-- Caught __NR_exit; running __libc_freeres()
--10013-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10013-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10013-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10013-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10013-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10013-- Scanning root segment: 0x701a000..0x701afff (4096)
--10013-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10013-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10013-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10013-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10013-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10013-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10013-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10013-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10013-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10013-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10069== Searching for pointers to 69,166 not-freed blocks
--10069-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10069-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10069-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10069-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10069-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10069-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10069-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10069-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10069-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10069-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10069-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10069-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10069-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10069-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10069-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10069-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10069-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10069-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10069-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10069-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10069-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10069-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10069-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10069-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10069-- Scanning root segment: 0x701a000..0x701afff (4096)
--10069-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10069-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10069-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10069-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10069-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10069-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10069-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10069-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10069-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10069-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10070-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070==
==10070== HEAP SUMMARY:
==10070== in use at exit: 3,144,192 bytes in 69,929 blocks
==10070== total heap usage: 1,593,062 allocs, 1,523,133 frees, 128,643,454 bytes allocated
==10070==
==10070== Searching for pointers to 69,929 not-freed blocks
--10070-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10070-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10070-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10070-- Scanning root segment: 0x4037000..0x4047fff (69632)
--10070-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10070-- Scanning root segment: 0x41d6000..0x421efff (299008)
--10070-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10070-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10070-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10070-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10070-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10070-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10070-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10070-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10070-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10070-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10070-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10070-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10070-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10070-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10070-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10070-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10070-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10070-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10070-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10070-- Scanning root segment: 0x701a000..0x701afff (4096)
--10070-- Scanning root segment: 0x881b000..0x8838fff (122880)
--10070-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10070-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10070-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10070-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10070-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10070-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10070-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10070-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10070-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10070-- Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10070-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10013== Checked 4,768,584 bytes
==10013==
==10069== Checked 4,784,560 bytes
==10069==
==10013== LEAK SUMMARY:
==10013== definitely lost: 2,189 bytes in 12 blocks
==10013== indirectly lost: 6,756 bytes in 7 blocks
==10013== possibly lost: 0 bytes in 0 blocks
==10013== still reachable: 3,103,909 bytes in 68,913 blocks
==10013== suppressed: 0 bytes in 0 blocks
==10013== Rerun with --leak-check=full to see details of leaked memory
==10013==
==10013== Use --track-origins=yes to see where uninitialised values come from
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10013==
==10013== 1 errors in context 1 of 2:
==10013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10013== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10013== by 0x488CD0: stringsubst (subst.c:301)
==10013== by 0x48801B: prefork (subst.c:77)
==10013== by 0x42B318: execcmd (exec.c:2619)
==10013== by 0x428CA0: execpline2 (exec.c:1697)
==10013== by 0x427FD2: execpline (exec.c:1484)
==10013== by 0x427756: execlist (exec.c:1267)
==10013== by 0x42717C: execode (exec.c:1073)
==10013== by 0x431299: runshfunc (exec.c:5040)
==10013== by 0x430E76: doshfunc (exec.c:4920)
==10013== by 0x4302FB: execshfunc (exec.c:4557)
==10013== by 0x42D8C1: execcmd (exec.c:3373)
==10013==
==10013==
==10013== 2 errors in context 2 of 2:
==10013== Conditional jump or move depends on uninitialised value(s)
==10013== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10013== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10013== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10013== by 0x40EFC2: execbuiltin (builtin.c:450)
==10013== by 0x42D8E9: execcmd (exec.c:3378)
==10013== by 0x428CA0: execpline2 (exec.c:1697)
==10013== by 0x427FD2: execpline (exec.c:1484)
==10013== by 0x42779A: execlist (exec.c:1275)
==10013== by 0x42717C: execode (exec.c:1073)
==10013== by 0x431299: runshfunc (exec.c:5040)
==10013== by 0x430E76: doshfunc (exec.c:4920)
==10013== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10013==
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069== LEAK SUMMARY:
==10069== definitely lost: 2,197 bytes in 13 blocks
==10069== indirectly lost: 6,756 bytes in 7 blocks
==10069== possibly lost: 0 bytes in 0 blocks
==10069== still reachable: 3,115,687 bytes in 69,146 blocks
==10069== suppressed: 0 bytes in 0 blocks
==10069== Rerun with --leak-check=full to see details of leaked memory
==10069==
==10069== Use --track-origins=yes to see where uninitialised values come from
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069==
==10069== 1 errors in context 1 of 2:
==10069== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10069== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10069== by 0x488CD0: stringsubst (subst.c:301)
==10069== by 0x48801B: prefork (subst.c:77)
==10069== by 0x42B318: execcmd (exec.c:2619)
==10069== by 0x428CA0: execpline2 (exec.c:1697)
==10069== by 0x427FD2: execpline (exec.c:1484)
==10069== by 0x427756: execlist (exec.c:1267)
==10069== by 0x42717C: execode (exec.c:1073)
==10069== by 0x431299: runshfunc (exec.c:5040)
==10069== by 0x430E76: doshfunc (exec.c:4920)
==10069== by 0x4302FB: execshfunc (exec.c:4557)
==10069== by 0x42D8C1: execcmd (exec.c:3373)
==10069==
==10069==
==10069== 2 errors in context 2 of 2:
==10069== Conditional jump or move depends on uninitialised value(s)
==10069== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10069== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10069== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10069== by 0x40EFC2: execbuiltin (builtin.c:450)
==10069== by 0x42D8E9: execcmd (exec.c:3378)
==10069== by 0x428CA0: execpline2 (exec.c:1697)
==10069== by 0x427FD2: execpline (exec.c:1484)
==10069== by 0x42779A: execlist (exec.c:1275)
==10069== by 0x42717C: execode (exec.c:1073)
==10069== by 0x431299: runshfunc (exec.c:5040)
==10069== by 0x430E76: doshfunc (exec.c:4920)
==10069== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10069==
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9900-- Caught __NR_exit; running __libc_freeres()
--9900-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070== Checked 5,700,184 bytes
==10070==
==9900==
==9900== HEAP SUMMARY:
==9900== in use at exit: 3,112,089 bytes in 68,919 blocks
==9900== total heap usage: 1,592,188 allocs, 1,523,269 frees, 128,588,521 bytes allocated
==9900==
client request: code 4d430005, addr 0xFFEFEC7DC, len 4
==10070== LEAK SUMMARY:
==10070== definitely lost: 2,189 bytes in 12 blocks
==10070== indirectly lost: 6,756 bytes in 7 blocks
==10070== possibly lost: 0 bytes in 0 blocks
==10070== still reachable: 3,135,247 bytes in 69,910 blocks
==10070== suppressed: 0 bytes in 0 blocks
==10070== Rerun with --leak-check=full to see details of leaked memory
==10070==
==10070== Use --track-origins=yes to see where uninitialised values come from
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10070==
==10070== 1 errors in context 1 of 2:
==10070== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10070== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10070== by 0x488CD0: stringsubst (subst.c:301)
==10070== by 0x48801B: prefork (subst.c:77)
==10070== by 0x42B318: execcmd (exec.c:2619)
==10070== by 0x428CA0: execpline2 (exec.c:1697)
==10070== by 0x427FD2: execpline (exec.c:1484)
==10070== by 0x427756: execlist (exec.c:1267)
==10070== by 0x42717C: execode (exec.c:1073)
==10070== by 0x431299: runshfunc (exec.c:5040)
==10070== by 0x430E76: doshfunc (exec.c:4920)
==10070== by 0x4302FB: execshfunc (exec.c:4557)
==10070== by 0x42D8C1: execcmd (exec.c:3373)
==10070==
==10070==
==10070== 2 errors in context 2 of 2:
==10070== Conditional jump or move depends on uninitialised value(s)
==10070== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10070== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10070== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10070== by 0x40EFC2: execbuiltin (builtin.c:450)
==10070== by 0x42D8E9: execcmd (exec.c:3378)
==10070== by 0x428CA0: execpline2 (exec.c:1697)
==10070== by 0x427FD2: execpline (exec.c:1484)
==10070== by 0x42779A: execlist (exec.c:1275)
==10070== by 0x42717C: execode (exec.c:1073)
==10070== by 0x431299: runshfunc (exec.c:5040)
==10070== by 0x430E76: doshfunc (exec.c:4920)
==10070== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10070==
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900== Searching for pointers to 68,919 not-freed blocks
--9900-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9900-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9900-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9900-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9900-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9900-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9900-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9900-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9900-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9900-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9900-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9900-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9900-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9900-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9900-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9900-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9900-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9900-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9900-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9900-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9900-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9900-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9900-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9900-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9900-- Scanning root segment: 0x701a000..0x701afff (4096)
--9900-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9900-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9900-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9900-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9900-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9900-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9900-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9900-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9900-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9900-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10073-by-pythonnut-on-???
==10073== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10073-by-pythonnut-on-???
==10073== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10073-by-pythonnut-on-???
==10073==
==10073== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10073== don't want to do, unless you know exactly what you're doing,
==10073== or are doing some strange experiment):
==10073== /usr/lib/valgrind/../../bin/vgdb --pid=10073 ...command...
==10073==
==10073== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10073== /path/to/gdb ./zsh
==10073== and then give GDB the following command
==10073== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10073
==10073== --pid is optional if only one valgrind process is running
==10073==
--10073-- Caught __NR_exit; running __libc_freeres()
==10072==
==10072== Process terminating with default action of signal 15 (SIGTERM)
==10072== at 0x59EEDC7: kill (in /usr/lib/libc-2.20.so)
==10072== by 0x4505D6: bin_kill (jobs.c:2451)
==10072== by 0x40EFC2: execbuiltin (builtin.c:450)
==10072== by 0x42D8E9: execcmd (exec.c:3378)
==10072== by 0x428CA0: execpline2 (exec.c:1697)
==10072== by 0x427FD2: execpline (exec.c:1484)
==10072== by 0x427756: execlist (exec.c:1267)
==10072== by 0x45689D: execif (loop.c:525)
==10072== by 0x42D731: execcmd (exec.c:3336)
==10072== by 0x428CA0: execpline2 (exec.c:1697)
==10072== by 0x427FD2: execpline (exec.c:1484)
==10072== by 0x427756: execlist (exec.c:1267)
--10072-- Caught __NR_exit; running __libc_freeres()
==10072== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10072-by-pythonnut-on-???
==10072== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10072-by-pythonnut-on-???
==10072== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10072-by-pythonnut-on-???
==10072==
==10072== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10072== don't want to do, unless you know exactly what you're doing,
==10072== or are doing some strange experiment):
==10072== /usr/lib/valgrind/../../bin/vgdb --pid=10072 ...command...
==10072==
==10072== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10072== /path/to/gdb ./zsh
==10072== and then give GDB the following command
==10072== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10072
==10072== --pid is optional if only one valgrind process is running
==10072==
==10074== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10074-by-pythonnut-on-???
==10074== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10074-by-pythonnut-on-???
==10074== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10074-by-pythonnut-on-???
==10074==
==10074== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10074== don't want to do, unless you know exactly what you're doing,
==10074== or are doing some strange experiment):
==10074== /usr/lib/valgrind/../../bin/vgdb --pid=10074 ...command...
==10074==
==10074== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10074== /path/to/gdb ./zsh
==10074== and then give GDB the following command
==10074== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10074
==10074== --pid is optional if only one valgrind process is running
==10074==
--10073-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073==
--10072-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073== HEAP SUMMARY:
==10073== in use at exit: 3,144,192 bytes in 69,929 blocks
==10073== total heap usage: 1,593,075 allocs, 1,523,146 frees, 128,648,157 bytes allocated
==10073==
client request: code 4d430005, addr 0xFFEFED0EC, len 4
==10072==
==10072== HEAP SUMMARY:
==10072== in use at exit: 3,128,661 bytes in 69,244 blocks
==10072== total heap usage: 1,594,711 allocs, 1,525,467 frees, 128,786,033 bytes allocated
==10072==
==10076== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10076-by-pythonnut-on-???
==10076== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10076-by-pythonnut-on-???
==10076== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10076-by-pythonnut-on-???
==10076==
==10076== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10076== don't want to do, unless you know exactly what you're doing,
==10076== or are doing some strange experiment):
==10076== /usr/lib/valgrind/../../bin/vgdb --pid=10076 ...command...
==10076==
==10076== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10076== /path/to/gdb ./zsh
==10076== and then give GDB the following command
==10076== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10076
==10076== --pid is optional if only one valgrind process is running
==10076==
--10076-- Caught __NR_exit; running __libc_freeres()
==10073== Searching for pointers to 69,929 not-freed blocks
--10073-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10073-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10073-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10073-- Scanning root segment: 0x4037000..0x4047fff (69632)
--10073-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10073-- Scanning root segment: 0x41d6000..0x421efff (299008)
--10073-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10073-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10073-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10073-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10073-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10073-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10073-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10073-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10073-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10073-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10073-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10073-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10073-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10073-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10073-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10073-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10073-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10073-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10073-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10073-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10073-- Scanning root segment: 0x701a000..0x701afff (4096)
--10073-- Scanning root segment: 0x881b000..0x8838fff (122880)
--10073-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10073-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10073-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10073-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10073-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10073-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10073-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10073-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10073-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10073-- Scanning root segment: 0xbe86000..0xbee8fff (405504)
==10072== Searching for pointers to 69,244 not-freed blocks
--10073-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10072-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10072-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10072-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10072-- Scanning root segment: 0x4037000..0x403afff (16384)
--10072-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10072-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10072-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10072-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10072-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10072-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10072-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10072-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10072-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10072-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10072-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10072-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10072-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10072-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10072-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10072-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10072-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10072-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10072-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10072-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10072-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10072-- Scanning root segment: 0x701a000..0x701afff (4096)
--10072-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10072-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10072-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10072-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10072-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10072-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10072-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10072-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10072-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10072-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9900== Checked 4,767,184 bytes
==9900==
--10076-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076==
==10076== HEAP SUMMARY:
==10076== in use at exit: 3,124,904 bytes in 69,172 blocks
==10076== total heap usage: 1,594,861 allocs, 1,525,689 frees, 128,802,641 bytes allocated
==10076==
==9900== LEAK SUMMARY:
==9900== definitely lost: 2,189 bytes in 12 blocks
==9900== indirectly lost: 6,756 bytes in 7 blocks
==9900== possibly lost: 0 bytes in 0 blocks
==9900== still reachable: 3,103,144 bytes in 68,900 blocks
==9900== suppressed: 0 bytes in 0 blocks
==9900== Rerun with --leak-check=full to see details of leaked memory
==9900==
==9900== Use --track-origins=yes to see where uninitialised values come from
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900==
==9900== 1 errors in context 1 of 2:
==9900== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9900== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9900== by 0x488CD0: stringsubst (subst.c:301)
==9900== by 0x48801B: prefork (subst.c:77)
==9900== by 0x42B318: execcmd (exec.c:2619)
==9900== by 0x428CA0: execpline2 (exec.c:1697)
==9900== by 0x427FD2: execpline (exec.c:1484)
==9900== by 0x427756: execlist (exec.c:1267)
==9900== by 0x42717C: execode (exec.c:1073)
==9900== by 0x431299: runshfunc (exec.c:5040)
==9900== by 0x430E76: doshfunc (exec.c:4920)
==9900== by 0x4302FB: execshfunc (exec.c:4557)
==9900== by 0x42D8C1: execcmd (exec.c:3373)
==9900==
==9900==
==9900== 2 errors in context 2 of 2:
==9900== Conditional jump or move depends on uninitialised value(s)
==9900== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9900== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9900== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9900== by 0x40EFC2: execbuiltin (builtin.c:450)
==9900== by 0x42D8E9: execcmd (exec.c:3378)
==9900== by 0x428CA0: execpline2 (exec.c:1697)
==9900== by 0x427FD2: execpline (exec.c:1484)
==9900== by 0x42779A: execlist (exec.c:1275)
==9900== by 0x42717C: execode (exec.c:1073)
==9900== by 0x431299: runshfunc (exec.c:5040)
==9900== by 0x430E76: doshfunc (exec.c:4920)
==9900== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9900==
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076== Searching for pointers to 69,172 not-freed blocks
--10076-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10076-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10076-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10076-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10076-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10076-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10076-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10076-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10076-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10076-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10076-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10076-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10076-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10076-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10076-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10076-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10076-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10076-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10076-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10076-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10076-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10076-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10076-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10076-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10076-- Scanning root segment: 0x701a000..0x701afff (4096)
--10076-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10076-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10076-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10076-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10076-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10076-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10076-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10076-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10076-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10076-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== Checked 5,700,184 bytes
==10073==
==10072== Checked 4,808,368 bytes
==10072==
==10073== LEAK SUMMARY:
==10073== definitely lost: 2,189 bytes in 12 blocks
==10073== indirectly lost: 6,756 bytes in 7 blocks
==10073== possibly lost: 0 bytes in 0 blocks
==10073== still reachable: 3,135,247 bytes in 69,910 blocks
==10073== suppressed: 0 bytes in 0 blocks
==10073== Rerun with --leak-check=full to see details of leaked memory
==10073==
==10073== Use --track-origins=yes to see where uninitialised values come from
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10073==
==10073== 1 errors in context 1 of 2:
==10073== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10073== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10073== by 0x488CD0: stringsubst (subst.c:301)
==10073== by 0x48801B: prefork (subst.c:77)
==10073== by 0x42B318: execcmd (exec.c:2619)
==10073== by 0x428CA0: execpline2 (exec.c:1697)
==10073== by 0x427FD2: execpline (exec.c:1484)
==10073== by 0x427756: execlist (exec.c:1267)
==10073== by 0x42717C: execode (exec.c:1073)
==10073== by 0x431299: runshfunc (exec.c:5040)
==10073== by 0x430E76: doshfunc (exec.c:4920)
==10073== by 0x4302FB: execshfunc (exec.c:4557)
==10073== by 0x42D8C1: execcmd (exec.c:3373)
==10073==
==10073==
==10073== 2 errors in context 2 of 2:
==10073== Conditional jump or move depends on uninitialised value(s)
==10073== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10073== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10073== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10073== by 0x40EFC2: execbuiltin (builtin.c:450)
==10073== by 0x42D8E9: execcmd (exec.c:3378)
==10073== by 0x428CA0: execpline2 (exec.c:1697)
==10073== by 0x427FD2: execpline (exec.c:1484)
==10073== by 0x42779A: execlist (exec.c:1275)
==10073== by 0x42717C: execode (exec.c:1073)
==10073== by 0x431299: runshfunc (exec.c:5040)
==10073== by 0x430E76: doshfunc (exec.c:4920)
==10073== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10073==
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072== LEAK SUMMARY:
==10072== definitely lost: 2,197 bytes in 13 blocks
==10072== indirectly lost: 6,756 bytes in 7 blocks
==10072== possibly lost: 0 bytes in 0 blocks
==10072== still reachable: 3,119,708 bytes in 69,224 blocks
==10072== suppressed: 0 bytes in 0 blocks
==10072== Rerun with --leak-check=full to see details of leaked memory
==10072==
==10072== Use --track-origins=yes to see where uninitialised values come from
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072==
==10072== 1 errors in context 1 of 2:
==10072== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10072== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10072== by 0x488CD0: stringsubst (subst.c:301)
==10072== by 0x48801B: prefork (subst.c:77)
==10072== by 0x42B318: execcmd (exec.c:2619)
==10072== by 0x428CA0: execpline2 (exec.c:1697)
==10072== by 0x427FD2: execpline (exec.c:1484)
==10072== by 0x427756: execlist (exec.c:1267)
==10072== by 0x42717C: execode (exec.c:1073)
==10072== by 0x431299: runshfunc (exec.c:5040)
==10072== by 0x430E76: doshfunc (exec.c:4920)
==10072== by 0x4302FB: execshfunc (exec.c:4557)
==10072== by 0x42D8C1: execcmd (exec.c:3373)
==10072==
==10072==
==10072== 2 errors in context 2 of 2:
==10072== Conditional jump or move depends on uninitialised value(s)
==10072== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10072== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10072== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10072== by 0x40EFC2: execbuiltin (builtin.c:450)
==10072== by 0x42D8E9: execcmd (exec.c:3378)
==10072== by 0x428CA0: execpline2 (exec.c:1697)
==10072== by 0x427FD2: execpline (exec.c:1484)
==10072== by 0x42779A: execlist (exec.c:1275)
==10072== by 0x42717C: execode (exec.c:1073)
==10072== by 0x431299: runshfunc (exec.c:5040)
==10072== by 0x430E76: doshfunc (exec.c:4920)
==10072== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10072==
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9963-- Caught __NR_exit; running __libc_freeres()
--9963-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076== Checked 4,784,720 bytes
==10076==
==9963==
==9963== HEAP SUMMARY:
==9963== in use at exit: 3,115,893 bytes in 69,048 blocks
==9963== total heap usage: 1,593,017 allocs, 1,523,969 frees, 128,647,287 bytes allocated
==9963==
==10076== LEAK SUMMARY:
==10076== definitely lost: 2,197 bytes in 13 blocks
==10076== indirectly lost: 6,756 bytes in 7 blocks
==10076== possibly lost: 0 bytes in 0 blocks
==10076== still reachable: 3,115,951 bytes in 69,152 blocks
==10076== suppressed: 0 bytes in 0 blocks
==10076== Rerun with --leak-check=full to see details of leaked memory
==10076==
==10076== Use --track-origins=yes to see where uninitialised values come from
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076==
==10076== 1 errors in context 1 of 2:
==10076== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10076== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10076== by 0x488CD0: stringsubst (subst.c:301)
==10076== by 0x48801B: prefork (subst.c:77)
==10076== by 0x42B318: execcmd (exec.c:2619)
==10076== by 0x428CA0: execpline2 (exec.c:1697)
==10076== by 0x427FD2: execpline (exec.c:1484)
==10076== by 0x427756: execlist (exec.c:1267)
==10076== by 0x42717C: execode (exec.c:1073)
==10076== by 0x431299: runshfunc (exec.c:5040)
==10076== by 0x430E76: doshfunc (exec.c:4920)
==10076== by 0x4302FB: execshfunc (exec.c:4557)
==10076== by 0x42D8C1: execcmd (exec.c:3373)
==10076==
==10076==
==10076== 2 errors in context 2 of 2:
==10076== Conditional jump or move depends on uninitialised value(s)
==10076== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10076== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10076== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10076== by 0x40EFC2: execbuiltin (builtin.c:450)
==10076== by 0x42D8E9: execcmd (exec.c:3378)
==10076== by 0x428CA0: execpline2 (exec.c:1697)
==10076== by 0x427FD2: execpline (exec.c:1484)
==10076== by 0x42779A: execlist (exec.c:1275)
==10076== by 0x42717C: execode (exec.c:1073)
==10076== by 0x431299: runshfunc (exec.c:5040)
==10076== by 0x430E76: doshfunc (exec.c:4920)
==10076== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10076==
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== Searching for pointers to 69,048 not-freed blocks
--9963-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9963-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9963-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9963-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9963-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9963-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9963-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9963-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9963-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9963-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9963-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9963-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9963-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9963-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9963-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9963-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9963-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9963-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9963-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9963-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9963-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9963-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9963-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9963-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9963-- Scanning root segment: 0x701a000..0x701afff (4096)
--9963-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9963-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9963-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9963-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9963-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9963-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9963-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9963-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9963-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9963-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10077-- Caught __NR_exit; running __libc_freeres()
==10077== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10077-by-pythonnut-on-???
==10077== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10077-by-pythonnut-on-???
==10077== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10077-by-pythonnut-on-???
==10077==
==10077== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10077== don't want to do, unless you know exactly what you're doing,
==10077== or are doing some strange experiment):
==10077== /usr/lib/valgrind/../../bin/vgdb --pid=10077 ...command...
==10077==
==10077== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10077== /path/to/gdb ./zsh
==10077== and then give GDB the following command
==10077== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10077
==10077== --pid is optional if only one valgrind process is running
==10077==
--10077-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10077==
==10077== HEAP SUMMARY:
==10077== in use at exit: 3,124,808 bytes in 69,172 blocks
==10077== total heap usage: 1,594,841 allocs, 1,525,669 frees, 128,800,411 bytes allocated
==10077==
==10077== Searching for pointers to 69,172 not-freed blocks
--10077-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10077-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10077-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10077-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10077-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10077-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10077-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10077-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10077-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10077-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10077-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10077-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10077-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10077-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10077-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10077-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10077-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10077-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10077-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10077-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10077-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10077-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10077-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10077-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10077-- Scanning root segment: 0x701a000..0x701afff (4096)
--10077-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10077-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10077-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10077-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10077-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10077-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10077-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10077-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10077-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10077-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9963== Checked 4,772,800 bytes
==9963==
==9963== LEAK SUMMARY:
==9963== definitely lost: 2,189 bytes in 12 blocks
==9963== indirectly lost: 6,756 bytes in 7 blocks
==9963== possibly lost: 0 bytes in 0 blocks
==9963== still reachable: 3,106,948 bytes in 69,029 blocks
==9963== suppressed: 0 bytes in 0 blocks
==9963== Rerun with --leak-check=full to see details of leaked memory
==9963==
==9963== Use --track-origins=yes to see where uninitialised values come from
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963==
==9963== 1 errors in context 1 of 2:
==9963== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9963== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9963== by 0x488CD0: stringsubst (subst.c:301)
==9963== by 0x48801B: prefork (subst.c:77)
==9963== by 0x42B318: execcmd (exec.c:2619)
==9963== by 0x428CA0: execpline2 (exec.c:1697)
==9963== by 0x427FD2: execpline (exec.c:1484)
==9963== by 0x427756: execlist (exec.c:1267)
==9963== by 0x42717C: execode (exec.c:1073)
==9963== by 0x431299: runshfunc (exec.c:5040)
==9963== by 0x430E76: doshfunc (exec.c:4920)
==9963== by 0x4302FB: execshfunc (exec.c:4557)
==9963== by 0x42D8C1: execcmd (exec.c:3373)
==9963==
==9963==
==9963== 2 errors in context 2 of 2:
==9963== Conditional jump or move depends on uninitialised value(s)
==9963== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9963== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9963== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9963== by 0x40EFC2: execbuiltin (builtin.c:450)
==9963== by 0x42D8E9: execcmd (exec.c:3378)
==9963== by 0x428CA0: execpline2 (exec.c:1697)
==9963== by 0x427FD2: execpline (exec.c:1484)
==9963== by 0x42779A: execlist (exec.c:1275)
==9963== by 0x42717C: execode (exec.c:1073)
==9963== by 0x431299: runshfunc (exec.c:5040)
==9963== by 0x430E76: doshfunc (exec.c:4920)
==9963== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9963==
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9898-- Caught __NR_exit; running __libc_freeres()
--9898-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9898==
==9898== HEAP SUMMARY:
==9898== in use at exit: 3,113,785 bytes in 68,977 blocks
==9898== total heap usage: 1,592,046 allocs, 1,523,069 frees, 128,469,578 bytes allocated
==9898==
==10077== Checked 4,784,624 bytes
==10077==
==9898== Searching for pointers to 68,977 not-freed blocks
--9898-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9898-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9898-- Scanning root segment: 0x4022000..0x4026fff (20480)
--9898-- Scanning root segment: 0x4049000..0x404cfff (16384)
--9898-- Scanning root segment: 0x4222000..0x4222fff (4096)
--9898-- Scanning root segment: 0x4223000..0x4223fff (4096)
--9898-- Scanning root segment: 0x4224000..0x4224fff (4096)
--9898-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9898-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9898-- Scanning root segment: 0x5041000..0x5041fff (4096)
--9898-- Scanning root segment: 0x5245000..0x5245fff (4096)
--9898-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--9898-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--9898-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9898-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--9898-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9898-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9898-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9898-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9898-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9898-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9898-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9898-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9898-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9898-- Scanning root segment: 0x701a000..0x701afff (4096)
--9898-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9898-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9898-- Scanning root segment: 0xae51000..0xae52fff (8192)
--9898-- Scanning root segment: 0xb054000..0xb054fff (4096)
--9898-- Scanning root segment: 0xb268000..0xb268fff (4096)
--9898-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--9898-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9898-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9898-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9898-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10077== LEAK SUMMARY:
==10077== definitely lost: 2,197 bytes in 13 blocks
==10077== indirectly lost: 6,756 bytes in 7 blocks
==10077== possibly lost: 0 bytes in 0 blocks
==10077== still reachable: 3,115,855 bytes in 69,152 blocks
==10077== suppressed: 0 bytes in 0 blocks
==10077== Rerun with --leak-check=full to see details of leaked memory
==10077==
==10077== Use --track-origins=yes to see where uninitialised values come from
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10077==
==10077== 1 errors in context 1 of 2:
==10077== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10077== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10077== by 0x488CD0: stringsubst (subst.c:301)
==10077== by 0x48801B: prefork (subst.c:77)
==10077== by 0x42B318: execcmd (exec.c:2619)
==10077== by 0x428CA0: execpline2 (exec.c:1697)
==10077== by 0x427FD2: execpline (exec.c:1484)
==10077== by 0x427756: execlist (exec.c:1267)
==10077== by 0x42717C: execode (exec.c:1073)
==10077== by 0x431299: runshfunc (exec.c:5040)
==10077== by 0x430E76: doshfunc (exec.c:4920)
==10077== by 0x4302FB: execshfunc (exec.c:4557)
==10077== by 0x42D8C1: execcmd (exec.c:3373)
==10077==
==10077==
==10077== 2 errors in context 2 of 2:
==10077== Conditional jump or move depends on uninitialised value(s)
==10077== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10077== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10077== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10077== by 0x40EFC2: execbuiltin (builtin.c:450)
==10077== by 0x42D8E9: execcmd (exec.c:3378)
==10077== by 0x428CA0: execpline2 (exec.c:1697)
==10077== by 0x427FD2: execpline (exec.c:1484)
==10077== by 0x42779A: execlist (exec.c:1275)
==10077== by 0x42717C: execode (exec.c:1073)
==10077== by 0x431299: runshfunc (exec.c:5040)
==10077== by 0x430E76: doshfunc (exec.c:4920)
==10077== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10077==
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEC70C, len 4
==10079== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10079-by-pythonnut-on-???
==10079== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10079-by-pythonnut-on-???
==10079== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10079-by-pythonnut-on-???
==10079==
==10079== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10079== don't want to do, unless you know exactly what you're doing,
==10079== or are doing some strange experiment):
==10079== /usr/lib/valgrind/../../bin/vgdb --pid=10079 ...command...
==10079==
==10079== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10079== /path/to/gdb ./zsh
==10079== and then give GDB the following command
==10079== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10079
==10079== --pid is optional if only one valgrind process is running
==10079==
--10080-- Caught __NR_exit; running __libc_freeres()
==10080== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10080-by-pythonnut-on-???
==10080== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10080-by-pythonnut-on-???
==10080== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10080-by-pythonnut-on-???
==10080==
==10080== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10080== don't want to do, unless you know exactly what you're doing,
==10080== or are doing some strange experiment):
==10080== /usr/lib/valgrind/../../bin/vgdb --pid=10080 ...command...
==10080==
==10080== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10080== /path/to/gdb ./zsh
==10080== and then give GDB the following command
==10080== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10080
==10080== --pid is optional if only one valgrind process is running
==10080==
client request: code 4d430005, addr 0xFFEFED07C, len 4
==9898== Checked 4,770,304 bytes
==9898==
--10080-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10080==
==10080== HEAP SUMMARY:
==10080== in use at exit: 3,128,702 bytes in 69,255 blocks
==10080== total heap usage: 1,595,036 allocs, 1,525,781 frees, 128,818,731 bytes allocated
==10080==
==9898== LEAK SUMMARY:
==9898== definitely lost: 2,189 bytes in 12 blocks
==9898== indirectly lost: 6,756 bytes in 7 blocks
==9898== possibly lost: 0 bytes in 0 blocks
==9898== still reachable: 3,104,840 bytes in 68,958 blocks
==9898== suppressed: 0 bytes in 0 blocks
==9898== Rerun with --leak-check=full to see details of leaked memory
==9898==
==9898== Use --track-origins=yes to see where uninitialised values come from
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898==
==9898== 1 errors in context 1 of 2:
==9898== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9898== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9898== by 0x488CD0: stringsubst (subst.c:301)
==9898== by 0x48801B: prefork (subst.c:77)
==9898== by 0x42B318: execcmd (exec.c:2619)
==9898== by 0x428CA0: execpline2 (exec.c:1697)
==9898== by 0x427FD2: execpline (exec.c:1484)
==9898== by 0x427756: execlist (exec.c:1267)
==9898== by 0x42717C: execode (exec.c:1073)
==9898== by 0x431299: runshfunc (exec.c:5040)
==9898== by 0x430E76: doshfunc (exec.c:4920)
==9898== by 0x4302FB: execshfunc (exec.c:4557)
==9898== by 0x42D8C1: execcmd (exec.c:3373)
==9898==
==9898==
==9898== 2 errors in context 2 of 2:
==9898== Conditional jump or move depends on uninitialised value(s)
==9898== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9898== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9898== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9898== by 0x40EFC2: execbuiltin (builtin.c:450)
==9898== by 0x42D8E9: execcmd (exec.c:3378)
==9898== by 0x428CA0: execpline2 (exec.c:1697)
==9898== by 0x427FD2: execpline (exec.c:1484)
==9898== by 0x42779A: execlist (exec.c:1275)
==9898== by 0x42717C: execode (exec.c:1073)
==9898== by 0x431299: runshfunc (exec.c:5040)
==9898== by 0x430E76: doshfunc (exec.c:4920)
==9898== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9898==
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080== Searching for pointers to 69,255 not-freed blocks
--10080-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10080-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10080-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10080-- Scanning root segment: 0x4037000..0x403afff (16384)
--10080-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10080-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10080-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10080-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10080-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10080-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10080-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10080-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10080-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10080-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10080-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10080-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10080-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10080-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10080-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10080-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10080-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10080-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10080-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10080-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10080-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10080-- Scanning root segment: 0x701a000..0x701afff (4096)
--10080-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10080-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10080-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10080-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10080-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10080-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10080-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10080-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10080-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10080-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10080== Checked 4,808,080 bytes
==10080==
==10080== LEAK SUMMARY:
==10080== definitely lost: 2,197 bytes in 13 blocks
==10080== indirectly lost: 6,756 bytes in 7 blocks
==10080== possibly lost: 0 bytes in 0 blocks
==10080== still reachable: 3,119,749 bytes in 69,235 blocks
==10080== suppressed: 0 bytes in 0 blocks
==10080== Rerun with --leak-check=full to see details of leaked memory
==10080==
==10080== Use --track-origins=yes to see where uninitialised values come from
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080==
==10080== 1 errors in context 1 of 2:
==10080== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10080== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10080== by 0x488CD0: stringsubst (subst.c:301)
==10080== by 0x48801B: prefork (subst.c:77)
==10080== by 0x42B318: execcmd (exec.c:2619)
==10080== by 0x428CA0: execpline2 (exec.c:1697)
==10080== by 0x427FD2: execpline (exec.c:1484)
==10080== by 0x427756: execlist (exec.c:1267)
==10080== by 0x42717C: execode (exec.c:1073)
==10080== by 0x431299: runshfunc (exec.c:5040)
==10080== by 0x430E76: doshfunc (exec.c:4920)
==10080== by 0x4302FB: execshfunc (exec.c:4557)
==10080== by 0x42D8C1: execcmd (exec.c:3373)
==10080==
==10080==
==10080== 2 errors in context 2 of 2:
==10080== Conditional jump or move depends on uninitialised value(s)
==10080== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10080== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10080== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10080== by 0x40EFC2: execbuiltin (builtin.c:450)
==10080== by 0x42D8E9: execcmd (exec.c:3378)
==10080== by 0x428CA0: execpline2 (exec.c:1697)
==10080== by 0x427FD2: execpline (exec.c:1484)
==10080== by 0x42779A: execlist (exec.c:1275)
==10080== by 0x42717C: execode (exec.c:1073)
==10080== by 0x431299: runshfunc (exec.c:5040)
==10080== by 0x430E76: doshfunc (exec.c:4920)
==10080== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10080==
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10079-- Caught __NR_exit; running __libc_freeres()
--10079-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10079==
==10079== HEAP SUMMARY:
==10079== in use at exit: 3,128,638 bytes in 69,252 blocks
==10079== total heap usage: 1,595,034 allocs, 1,525,782 frees, 128,818,490 bytes allocated
==10079==
==10079== Searching for pointers to 69,252 not-freed blocks
--10079-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10079-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10079-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10079-- Scanning root segment: 0x4037000..0x403afff (16384)
--10079-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10079-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10079-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10079-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10079-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10079-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10079-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10079-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10079-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10079-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10079-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10079-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10079-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10079-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10079-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10079-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10079-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10079-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10079-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10079-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10079-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10079-- Scanning root segment: 0x701a000..0x701afff (4096)
--10079-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10079-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10079-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10079-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10079-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10079-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10079-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10079-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10079-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10079-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10079== Checked 4,807,392 bytes
==10079==
==10079== LEAK SUMMARY:
==10079== definitely lost: 2,197 bytes in 13 blocks
==10079== indirectly lost: 6,756 bytes in 7 blocks
==10079== possibly lost: 0 bytes in 0 blocks
==10079== still reachable: 3,119,685 bytes in 69,232 blocks
==10079== suppressed: 0 bytes in 0 blocks
==10079== Rerun with --leak-check=full to see details of leaked memory
==10079==
==10079== Use --track-origins=yes to see where uninitialised values come from
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10079==
==10079== 1 errors in context 1 of 2:
==10079== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10079== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10079== by 0x488CD0: stringsubst (subst.c:301)
==10079== by 0x48801B: prefork (subst.c:77)
==10079== by 0x42B318: execcmd (exec.c:2619)
==10079== by 0x428CA0: execpline2 (exec.c:1697)
==10079== by 0x427FD2: execpline (exec.c:1484)
==10079== by 0x427756: execlist (exec.c:1267)
==10079== by 0x42717C: execode (exec.c:1073)
==10079== by 0x431299: runshfunc (exec.c:5040)
==10079== by 0x430E76: doshfunc (exec.c:4920)
==10079== by 0x4302FB: execshfunc (exec.c:4557)
==10079== by 0x42D8C1: execcmd (exec.c:3373)
==10079==
==10079==
==10079== 2 errors in context 2 of 2:
==10079== Conditional jump or move depends on uninitialised value(s)
==10079== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10079== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10079== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10079== by 0x40EFC2: execbuiltin (builtin.c:450)
==10079== by 0x42D8E9: execcmd (exec.c:3378)
==10079== by 0x428CA0: execpline2 (exec.c:1697)
==10079== by 0x427FD2: execpline (exec.c:1484)
==10079== by 0x42779A: execlist (exec.c:1275)
==10079== by 0x42717C: execode (exec.c:1073)
==10079== by 0x431299: runshfunc (exec.c:5040)
==10079== by 0x430E76: doshfunc (exec.c:4920)
==10079== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10079==
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10084-- Caught __NR_exit; running __libc_freeres()
==10084== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10084-by-pythonnut-on-???
==10084== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10084-by-pythonnut-on-???
==10084== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10084-by-pythonnut-on-???
==10084==
==10084== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10084== don't want to do, unless you know exactly what you're doing,
==10084== or are doing some strange experiment):
==10084== /usr/lib/valgrind/../../bin/vgdb --pid=10084 ...command...
==10084==
==10084== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10084== /path/to/gdb ./zsh
==10084== and then give GDB the following command
==10084== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10084
==10084== --pid is optional if only one valgrind process is running
==10084==
--10084-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10084==
==10084== HEAP SUMMARY:
==10084== in use at exit: 3,128,645 bytes in 69,252 blocks
==10084== total heap usage: 1,595,049 allocs, 1,525,797 frees, 128,823,488 bytes allocated
==10084==
==10084== Searching for pointers to 69,252 not-freed blocks
--10084-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10084-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10084-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10084-- Scanning root segment: 0x4037000..0x403afff (16384)
--10084-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10084-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10084-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10084-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10084-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10084-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10084-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10084-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10084-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10084-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10084-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10084-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10084-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10084-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10084-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10084-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10084-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10084-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10084-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10084-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10084-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10084-- Scanning root segment: 0x701a000..0x701afff (4096)
--10084-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10084-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10084-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10084-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10084-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10084-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10084-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10084-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10084-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10084-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10084== Checked 4,807,528 bytes
==10084==
==10084== LEAK SUMMARY:
==10084== definitely lost: 2,197 bytes in 13 blocks
==10084== indirectly lost: 6,756 bytes in 7 blocks
==10084== possibly lost: 0 bytes in 0 blocks
==10084== still reachable: 3,119,692 bytes in 69,232 blocks
==10084== suppressed: 0 bytes in 0 blocks
==10084== Rerun with --leak-check=full to see details of leaked memory
==10084==
==10084== Use --track-origins=yes to see where uninitialised values come from
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10084==
==10084== 1 errors in context 1 of 2:
==10084== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10084== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10084== by 0x488CD0: stringsubst (subst.c:301)
==10084== by 0x48801B: prefork (subst.c:77)
==10084== by 0x42B318: execcmd (exec.c:2619)
==10084== by 0x428CA0: execpline2 (exec.c:1697)
==10084== by 0x427FD2: execpline (exec.c:1484)
==10084== by 0x427756: execlist (exec.c:1267)
==10084== by 0x42717C: execode (exec.c:1073)
==10084== by 0x431299: runshfunc (exec.c:5040)
==10084== by 0x430E76: doshfunc (exec.c:4920)
==10084== by 0x4302FB: execshfunc (exec.c:4557)
==10084== by 0x42D8C1: execcmd (exec.c:3373)
==10084==
==10084==
==10084== 2 errors in context 2 of 2:
==10084== Conditional jump or move depends on uninitialised value(s)
==10084== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10084== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10084== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10084== by 0x40EFC2: execbuiltin (builtin.c:450)
==10084== by 0x42D8E9: execcmd (exec.c:3378)
==10084== by 0x428CA0: execpline2 (exec.c:1697)
==10084== by 0x427FD2: execpline (exec.c:1484)
==10084== by 0x42779A: execlist (exec.c:1275)
==10084== by 0x42717C: execode (exec.c:1073)
==10084== by 0x431299: runshfunc (exec.c:5040)
==10084== by 0x430E76: doshfunc (exec.c:4920)
==10084== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10084==
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10085-- Caught __NR_exit; running __libc_freeres()
==10085== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10085-by-pythonnut-on-???
==10085== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10085-by-pythonnut-on-???
==10085== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10085-by-pythonnut-on-???
==10085==
==10085== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10085== don't want to do, unless you know exactly what you're doing,
==10085== or are doing some strange experiment):
==10085== /usr/lib/valgrind/../../bin/vgdb --pid=10085 ...command...
==10085==
==10085== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10085== /path/to/gdb ./zsh
==10085== and then give GDB the following command
==10085== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10085
==10085== --pid is optional if only one valgrind process is running
==10085==
--10085-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10085==
==10085== HEAP SUMMARY:
==10085== in use at exit: 3,128,741 bytes in 69,252 blocks
==10085== total heap usage: 1,595,065 allocs, 1,525,813 frees, 128,828,275 bytes allocated
==10085==
==10085== Searching for pointers to 69,252 not-freed blocks
--10085-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10085-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10085-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10085-- Scanning root segment: 0x4037000..0x403afff (16384)
--10085-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10085-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10085-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10085-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10085-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10085-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10085-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10085-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10085-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10085-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10085-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10085-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10085-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10085-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10085-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10085-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10085-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10085-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10085-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10085-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10085-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10085-- Scanning root segment: 0x701a000..0x701afff (4096)
--10085-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10085-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10085-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10085-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10085-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10085-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10085-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10085-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10085-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10085-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10085== Checked 4,806,808 bytes
==10085==
==10085== LEAK SUMMARY:
==10085== definitely lost: 2,197 bytes in 13 blocks
==10085== indirectly lost: 6,756 bytes in 7 blocks
==10085== possibly lost: 0 bytes in 0 blocks
==10085== still reachable: 3,119,788 bytes in 69,232 blocks
==10085== suppressed: 0 bytes in 0 blocks
==10085== Rerun with --leak-check=full to see details of leaked memory
==10085==
==10085== Use --track-origins=yes to see where uninitialised values come from
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10085==
==10085== 1 errors in context 1 of 2:
==10085== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10085== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10085== by 0x488CD0: stringsubst (subst.c:301)
==10085== by 0x48801B: prefork (subst.c:77)
==10085== by 0x42B318: execcmd (exec.c:2619)
==10085== by 0x428CA0: execpline2 (exec.c:1697)
==10085== by 0x427FD2: execpline (exec.c:1484)
==10085== by 0x427756: execlist (exec.c:1267)
==10085== by 0x42717C: execode (exec.c:1073)
==10085== by 0x431299: runshfunc (exec.c:5040)
==10085== by 0x430E76: doshfunc (exec.c:4920)
==10085== by 0x4302FB: execshfunc (exec.c:4557)
==10085== by 0x42D8C1: execcmd (exec.c:3373)
==10085==
==10085==
==10085== 2 errors in context 2 of 2:
==10085== Conditional jump or move depends on uninitialised value(s)
==10085== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10085== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10085== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10085== by 0x40EFC2: execbuiltin (builtin.c:450)
==10085== by 0x42D8E9: execcmd (exec.c:3378)
==10085== by 0x428CA0: execpline2 (exec.c:1697)
==10085== by 0x427FD2: execpline (exec.c:1484)
==10085== by 0x42779A: execlist (exec.c:1275)
==10085== by 0x42717C: execode (exec.c:1073)
==10085== by 0x431299: runshfunc (exec.c:5040)
==10085== by 0x430E76: doshfunc (exec.c:4920)
==10085== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10085==
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10086-by-pythonnut-on-???
==10086== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10086-by-pythonnut-on-???
==10086== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10086-by-pythonnut-on-???
==10086==
==10086== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10086== don't want to do, unless you know exactly what you're doing,
==10086== or are doing some strange experiment):
==10086== /usr/lib/valgrind/../../bin/vgdb --pid=10086 ...command...
==10086==
==10086== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10086== /path/to/gdb ./zsh
==10086== and then give GDB the following command
==10086== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10086
==10086== --pid is optional if only one valgrind process is running
==10086==
--10086-- Caught __NR_exit; running __libc_freeres()
--10086-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10086==
==10086== HEAP SUMMARY:
==10086== in use at exit: 3,129,015 bytes in 69,258 blocks
==10086== total heap usage: 1,595,113 allocs, 1,525,855 frees, 128,837,299 bytes allocated
==10086==
==10086== Searching for pointers to 69,258 not-freed blocks
--10086-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10086-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10086-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10086-- Scanning root segment: 0x4037000..0x403afff (16384)
--10086-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10086-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10086-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10086-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10086-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10086-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10086-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10086-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10086-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10086-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10086-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10086-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10086-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10086-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10086-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10086-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10086-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10086-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10086-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10086-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10086-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10086-- Scanning root segment: 0x701a000..0x701afff (4096)
--10086-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10086-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10086-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10086-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10086-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10086-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10086-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10086-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10086-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10086-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10086== Checked 4,807,000 bytes
==10086==
==10086== LEAK SUMMARY:
==10086== definitely lost: 2,197 bytes in 13 blocks
==10086== indirectly lost: 6,756 bytes in 7 blocks
==10086== possibly lost: 0 bytes in 0 blocks
==10086== still reachable: 3,120,062 bytes in 69,238 blocks
==10086== suppressed: 0 bytes in 0 blocks
==10086== Rerun with --leak-check=full to see details of leaked memory
==10086==
==10086== Use --track-origins=yes to see where uninitialised values come from
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086==
==10086== 1 errors in context 1 of 2:
==10086== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10086== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10086== by 0x488CD0: stringsubst (subst.c:301)
==10086== by 0x48801B: prefork (subst.c:77)
==10086== by 0x42B318: execcmd (exec.c:2619)
==10086== by 0x428CA0: execpline2 (exec.c:1697)
==10086== by 0x427FD2: execpline (exec.c:1484)
==10086== by 0x427756: execlist (exec.c:1267)
==10086== by 0x42717C: execode (exec.c:1073)
==10086== by 0x431299: runshfunc (exec.c:5040)
==10086== by 0x430E76: doshfunc (exec.c:4920)
==10086== by 0x4302FB: execshfunc (exec.c:4557)
==10086== by 0x42D8C1: execcmd (exec.c:3373)
==10086==
==10086==
==10086== 2 errors in context 2 of 2:
==10086== Conditional jump or move depends on uninitialised value(s)
==10086== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10086== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10086== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10086== by 0x40EFC2: execbuiltin (builtin.c:450)
==10086== by 0x42D8E9: execcmd (exec.c:3378)
==10086== by 0x428CA0: execpline2 (exec.c:1697)
==10086== by 0x427FD2: execpline (exec.c:1484)
==10086== by 0x42779A: execlist (exec.c:1275)
==10086== by 0x42717C: execode (exec.c:1073)
==10086== by 0x431299: runshfunc (exec.c:5040)
==10086== by 0x430E76: doshfunc (exec.c:4920)
==10086== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10086==
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10087-- Caught __NR_exit; running __libc_freeres()
==10087== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10087-by-pythonnut-on-???
==10087== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10087-by-pythonnut-on-???
==10087== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10087-by-pythonnut-on-???
==10087==
==10087== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10087== don't want to do, unless you know exactly what you're doing,
==10087== or are doing some strange experiment):
==10087== /usr/lib/valgrind/../../bin/vgdb --pid=10087 ...command...
==10087==
==10087== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10087== /path/to/gdb ./zsh
==10087== and then give GDB the following command
==10087== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10087
==10087== --pid is optional if only one valgrind process is running
==10087==
--10087-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10087==
==10087== HEAP SUMMARY:
==10087== in use at exit: 3,128,919 bytes in 69,258 blocks
==10087== total heap usage: 1,595,093 allocs, 1,525,835 frees, 128,835,069 bytes allocated
==10087==
==10087== Searching for pointers to 69,258 not-freed blocks
--10087-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10087-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10087-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10087-- Scanning root segment: 0x4037000..0x403afff (16384)
--10087-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10087-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10087-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10087-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10087-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10087-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10087-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10087-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10087-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10087-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10087-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10087-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10087-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10087-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10087-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10087-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10087-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10087-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10087-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10087-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10087-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10087-- Scanning root segment: 0x701a000..0x701afff (4096)
--10087-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10087-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10087-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10087-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10087-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10087-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10087-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10087-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10087-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10087-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10087== Checked 4,806,904 bytes
==10087==
==10087== LEAK SUMMARY:
==10087== definitely lost: 2,197 bytes in 13 blocks
==10087== indirectly lost: 6,756 bytes in 7 blocks
==10087== possibly lost: 0 bytes in 0 blocks
==10087== still reachable: 3,119,966 bytes in 69,238 blocks
==10087== suppressed: 0 bytes in 0 blocks
==10087== Rerun with --leak-check=full to see details of leaked memory
==10087==
==10087== Use --track-origins=yes to see where uninitialised values come from
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10087==
==10087== 1 errors in context 1 of 2:
==10087== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10087== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10087== by 0x488CD0: stringsubst (subst.c:301)
==10087== by 0x48801B: prefork (subst.c:77)
==10087== by 0x42B318: execcmd (exec.c:2619)
==10087== by 0x428CA0: execpline2 (exec.c:1697)
==10087== by 0x427FD2: execpline (exec.c:1484)
==10087== by 0x427756: execlist (exec.c:1267)
==10087== by 0x42717C: execode (exec.c:1073)
==10087== by 0x431299: runshfunc (exec.c:5040)
==10087== by 0x430E76: doshfunc (exec.c:4920)
==10087== by 0x4302FB: execshfunc (exec.c:4557)
==10087== by 0x42D8C1: execcmd (exec.c:3373)
==10087==
==10087==
==10087== 2 errors in context 2 of 2:
==10087== Conditional jump or move depends on uninitialised value(s)
==10087== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10087== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10087== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10087== by 0x40EFC2: execbuiltin (builtin.c:450)
==10087== by 0x42D8E9: execcmd (exec.c:3378)
==10087== by 0x428CA0: execpline2 (exec.c:1697)
==10087== by 0x427FD2: execpline (exec.c:1484)
==10087== by 0x42779A: execlist (exec.c:1275)
==10087== by 0x42717C: execode (exec.c:1073)
==10087== by 0x431299: runshfunc (exec.c:5040)
==10087== by 0x430E76: doshfunc (exec.c:4920)
==10087== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10087==
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10088-by-pythonnut-on-???
==10088== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10088-by-pythonnut-on-???
==10088== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10088-by-pythonnut-on-???
==10088==
==10088== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10088== don't want to do, unless you know exactly what you're doing,
==10088== or are doing some strange experiment):
==10088== /usr/lib/valgrind/../../bin/vgdb --pid=10088 ...command...
==10088==
==10088== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10088== /path/to/gdb ./zsh
==10088== and then give GDB the following command
==10088== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10088
==10088== --pid is optional if only one valgrind process is running
==10088==
--10088-- Caught __NR_exit; running __libc_freeres()
--10088-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10088==
==10088== HEAP SUMMARY:
==10088== in use at exit: 3,128,947 bytes in 69,259 blocks
==10088== total heap usage: 1,595,106 allocs, 1,525,847 frees, 128,837,756 bytes allocated
==10088==
==10088== Searching for pointers to 69,259 not-freed blocks
--10088-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10088-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10088-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10088-- Scanning root segment: 0x4037000..0x403afff (16384)
--10088-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10088-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10088-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10088-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10088-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10088-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10088-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10088-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10088-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10088-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10088-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10088-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10088-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10088-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10088-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10088-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10088-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10088-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10088-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10088-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10088-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10088-- Scanning root segment: 0x701a000..0x701afff (4096)
--10088-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10088-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10088-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10088-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10088-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10088-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10088-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10088-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10088-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10088-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10088== Checked 4,806,416 bytes
==10088==
==10088== LEAK SUMMARY:
==10088== definitely lost: 2,197 bytes in 13 blocks
==10088== indirectly lost: 6,756 bytes in 7 blocks
==10088== possibly lost: 0 bytes in 0 blocks
==10088== still reachable: 3,119,994 bytes in 69,239 blocks
==10088== suppressed: 0 bytes in 0 blocks
==10088== Rerun with --leak-check=full to see details of leaked memory
==10088==
==10088== Use --track-origins=yes to see where uninitialised values come from
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088==
==10088== 1 errors in context 1 of 2:
==10088== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10088== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10088== by 0x488CD0: stringsubst (subst.c:301)
==10088== by 0x48801B: prefork (subst.c:77)
==10088== by 0x42B318: execcmd (exec.c:2619)
==10088== by 0x428CA0: execpline2 (exec.c:1697)
==10088== by 0x427FD2: execpline (exec.c:1484)
==10088== by 0x427756: execlist (exec.c:1267)
==10088== by 0x42717C: execode (exec.c:1073)
==10088== by 0x431299: runshfunc (exec.c:5040)
==10088== by 0x430E76: doshfunc (exec.c:4920)
==10088== by 0x4302FB: execshfunc (exec.c:4557)
==10088== by 0x42D8C1: execcmd (exec.c:3373)
==10088==
==10088==
==10088== 2 errors in context 2 of 2:
==10088== Conditional jump or move depends on uninitialised value(s)
==10088== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10088== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10088== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10088== by 0x40EFC2: execbuiltin (builtin.c:450)
==10088== by 0x42D8E9: execcmd (exec.c:3378)
==10088== by 0x428CA0: execpline2 (exec.c:1697)
==10088== by 0x427FD2: execpline (exec.c:1484)
==10088== by 0x42779A: execlist (exec.c:1275)
==10088== by 0x42717C: execode (exec.c:1073)
==10088== by 0x431299: runshfunc (exec.c:5040)
==10088== by 0x430E76: doshfunc (exec.c:4920)
==10088== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10088==
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10091-- Caught __NR_exit; running __libc_freeres()
==10091== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10091-by-pythonnut-on-???
==10091== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10091-by-pythonnut-on-???
==10091== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10091-by-pythonnut-on-???
==10091==
==10091== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10091== don't want to do, unless you know exactly what you're doing,
==10091== or are doing some strange experiment):
==10091== /usr/lib/valgrind/../../bin/vgdb --pid=10091 ...command...
==10091==
==10091== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10091== /path/to/gdb ./zsh
==10091== and then give GDB the following command
==10091== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10091
==10091== --pid is optional if only one valgrind process is running
==10091==
--10091-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10091==
==10091== HEAP SUMMARY:
==10091== in use at exit: 3,128,687 bytes in 69,251 blocks
==10091== total heap usage: 1,595,264 allocs, 1,526,013 frees, 128,856,323 bytes allocated
==10091==
==10091== Searching for pointers to 69,251 not-freed blocks
--10091-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10091-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10091-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10091-- Scanning root segment: 0x4037000..0x403afff (16384)
--10091-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10091-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10091-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10091-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10091-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10091-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10091-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10091-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10091-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10091-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10091-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10091-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10091-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10091-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10091-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10091-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10091-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10091-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10091-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10091-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10091-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10091-- Scanning root segment: 0x701a000..0x701afff (4096)
--10091-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10091-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10091-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10091-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10091-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10091-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10091-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10091-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10091-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10091-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10091== Checked 4,806,920 bytes
==10091==
==10091== LEAK SUMMARY:
==10091== definitely lost: 2,197 bytes in 13 blocks
==10091== indirectly lost: 6,756 bytes in 7 blocks
==10091== possibly lost: 0 bytes in 0 blocks
==10091== still reachable: 3,119,734 bytes in 69,231 blocks
==10091== suppressed: 0 bytes in 0 blocks
==10091== Rerun with --leak-check=full to see details of leaked memory
==10091==
==10091== Use --track-origins=yes to see where uninitialised values come from
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10091==
==10091== 1 errors in context 1 of 2:
==10091== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10091== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10091== by 0x488CD0: stringsubst (subst.c:301)
==10091== by 0x48801B: prefork (subst.c:77)
==10091== by 0x42B318: execcmd (exec.c:2619)
==10091== by 0x428CA0: execpline2 (exec.c:1697)
==10091== by 0x427FD2: execpline (exec.c:1484)
==10091== by 0x427756: execlist (exec.c:1267)
==10091== by 0x42717C: execode (exec.c:1073)
==10091== by 0x431299: runshfunc (exec.c:5040)
==10091== by 0x430E76: doshfunc (exec.c:4920)
==10091== by 0x4302FB: execshfunc (exec.c:4557)
==10091== by 0x42D8C1: execcmd (exec.c:3373)
==10091==
==10091==
==10091== 2 errors in context 2 of 2:
==10091== Conditional jump or move depends on uninitialised value(s)
==10091== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10091== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10091== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10091== by 0x40EFC2: execbuiltin (builtin.c:450)
==10091== by 0x42D8E9: execcmd (exec.c:3378)
==10091== by 0x428CA0: execpline2 (exec.c:1697)
==10091== by 0x427FD2: execpline (exec.c:1484)
==10091== by 0x42779A: execlist (exec.c:1275)
==10091== by 0x42717C: execode (exec.c:1073)
==10091== by 0x431299: runshfunc (exec.c:5040)
==10091== by 0x430E76: doshfunc (exec.c:4920)
==10091== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10091==
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10092-by-pythonnut-on-???
==10092== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10092-by-pythonnut-on-???
==10092== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10092-by-pythonnut-on-???
==10092==
==10092== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10092== don't want to do, unless you know exactly what you're doing,
==10092== or are doing some strange experiment):
==10092== /usr/lib/valgrind/../../bin/vgdb --pid=10092 ...command...
==10092==
==10092== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10092== /path/to/gdb ./zsh
==10092== and then give GDB the following command
==10092== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10092
==10092== --pid is optional if only one valgrind process is running
==10092==
--10092-- Caught __NR_exit; running __libc_freeres()
--10092-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10092==
==10092== HEAP SUMMARY:
==10092== in use at exit: 3,124,847 bytes in 69,174 blocks
==10092== total heap usage: 1,595,297 allocs, 1,526,123 frees, 128,861,592 bytes allocated
==10092==
==10092== Searching for pointers to 69,174 not-freed blocks
--10092-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10092-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10092-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10092-- Scanning root segment: 0x4037000..0x403afff (16384)
--10092-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10092-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10092-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10092-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10092-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10092-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10092-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10092-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10092-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10092-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10092-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10092-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10092-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10092-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10092-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10092-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10092-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10092-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10092-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10092-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10092-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10092-- Scanning root segment: 0x701a000..0x701afff (4096)
--10092-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10092-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10092-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10092-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10092-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10092-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10092-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10092-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10092-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10092-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10092== Checked 4,800,528 bytes
==10092==
==10092== LEAK SUMMARY:
==10092== definitely lost: 2,197 bytes in 13 blocks
==10092== indirectly lost: 6,756 bytes in 7 blocks
==10092== possibly lost: 0 bytes in 0 blocks
==10092== still reachable: 3,115,894 bytes in 69,154 blocks
==10092== suppressed: 0 bytes in 0 blocks
==10092== Rerun with --leak-check=full to see details of leaked memory
==10092==
==10092== Use --track-origins=yes to see where uninitialised values come from
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092==
==10092== 1 errors in context 1 of 2:
==10092== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10092== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10092== by 0x488CD0: stringsubst (subst.c:301)
==10092== by 0x48801B: prefork (subst.c:77)
==10092== by 0x42B318: execcmd (exec.c:2619)
==10092== by 0x428CA0: execpline2 (exec.c:1697)
==10092== by 0x427FD2: execpline (exec.c:1484)
==10092== by 0x427756: execlist (exec.c:1267)
==10092== by 0x42717C: execode (exec.c:1073)
==10092== by 0x431299: runshfunc (exec.c:5040)
==10092== by 0x430E76: doshfunc (exec.c:4920)
==10092== by 0x4302FB: execshfunc (exec.c:4557)
==10092== by 0x42D8C1: execcmd (exec.c:3373)
==10092==
==10092==
==10092== 2 errors in context 2 of 2:
==10092== Conditional jump or move depends on uninitialised value(s)
==10092== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10092== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10092== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10092== by 0x40EFC2: execbuiltin (builtin.c:450)
==10092== by 0x42D8E9: execcmd (exec.c:3378)
==10092== by 0x428CA0: execpline2 (exec.c:1697)
==10092== by 0x427FD2: execpline (exec.c:1484)
==10092== by 0x42779A: execlist (exec.c:1275)
==10092== by 0x42717C: execode (exec.c:1073)
==10092== by 0x431299: runshfunc (exec.c:5040)
==10092== by 0x430E76: doshfunc (exec.c:4920)
==10092== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10092==
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10093-by-pythonnut-on-???
==10093== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10093-by-pythonnut-on-???
==10093== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10093-by-pythonnut-on-???
==10093==
==10093== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10093== don't want to do, unless you know exactly what you're doing,
==10093== or are doing some strange experiment):
==10093== /usr/lib/valgrind/../../bin/vgdb --pid=10093 ...command...
==10093==
==10093== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10093== /path/to/gdb ./zsh
==10093== and then give GDB the following command
==10093== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10093
==10093== --pid is optional if only one valgrind process is running
==10093==
--10093-- Caught __NR_exit; running __libc_freeres()
--10093-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10093==
==10093== HEAP SUMMARY:
==10093== in use at exit: 3,123,579 bytes in 69,168 blocks
==10093== total heap usage: 1,597,387 allocs, 1,528,219 frees, 128,978,445 bytes allocated
==10093==
==10093== Searching for pointers to 69,168 not-freed blocks
--10093-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10093-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10093-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10093-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10093-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10093-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10093-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10093-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10093-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10093-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10093-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10093-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10093-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10093-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10093-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10093-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10093-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10093-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10093-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10093-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10093-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10093-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10093-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10093-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10093-- Scanning root segment: 0x701a000..0x701afff (4096)
--10093-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10093-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10093-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10093-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10093-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10093-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10093-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10093-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10093-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10093-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10093== Checked 4,785,608 bytes
==10093==
==10093== LEAK SUMMARY:
==10093== definitely lost: 2,197 bytes in 13 blocks
==10093== indirectly lost: 6,756 bytes in 7 blocks
==10093== possibly lost: 0 bytes in 0 blocks
==10093== still reachable: 3,114,626 bytes in 69,148 blocks
==10093== suppressed: 0 bytes in 0 blocks
==10093== Rerun with --leak-check=full to see details of leaked memory
==10093==
==10093== Use --track-origins=yes to see where uninitialised values come from
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093==
==10093== 1 errors in context 1 of 2:
==10093== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10093== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10093== by 0x488CD0: stringsubst (subst.c:301)
==10093== by 0x48801B: prefork (subst.c:77)
==10093== by 0x42B318: execcmd (exec.c:2619)
==10093== by 0x428CA0: execpline2 (exec.c:1697)
==10093== by 0x427FD2: execpline (exec.c:1484)
==10093== by 0x427756: execlist (exec.c:1267)
==10093== by 0x42717C: execode (exec.c:1073)
==10093== by 0x431299: runshfunc (exec.c:5040)
==10093== by 0x430E76: doshfunc (exec.c:4920)
==10093== by 0x4302FB: execshfunc (exec.c:4557)
==10093== by 0x42D8C1: execcmd (exec.c:3373)
==10093==
==10093==
==10093== 2 errors in context 2 of 2:
==10093== Conditional jump or move depends on uninitialised value(s)
==10093== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10093== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10093== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10093== by 0x40EFC2: execbuiltin (builtin.c:450)
==10093== by 0x42D8E9: execcmd (exec.c:3378)
==10093== by 0x428CA0: execpline2 (exec.c:1697)
==10093== by 0x427FD2: execpline (exec.c:1484)
==10093== by 0x42779A: execlist (exec.c:1275)
==10093== by 0x42717C: execode (exec.c:1073)
==10093== by 0x431299: runshfunc (exec.c:5040)
==10093== by 0x430E76: doshfunc (exec.c:4920)
==10093== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10093==
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10094-- Caught __NR_exit; running __libc_freeres()
==10094== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10094-by-pythonnut-on-???
==10094== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10094-by-pythonnut-on-???
==10094== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10094-by-pythonnut-on-???
==10094==
==10094== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10094== don't want to do, unless you know exactly what you're doing,
==10094== or are doing some strange experiment):
==10094== /usr/lib/valgrind/../../bin/vgdb --pid=10094 ...command...
==10094==
==10094== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10094== /path/to/gdb ./zsh
==10094== and then give GDB the following command
==10094== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10094
==10094== --pid is optional if only one valgrind process is running
==10094==
--10094-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10094==
==10094== HEAP SUMMARY:
==10094== in use at exit: 3,123,643 bytes in 69,168 blocks
==10094== total heap usage: 1,597,393 allocs, 1,528,225 frees, 128,987,021 bytes allocated
==10094==
==10094== Searching for pointers to 69,168 not-freed blocks
--10094-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10094-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10094-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10094-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10094-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10094-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10094-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10094-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10094-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10094-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10094-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10094-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10094-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10094-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10094-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10094-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10094-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10094-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10094-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10094-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10094-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10094-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10094-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10094-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10094-- Scanning root segment: 0x701a000..0x701afff (4096)
--10094-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10094-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10094-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10094-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10094-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10094-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10094-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10094-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10094-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10094-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10094== Checked 4,787,704 bytes
==10094==
==10094== LEAK SUMMARY:
==10094== definitely lost: 2,197 bytes in 13 blocks
==10094== indirectly lost: 6,756 bytes in 7 blocks
==10094== possibly lost: 0 bytes in 0 blocks
==10094== still reachable: 3,114,690 bytes in 69,148 blocks
==10094== suppressed: 0 bytes in 0 blocks
==10094== Rerun with --leak-check=full to see details of leaked memory
==10094==
==10094== Use --track-origins=yes to see where uninitialised values come from
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10094==
==10094== 1 errors in context 1 of 2:
==10094== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10094== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10094== by 0x488CD0: stringsubst (subst.c:301)
==10094== by 0x48801B: prefork (subst.c:77)
==10094== by 0x42B318: execcmd (exec.c:2619)
==10094== by 0x428CA0: execpline2 (exec.c:1697)
==10094== by 0x427FD2: execpline (exec.c:1484)
==10094== by 0x427756: execlist (exec.c:1267)
==10094== by 0x42717C: execode (exec.c:1073)
==10094== by 0x431299: runshfunc (exec.c:5040)
==10094== by 0x430E76: doshfunc (exec.c:4920)
==10094== by 0x4302FB: execshfunc (exec.c:4557)
==10094== by 0x42D8C1: execcmd (exec.c:3373)
==10094==
==10094==
==10094== 2 errors in context 2 of 2:
==10094== Conditional jump or move depends on uninitialised value(s)
==10094== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10094== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10094== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10094== by 0x40EFC2: execbuiltin (builtin.c:450)
==10094== by 0x42D8E9: execcmd (exec.c:3378)
==10094== by 0x428CA0: execpline2 (exec.c:1697)
==10094== by 0x427FD2: execpline (exec.c:1484)
==10094== by 0x42779A: execlist (exec.c:1275)
==10094== by 0x42717C: execode (exec.c:1073)
==10094== by 0x431299: runshfunc (exec.c:5040)
==10094== by 0x430E76: doshfunc (exec.c:4920)
==10094== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10094==
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10095-by-pythonnut-on-???
==10095== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10095-by-pythonnut-on-???
==10095== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10095-by-pythonnut-on-???
==10095==
==10095== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10095== don't want to do, unless you know exactly what you're doing,
==10095== or are doing some strange experiment):
==10095== /usr/lib/valgrind/../../bin/vgdb --pid=10095 ...command...
==10095==
==10095== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10095== /path/to/gdb ./zsh
==10095== and then give GDB the following command
==10095== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10095
==10095== --pid is optional if only one valgrind process is running
==10095==
==10096== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10096-by-pythonnut-on-???
==10096== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10096-by-pythonnut-on-???
==10096== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10096-by-pythonnut-on-???
==10096==
==10096== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10096== don't want to do, unless you know exactly what you're doing,
==10096== or are doing some strange experiment):
==10096== /usr/lib/valgrind/../../bin/vgdb --pid=10096 ...command...
==10096==
==10096== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10096== /path/to/gdb ./zsh
==10096== and then give GDB the following command
==10096== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10096
==10096== --pid is optional if only one valgrind process is running
==10096==
==10097== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10097-by-pythonnut-on-???
==10097== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10097-by-pythonnut-on-???
==10097== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10097-by-pythonnut-on-???
==10097==
==10097== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10097== don't want to do, unless you know exactly what you're doing,
==10097== or are doing some strange experiment):
==10097== /usr/lib/valgrind/../../bin/vgdb --pid=10097 ...command...
==10097==
==10097== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10097== /path/to/gdb ./zsh
==10097== and then give GDB the following command
==10097== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10097
==10097== --pid is optional if only one valgrind process is running
==10097==
client request: code 4d430005, addr 0xFFEFE9C1C, len 4
--10097-- Caught __NR_exit; running __libc_freeres()
--10097-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10097==
==10097== HEAP SUMMARY:
==10097== in use at exit: 3,127,462 bytes in 69,235 blocks
==10097== total heap usage: 1,597,554 allocs, 1,528,319 frees, 129,016,345 bytes allocated
==10097==
==10097== Searching for pointers to 69,235 not-freed blocks
--10097-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10097-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10097-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10097-- Scanning root segment: 0x4037000..0x403afff (16384)
--10097-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10097-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10097-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10097-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10097-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10097-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10097-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10097-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10097-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10097-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10097-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10097-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10097-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10097-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10097-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10097-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10097-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10097-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10097-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10097-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10097-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10097-- Scanning root segment: 0x701a000..0x701afff (4096)
--10097-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10097-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10097-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10097-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10097-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10097-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10097-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10097-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10097-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10097-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10097== Checked 4,810,048 bytes
==10097==
==10097== LEAK SUMMARY:
==10097== definitely lost: 2,197 bytes in 13 blocks
==10097== indirectly lost: 6,756 bytes in 7 blocks
==10097== possibly lost: 0 bytes in 0 blocks
==10097== still reachable: 3,118,509 bytes in 69,215 blocks
==10097== suppressed: 0 bytes in 0 blocks
==10097== Rerun with --leak-check=full to see details of leaked memory
==10097==
==10097== Use --track-origins=yes to see where uninitialised values come from
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10097==
==10097== 1 errors in context 1 of 2:
==10097== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10097== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10097== by 0x488CD0: stringsubst (subst.c:301)
==10097== by 0x48801B: prefork (subst.c:77)
==10097== by 0x42B318: execcmd (exec.c:2619)
==10097== by 0x428CA0: execpline2 (exec.c:1697)
==10097== by 0x427FD2: execpline (exec.c:1484)
==10097== by 0x427756: execlist (exec.c:1267)
==10097== by 0x42717C: execode (exec.c:1073)
==10097== by 0x431299: runshfunc (exec.c:5040)
==10097== by 0x430E76: doshfunc (exec.c:4920)
==10097== by 0x4302FB: execshfunc (exec.c:4557)
==10097== by 0x42D8C1: execcmd (exec.c:3373)
==10097==
==10097==
==10097== 2 errors in context 2 of 2:
==10097== Conditional jump or move depends on uninitialised value(s)
==10097== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10097== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10097== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10097== by 0x40EFC2: execbuiltin (builtin.c:450)
==10097== by 0x42D8E9: execcmd (exec.c:3378)
==10097== by 0x428CA0: execpline2 (exec.c:1697)
==10097== by 0x427FD2: execpline (exec.c:1484)
==10097== by 0x42779A: execlist (exec.c:1275)
==10097== by 0x42717C: execode (exec.c:1073)
==10097== by 0x431299: runshfunc (exec.c:5040)
==10097== by 0x430E76: doshfunc (exec.c:4920)
==10097== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10097==
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10102-by-pythonnut-on-???
==10102== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10102-by-pythonnut-on-???
==10102== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10102-by-pythonnut-on-???
==10102==
==10102== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10102== don't want to do, unless you know exactly what you're doing,
==10102== or are doing some strange experiment):
==10102== /usr/lib/valgrind/../../bin/vgdb --pid=10102 ...command...
==10102==
==10102== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10102== /path/to/gdb ./zsh
==10102== and then give GDB the following command
==10102== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10102
==10102== --pid is optional if only one valgrind process is running
==10102==
--10102-- Caught __NR_exit; running __libc_freeres()
==10103== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10103-by-pythonnut-on-???
==10103== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10103-by-pythonnut-on-???
==10103== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10103-by-pythonnut-on-???
==10103==
==10103== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10103== don't want to do, unless you know exactly what you're doing,
==10103== or are doing some strange experiment):
==10103== /usr/lib/valgrind/../../bin/vgdb --pid=10103 ...command...
==10103==
==10103== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10103== /path/to/gdb ./zsh
==10103== and then give GDB the following command
==10103== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10103
==10103== --pid is optional if only one valgrind process is running
==10103==
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--10102-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10102==
==10102== HEAP SUMMARY:
==10102== in use at exit: 3,164,329 bytes in 69,242 blocks
==10102== total heap usage: 1,597,561 allocs, 1,528,319 frees, 129,056,268 bytes allocated
==10102==
==10102== Searching for pointers to 69,242 not-freed blocks
--10102-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10102-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10102-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10102-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10102-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10102-- Scanning root segment: 0x41d6000..0x41defff (36864)
--10102-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10102-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10102-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10102-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10102-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10102-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10102-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10102-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10102-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10102-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10102-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10102-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10102-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10102-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10102-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10102-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10102-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10102-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10102-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10102-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10102-- Scanning root segment: 0x701a000..0x701afff (4096)
--10102-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10102-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10102-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10102-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10102-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10102-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10102-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10102-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10102-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10102-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10102== Checked 4,921,864 bytes
==10102==
==10102== LEAK SUMMARY:
==10102== definitely lost: 2,197 bytes in 13 blocks
==10102== indirectly lost: 6,756 bytes in 7 blocks
==10102== possibly lost: 0 bytes in 0 blocks
==10102== still reachable: 3,155,376 bytes in 69,222 blocks
==10102== suppressed: 0 bytes in 0 blocks
==10102== Rerun with --leak-check=full to see details of leaked memory
==10102==
==10102== Use --track-origins=yes to see where uninitialised values come from
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102==
==10102== 1 errors in context 1 of 2:
==10102== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10102== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10102== by 0x488CD0: stringsubst (subst.c:301)
==10102== by 0x48801B: prefork (subst.c:77)
==10102== by 0x42B318: execcmd (exec.c:2619)
==10102== by 0x428CA0: execpline2 (exec.c:1697)
==10102== by 0x427FD2: execpline (exec.c:1484)
==10102== by 0x427756: execlist (exec.c:1267)
==10102== by 0x42717C: execode (exec.c:1073)
==10102== by 0x431299: runshfunc (exec.c:5040)
==10102== by 0x430E76: doshfunc (exec.c:4920)
==10102== by 0x4302FB: execshfunc (exec.c:4557)
==10102== by 0x42D8C1: execcmd (exec.c:3373)
==10102==
==10102==
==10102== 2 errors in context 2 of 2:
==10102== Conditional jump or move depends on uninitialised value(s)
==10102== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10102== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10102== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10102== by 0x40EFC2: execbuiltin (builtin.c:450)
==10102== by 0x42D8E9: execcmd (exec.c:3378)
==10102== by 0x428CA0: execpline2 (exec.c:1697)
==10102== by 0x427FD2: execpline (exec.c:1484)
==10102== by 0x42779A: execlist (exec.c:1275)
==10102== by 0x42717C: execode (exec.c:1073)
==10102== by 0x431299: runshfunc (exec.c:5040)
==10102== by 0x430E76: doshfunc (exec.c:4920)
==10102== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10102==
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10101-by-pythonnut-on-???
==10101== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10101-by-pythonnut-on-???
==10101== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10101-by-pythonnut-on-???
==10101==
==10101== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10101== don't want to do, unless you know exactly what you're doing,
==10101== or are doing some strange experiment):
==10101== /usr/lib/valgrind/../../bin/vgdb --pid=10101 ...command...
==10101==
==10101== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10101== /path/to/gdb ./zsh
==10101== and then give GDB the following command
==10101== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10101
==10101== --pid is optional if only one valgrind process is running
==10101==
--10101-- Caught __NR_exit; running __libc_freeres()
--10101-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10101==
==10101== HEAP SUMMARY:
==10101== in use at exit: 3,164,297 bytes in 69,239 blocks
==10101== total heap usage: 1,597,564 allocs, 1,528,325 frees, 129,056,876 bytes allocated
==10101==
==10101== Searching for pointers to 69,239 not-freed blocks
--10101-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10101-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10101-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10101-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10101-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10101-- Scanning root segment: 0x41d6000..0x41defff (36864)
--10101-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10101-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10101-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10101-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10101-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10101-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10101-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10101-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10101-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10101-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10101-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10101-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10101-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10101-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10101-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10101-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10101-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10101-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10101-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10101-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10101-- Scanning root segment: 0x701a000..0x701afff (4096)
--10101-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10101-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10101-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10101-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10101-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10101-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10101-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10101-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10101-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10101-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10101== Checked 4,921,192 bytes
==10101==
==10101== LEAK SUMMARY:
==10101== definitely lost: 2,197 bytes in 13 blocks
==10101== indirectly lost: 6,756 bytes in 7 blocks
==10101== possibly lost: 0 bytes in 0 blocks
==10101== still reachable: 3,155,344 bytes in 69,219 blocks
==10101== suppressed: 0 bytes in 0 blocks
==10101== Rerun with --leak-check=full to see details of leaked memory
==10101==
==10101== Use --track-origins=yes to see where uninitialised values come from
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101==
==10101== 1 errors in context 1 of 2:
==10101== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10101== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10101== by 0x488CD0: stringsubst (subst.c:301)
==10101== by 0x48801B: prefork (subst.c:77)
==10101== by 0x42B318: execcmd (exec.c:2619)
==10101== by 0x428CA0: execpline2 (exec.c:1697)
==10101== by 0x427FD2: execpline (exec.c:1484)
==10101== by 0x427756: execlist (exec.c:1267)
==10101== by 0x42717C: execode (exec.c:1073)
==10101== by 0x431299: runshfunc (exec.c:5040)
==10101== by 0x430E76: doshfunc (exec.c:4920)
==10101== by 0x4302FB: execshfunc (exec.c:4557)
==10101== by 0x42D8C1: execcmd (exec.c:3373)
==10101==
==10101==
==10101== 2 errors in context 2 of 2:
==10101== Conditional jump or move depends on uninitialised value(s)
==10101== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10101== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10101== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10101== by 0x40EFC2: execbuiltin (builtin.c:450)
==10101== by 0x42D8E9: execcmd (exec.c:3378)
==10101== by 0x428CA0: execpline2 (exec.c:1697)
==10101== by 0x427FD2: execpline (exec.c:1484)
==10101== by 0x42779A: execlist (exec.c:1275)
==10101== by 0x42717C: execode (exec.c:1073)
==10101== by 0x431299: runshfunc (exec.c:5040)
==10101== by 0x430E76: doshfunc (exec.c:4920)
==10101== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10101==
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10104-by-pythonnut-on-???
==10104== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10104-by-pythonnut-on-???
==10104== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10104-by-pythonnut-on-???
==10104==
==10104== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10104== don't want to do, unless you know exactly what you're doing,
==10104== or are doing some strange experiment):
==10104== /usr/lib/valgrind/../../bin/vgdb --pid=10104 ...command...
==10104==
==10104== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10104== /path/to/gdb ./zsh
==10104== and then give GDB the following command
==10104== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10104
==10104== --pid is optional if only one valgrind process is running
==10104==
==10105== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10105-by-pythonnut-on-???
==10105== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10105-by-pythonnut-on-???
==10105== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10105-by-pythonnut-on-???
==10105==
==10105== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10105== don't want to do, unless you know exactly what you're doing,
==10105== or are doing some strange experiment):
==10105== /usr/lib/valgrind/../../bin/vgdb --pid=10105 ...command...
==10105==
==10105== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10105== /path/to/gdb ./zsh
==10105== and then give GDB the following command
==10105== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10105
==10105== --pid is optional if only one valgrind process is running
==10105==
--10105-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA81C, len 4
--10105-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10105==
==10105== HEAP SUMMARY:
==10105== in use at exit: 3,201,015 bytes in 69,245 blocks
==10105== total heap usage: 1,597,570 allocs, 1,528,325 frees, 129,095,111 bytes allocated
==10105==
==10105== Searching for pointers to 69,245 not-freed blocks
--10105-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10105-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10105-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10105-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10105-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10105-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10105-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10105-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10105-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10105-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10105-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10105-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10105-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10105-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10105-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10105-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10105-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10105-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10105-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10105-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10105-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10105-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10105-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10105-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10105-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10105-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10105-- Scanning root segment: 0x701a000..0x701afff (4096)
--10105-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10105-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10105-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10105-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10105-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10105-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10105-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10105-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10105-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10105-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10105== Checked 4,995,392 bytes
==10105==
==10105== LEAK SUMMARY:
==10105== definitely lost: 2,197 bytes in 13 blocks
==10105== indirectly lost: 6,756 bytes in 7 blocks
==10105== possibly lost: 0 bytes in 0 blocks
==10105== still reachable: 3,192,062 bytes in 69,225 blocks
==10105== suppressed: 0 bytes in 0 blocks
==10105== Rerun with --leak-check=full to see details of leaked memory
==10105==
==10105== Use --track-origins=yes to see where uninitialised values come from
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10105==
==10105== 1 errors in context 1 of 2:
==10105== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10105== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10105== by 0x488CD0: stringsubst (subst.c:301)
==10105== by 0x48801B: prefork (subst.c:77)
==10105== by 0x42B318: execcmd (exec.c:2619)
==10105== by 0x428CA0: execpline2 (exec.c:1697)
==10105== by 0x427FD2: execpline (exec.c:1484)
==10105== by 0x427756: execlist (exec.c:1267)
==10105== by 0x42717C: execode (exec.c:1073)
==10105== by 0x431299: runshfunc (exec.c:5040)
==10105== by 0x430E76: doshfunc (exec.c:4920)
==10105== by 0x4302FB: execshfunc (exec.c:4557)
==10105== by 0x42D8C1: execcmd (exec.c:3373)
==10105==
==10105==
==10105== 2 errors in context 2 of 2:
==10105== Conditional jump or move depends on uninitialised value(s)
==10105== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10105== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10105== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10105== by 0x40EFC2: execbuiltin (builtin.c:450)
==10105== by 0x42D8E9: execcmd (exec.c:3378)
==10105== by 0x428CA0: execpline2 (exec.c:1697)
==10105== by 0x427FD2: execpline (exec.c:1484)
==10105== by 0x42779A: execlist (exec.c:1275)
==10105== by 0x42717C: execode (exec.c:1073)
==10105== by 0x431299: runshfunc (exec.c:5040)
==10105== by 0x430E76: doshfunc (exec.c:4920)
==10105== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10105==
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10104-- Caught __NR_exit; running __libc_freeres()
--10104-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10104==
==10104== HEAP SUMMARY:
==10104== in use at exit: 3,164,375 bytes in 69,242 blocks
==10104== total heap usage: 1,597,573 allocs, 1,528,331 frees, 129,095,687 bytes allocated
==10104==
==10104== Searching for pointers to 69,242 not-freed blocks
--10104-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10104-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10104-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10104-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10104-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10104-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10104-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10104-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10104-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10104-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10104-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10104-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10104-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10104-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10104-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10104-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10104-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10104-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10104-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10104-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10104-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10104-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10104-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10104-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10104-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10104-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10104-- Scanning root segment: 0x701a000..0x701afff (4096)
--10104-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10104-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10104-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10104-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10104-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10104-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10104-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10104-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10104-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10104-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10104== Checked 4,958,136 bytes
==10104==
==10104== LEAK SUMMARY:
==10104== definitely lost: 2,197 bytes in 13 blocks
==10104== indirectly lost: 6,756 bytes in 7 blocks
==10104== possibly lost: 0 bytes in 0 blocks
==10104== still reachable: 3,155,422 bytes in 69,222 blocks
==10104== suppressed: 0 bytes in 0 blocks
==10104== Rerun with --leak-check=full to see details of leaked memory
==10104==
==10104== Use --track-origins=yes to see where uninitialised values come from
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104==
==10104== 1 errors in context 1 of 2:
==10104== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10104== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10104== by 0x488CD0: stringsubst (subst.c:301)
==10104== by 0x48801B: prefork (subst.c:77)
==10104== by 0x42B318: execcmd (exec.c:2619)
==10104== by 0x428CA0: execpline2 (exec.c:1697)
==10104== by 0x427FD2: execpline (exec.c:1484)
==10104== by 0x427756: execlist (exec.c:1267)
==10104== by 0x42717C: execode (exec.c:1073)
==10104== by 0x431299: runshfunc (exec.c:5040)
==10104== by 0x430E76: doshfunc (exec.c:4920)
==10104== by 0x4302FB: execshfunc (exec.c:4557)
==10104== by 0x42D8C1: execcmd (exec.c:3373)
==10104==
==10104==
==10104== 2 errors in context 2 of 2:
==10104== Conditional jump or move depends on uninitialised value(s)
==10104== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10104== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10104== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10104== by 0x40EFC2: execbuiltin (builtin.c:450)
==10104== by 0x42D8E9: execcmd (exec.c:3378)
==10104== by 0x428CA0: execpline2 (exec.c:1697)
==10104== by 0x427FD2: execpline (exec.c:1484)
==10104== by 0x42779A: execlist (exec.c:1275)
==10104== by 0x42717C: execode (exec.c:1073)
==10104== by 0x431299: runshfunc (exec.c:5040)
==10104== by 0x430E76: doshfunc (exec.c:4920)
==10104== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10104==
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10107-by-pythonnut-on-???
==10107== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10107-by-pythonnut-on-???
==10107== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10107-by-pythonnut-on-???
==10107==
==10107== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10107== don't want to do, unless you know exactly what you're doing,
==10107== or are doing some strange experiment):
==10107== /usr/lib/valgrind/../../bin/vgdb --pid=10107 ...command...
==10107==
==10107== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10107== /path/to/gdb ./zsh
==10107== and then give GDB the following command
==10107== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10107
==10107== --pid is optional if only one valgrind process is running
==10107==
==10108== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10108-by-pythonnut-on-???
==10108== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10108-by-pythonnut-on-???
==10108== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10108-by-pythonnut-on-???
==10108==
==10108== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10108== don't want to do, unless you know exactly what you're doing,
==10108== or are doing some strange experiment):
==10108== /usr/lib/valgrind/../../bin/vgdb --pid=10108 ...command...
==10108==
==10108== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10108== /path/to/gdb ./zsh
==10108== and then give GDB the following command
==10108== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10108
==10108== --pid is optional if only one valgrind process is running
==10108==
--10108-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEA64C, len 4
--10108-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10108==
==10108== HEAP SUMMARY:
==10108== in use at exit: 3,201,101 bytes in 69,248 blocks
==10108== total heap usage: 1,597,583 allocs, 1,528,335 frees, 129,100,397 bytes allocated
==10108==
==10108== Searching for pointers to 69,248 not-freed blocks
--10108-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10108-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10108-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10108-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10108-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10108-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10108-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10108-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10108-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10108-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10108-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10108-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10108-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10108-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10108-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10108-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10108-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10108-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10108-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10108-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10108-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10108-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10108-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10108-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10108-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10108-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10108-- Scanning root segment: 0x701a000..0x701afff (4096)
--10108-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10108-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10108-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10108-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10108-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10108-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10108-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10108-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10108-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10108-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10108== Checked 4,995,744 bytes
==10108==
==10108== LEAK SUMMARY:
==10108== definitely lost: 2,197 bytes in 13 blocks
==10108== indirectly lost: 6,756 bytes in 7 blocks
==10108== possibly lost: 0 bytes in 0 blocks
==10108== still reachable: 3,192,148 bytes in 69,228 blocks
==10108== suppressed: 0 bytes in 0 blocks
==10108== Rerun with --leak-check=full to see details of leaked memory
==10108==
==10108== Use --track-origins=yes to see where uninitialised values come from
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10108==
==10108== 1 errors in context 1 of 2:
==10108== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10108== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10108== by 0x488CD0: stringsubst (subst.c:301)
==10108== by 0x48801B: prefork (subst.c:77)
==10108== by 0x42B318: execcmd (exec.c:2619)
==10108== by 0x428CA0: execpline2 (exec.c:1697)
==10108== by 0x427FD2: execpline (exec.c:1484)
==10108== by 0x427756: execlist (exec.c:1267)
==10108== by 0x42717C: execode (exec.c:1073)
==10108== by 0x431299: runshfunc (exec.c:5040)
==10108== by 0x430E76: doshfunc (exec.c:4920)
==10108== by 0x4302FB: execshfunc (exec.c:4557)
==10108== by 0x42D8C1: execcmd (exec.c:3373)
==10108==
==10108==
==10108== 2 errors in context 2 of 2:
==10108== Conditional jump or move depends on uninitialised value(s)
==10108== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10108== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10108== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10108== by 0x40EFC2: execbuiltin (builtin.c:450)
==10108== by 0x42D8E9: execcmd (exec.c:3378)
==10108== by 0x428CA0: execpline2 (exec.c:1697)
==10108== by 0x427FD2: execpline (exec.c:1484)
==10108== by 0x42779A: execlist (exec.c:1275)
==10108== by 0x42717C: execode (exec.c:1073)
==10108== by 0x431299: runshfunc (exec.c:5040)
==10108== by 0x430E76: doshfunc (exec.c:4920)
==10108== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10108==
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10107-- Caught __NR_exit; running __libc_freeres()
--10107-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10107==
==10107== HEAP SUMMARY:
==10107== in use at exit: 3,164,461 bytes in 69,245 blocks
==10107== total heap usage: 1,597,586 allocs, 1,528,341 frees, 129,100,973 bytes allocated
==10107==
==10107== Searching for pointers to 69,245 not-freed blocks
--10107-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10107-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10107-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10107-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10107-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10107-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10107-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10107-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10107-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10107-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10107-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10107-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10107-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10107-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10107-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10107-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10107-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10107-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10107-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10107-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10107-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10107-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10107-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10107-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10107-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10107-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10107-- Scanning root segment: 0x701a000..0x701afff (4096)
--10107-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10107-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10107-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10107-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10107-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10107-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10107-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10107-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10107-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10107-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10107== Checked 4,958,488 bytes
==10107==
==10107== LEAK SUMMARY:
==10107== definitely lost: 2,197 bytes in 13 blocks
==10107== indirectly lost: 6,756 bytes in 7 blocks
==10107== possibly lost: 0 bytes in 0 blocks
==10107== still reachable: 3,155,508 bytes in 69,225 blocks
==10107== suppressed: 0 bytes in 0 blocks
==10107== Rerun with --leak-check=full to see details of leaked memory
==10107==
==10107== Use --track-origins=yes to see where uninitialised values come from
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107==
==10107== 1 errors in context 1 of 2:
==10107== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10107== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10107== by 0x488CD0: stringsubst (subst.c:301)
==10107== by 0x48801B: prefork (subst.c:77)
==10107== by 0x42B318: execcmd (exec.c:2619)
==10107== by 0x428CA0: execpline2 (exec.c:1697)
==10107== by 0x427FD2: execpline (exec.c:1484)
==10107== by 0x427756: execlist (exec.c:1267)
==10107== by 0x42717C: execode (exec.c:1073)
==10107== by 0x431299: runshfunc (exec.c:5040)
==10107== by 0x430E76: doshfunc (exec.c:4920)
==10107== by 0x4302FB: execshfunc (exec.c:4557)
==10107== by 0x42D8C1: execcmd (exec.c:3373)
==10107==
==10107==
==10107== 2 errors in context 2 of 2:
==10107== Conditional jump or move depends on uninitialised value(s)
==10107== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10107== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10107== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10107== by 0x40EFC2: execbuiltin (builtin.c:450)
==10107== by 0x42D8E9: execcmd (exec.c:3378)
==10107== by 0x428CA0: execpline2 (exec.c:1697)
==10107== by 0x427FD2: execpline (exec.c:1484)
==10107== by 0x42779A: execlist (exec.c:1275)
==10107== by 0x42717C: execode (exec.c:1073)
==10107== by 0x431299: runshfunc (exec.c:5040)
==10107== by 0x430E76: doshfunc (exec.c:4920)
==10107== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10107==
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10112-by-pythonnut-on-???
==10112== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10112-by-pythonnut-on-???
==10112== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10112-by-pythonnut-on-???
==10112==
==10112== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10112== don't want to do, unless you know exactly what you're doing,
==10112== or are doing some strange experiment):
==10112== /usr/lib/valgrind/../../bin/vgdb --pid=10112 ...command...
==10112==
==10112== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10112== /path/to/gdb ./zsh
==10112== and then give GDB the following command
==10112== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10112
==10112== --pid is optional if only one valgrind process is running
==10112==
--10113-- Caught __NR_exit; running __libc_freeres()
==10113== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10113-by-pythonnut-on-???
==10113== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10113-by-pythonnut-on-???
==10113== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10113-by-pythonnut-on-???
==10113==
==10113== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10113== don't want to do, unless you know exactly what you're doing,
==10113== or are doing some strange experiment):
==10113== /usr/lib/valgrind/../../bin/vgdb --pid=10113 ...command...
==10113==
==10113== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10113== /path/to/gdb ./zsh
==10113== and then give GDB the following command
==10113== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10113
==10113== --pid is optional if only one valgrind process is running
==10113==
client request: code 4d430005, addr 0xFFEFE9B1C, len 4
--10113-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10113==
==10113== HEAP SUMMARY:
==10113== in use at exit: 3,164,525 bytes in 69,248 blocks
==10113== total heap usage: 1,597,596 allocs, 1,528,348 frees, 129,070,534 bytes allocated
==10113==
==10113== Searching for pointers to 69,248 not-freed blocks
--10113-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10113-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10113-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10113-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10113-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10113-- Scanning root segment: 0x41d6000..0x41defff (36864)
--10113-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10113-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10113-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10113-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10113-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10113-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10113-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10113-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10113-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10113-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10113-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10113-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10113-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10113-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10113-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10113-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10113-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10113-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10113-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10113-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10113-- Scanning root segment: 0x701a000..0x701afff (4096)
--10113-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10113-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10113-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10113-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10113-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10113-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10113-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10113-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10113-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10113-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10113== Checked 4,923,136 bytes
==10113==
==10113== LEAK SUMMARY:
==10113== definitely lost: 2,197 bytes in 13 blocks
==10113== indirectly lost: 6,756 bytes in 7 blocks
==10113== possibly lost: 0 bytes in 0 blocks
==10113== still reachable: 3,155,572 bytes in 69,228 blocks
==10113== suppressed: 0 bytes in 0 blocks
==10113== Rerun with --leak-check=full to see details of leaked memory
==10113==
==10113== Use --track-origins=yes to see where uninitialised values come from
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10113==
==10113== 1 errors in context 1 of 2:
==10113== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10113== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10113== by 0x488CD0: stringsubst (subst.c:301)
==10113== by 0x48801B: prefork (subst.c:77)
==10113== by 0x42B318: execcmd (exec.c:2619)
==10113== by 0x428CA0: execpline2 (exec.c:1697)
==10113== by 0x427FD2: execpline (exec.c:1484)
==10113== by 0x427756: execlist (exec.c:1267)
==10113== by 0x42717C: execode (exec.c:1073)
==10113== by 0x431299: runshfunc (exec.c:5040)
==10113== by 0x430E76: doshfunc (exec.c:4920)
==10113== by 0x4302FB: execshfunc (exec.c:4557)
==10113== by 0x42D8C1: execcmd (exec.c:3373)
==10113==
==10113==
==10113== 2 errors in context 2 of 2:
==10113== Conditional jump or move depends on uninitialised value(s)
==10113== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10113== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10113== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10113== by 0x40EFC2: execbuiltin (builtin.c:450)
==10113== by 0x42D8E9: execcmd (exec.c:3378)
==10113== by 0x428CA0: execpline2 (exec.c:1697)
==10113== by 0x427FD2: execpline (exec.c:1484)
==10113== by 0x42779A: execlist (exec.c:1275)
==10113== by 0x42717C: execode (exec.c:1073)
==10113== by 0x431299: runshfunc (exec.c:5040)
==10113== by 0x430E76: doshfunc (exec.c:4920)
==10113== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10113==
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10112-- Caught __NR_exit; running __libc_freeres()
--10112-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10112==
==10112== HEAP SUMMARY:
==10112== in use at exit: 3,164,557 bytes in 69,245 blocks
==10112== total heap usage: 1,597,599 allocs, 1,528,354 frees, 129,071,206 bytes allocated
==10112==
==10112== Searching for pointers to 69,245 not-freed blocks
--10112-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10112-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10112-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10112-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10112-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10112-- Scanning root segment: 0x41d6000..0x41defff (36864)
--10112-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10112-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10112-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10112-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10112-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10112-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10112-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10112-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10112-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10112-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10112-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10112-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10112-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10112-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10112-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10112-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10112-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10112-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10112-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10112-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10112-- Scanning root segment: 0x701a000..0x701afff (4096)
--10112-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10112-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10112-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10112-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10112-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10112-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10112-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10112-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10112-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10112-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10112== Checked 4,922,520 bytes
==10112==
==10112== LEAK SUMMARY:
==10112== definitely lost: 2,197 bytes in 13 blocks
==10112== indirectly lost: 6,756 bytes in 7 blocks
==10112== possibly lost: 0 bytes in 0 blocks
==10112== still reachable: 3,155,604 bytes in 69,225 blocks
==10112== suppressed: 0 bytes in 0 blocks
==10112== Rerun with --leak-check=full to see details of leaked memory
==10112==
==10112== Use --track-origins=yes to see where uninitialised values come from
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112==
==10112== 1 errors in context 1 of 2:
==10112== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10112== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10112== by 0x488CD0: stringsubst (subst.c:301)
==10112== by 0x48801B: prefork (subst.c:77)
==10112== by 0x42B318: execcmd (exec.c:2619)
==10112== by 0x428CA0: execpline2 (exec.c:1697)
==10112== by 0x427FD2: execpline (exec.c:1484)
==10112== by 0x427756: execlist (exec.c:1267)
==10112== by 0x42717C: execode (exec.c:1073)
==10112== by 0x431299: runshfunc (exec.c:5040)
==10112== by 0x430E76: doshfunc (exec.c:4920)
==10112== by 0x4302FB: execshfunc (exec.c:4557)
==10112== by 0x42D8C1: execcmd (exec.c:3373)
==10112==
==10112==
==10112== 2 errors in context 2 of 2:
==10112== Conditional jump or move depends on uninitialised value(s)
==10112== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10112== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10112== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10112== by 0x40EFC2: execbuiltin (builtin.c:450)
==10112== by 0x42D8E9: execcmd (exec.c:3378)
==10112== by 0x428CA0: execpline2 (exec.c:1697)
==10112== by 0x427FD2: execpline (exec.c:1484)
==10112== by 0x42779A: execlist (exec.c:1275)
==10112== by 0x42717C: execode (exec.c:1073)
==10112== by 0x431299: runshfunc (exec.c:5040)
==10112== by 0x430E76: doshfunc (exec.c:4920)
==10112== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10112==
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10115-by-pythonnut-on-???
==10115== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10115-by-pythonnut-on-???
==10115== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10115-by-pythonnut-on-???
==10115==
==10115== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10115== don't want to do, unless you know exactly what you're doing,
==10115== or are doing some strange experiment):
==10115== /usr/lib/valgrind/../../bin/vgdb --pid=10115 ...command...
==10115==
==10115== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10115== /path/to/gdb ./zsh
==10115== and then give GDB the following command
==10115== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10115
==10115== --pid is optional if only one valgrind process is running
==10115==
==10116== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10116-by-pythonnut-on-???
==10116== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10116-by-pythonnut-on-???
==10116== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10116-by-pythonnut-on-???
==10116==
==10116== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10116== don't want to do, unless you know exactly what you're doing,
==10116== or are doing some strange experiment):
==10116== /usr/lib/valgrind/../../bin/vgdb --pid=10116 ...command...
==10116==
==10116== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10116== /path/to/gdb ./zsh
==10116== and then give GDB the following command
==10116== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10116
==10116== --pid is optional if only one valgrind process is running
==10116==
--10116-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFE9FCC, len 4
--10116-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10116==
==10116== HEAP SUMMARY:
==10116== in use at exit: 3,201,301 bytes in 69,251 blocks
==10116== total heap usage: 1,597,606 allocs, 1,528,355 frees, 129,109,679 bytes allocated
==10116==
==10116== Searching for pointers to 69,251 not-freed blocks
--10116-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10116-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10116-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10116-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10116-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10116-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10116-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10116-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10116-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10116-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10116-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10116-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10116-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10116-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10116-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10116-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10116-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10116-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10116-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10116-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10116-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10116-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10116-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10116-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10116-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10116-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10116-- Scanning root segment: 0x701a000..0x701afff (4096)
--10116-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10116-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10116-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10116-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10116-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10116-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10116-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10116-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10116-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10116-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10116== Checked 4,996,480 bytes
==10116==
==10116== LEAK SUMMARY:
==10116== definitely lost: 2,197 bytes in 13 blocks
==10116== indirectly lost: 6,756 bytes in 7 blocks
==10116== possibly lost: 0 bytes in 0 blocks
==10116== still reachable: 3,192,348 bytes in 69,231 blocks
==10116== suppressed: 0 bytes in 0 blocks
==10116== Rerun with --leak-check=full to see details of leaked memory
==10116==
==10116== Use --track-origins=yes to see where uninitialised values come from
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10116==
==10116== 1 errors in context 1 of 2:
==10116== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10116== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10116== by 0x488CD0: stringsubst (subst.c:301)
==10116== by 0x48801B: prefork (subst.c:77)
==10116== by 0x42B318: execcmd (exec.c:2619)
==10116== by 0x428CA0: execpline2 (exec.c:1697)
==10116== by 0x427FD2: execpline (exec.c:1484)
==10116== by 0x427756: execlist (exec.c:1267)
==10116== by 0x42717C: execode (exec.c:1073)
==10116== by 0x431299: runshfunc (exec.c:5040)
==10116== by 0x430E76: doshfunc (exec.c:4920)
==10116== by 0x4302FB: execshfunc (exec.c:4557)
==10116== by 0x42D8C1: execcmd (exec.c:3373)
==10116==
==10116==
==10116== 2 errors in context 2 of 2:
==10116== Conditional jump or move depends on uninitialised value(s)
==10116== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10116== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10116== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10116== by 0x40EFC2: execbuiltin (builtin.c:450)
==10116== by 0x42D8E9: execcmd (exec.c:3378)
==10116== by 0x428CA0: execpline2 (exec.c:1697)
==10116== by 0x427FD2: execpline (exec.c:1484)
==10116== by 0x42779A: execlist (exec.c:1275)
==10116== by 0x42717C: execode (exec.c:1073)
==10116== by 0x431299: runshfunc (exec.c:5040)
==10116== by 0x430E76: doshfunc (exec.c:4920)
==10116== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10116==
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10115-- Caught __NR_exit; running __libc_freeres()
--10115-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10115==
==10115== HEAP SUMMARY:
==10115== in use at exit: 3,164,757 bytes in 69,248 blocks
==10115== total heap usage: 1,597,609 allocs, 1,528,361 frees, 129,110,351 bytes allocated
==10115==
==10115== Searching for pointers to 69,248 not-freed blocks
--10115-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10115-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10115-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10115-- Scanning root segment: 0x4037000..0x4043fff (53248)
--10115-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10115-- Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10115-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10115-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10115-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10115-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10115-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10115-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10115-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10115-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10115-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10115-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10115-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10115-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10115-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10115-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10115-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10115-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10115-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10115-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10115-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10115-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10115-- Scanning root segment: 0x701a000..0x701afff (4096)
--10115-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10115-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10115-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10115-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10115-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10115-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10115-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10115-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10115-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10115-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10115== Checked 4,959,304 bytes
==10115==
==10115== LEAK SUMMARY:
==10115== definitely lost: 2,197 bytes in 13 blocks
==10115== indirectly lost: 6,756 bytes in 7 blocks
==10115== possibly lost: 0 bytes in 0 blocks
==10115== still reachable: 3,155,804 bytes in 69,228 blocks
==10115== suppressed: 0 bytes in 0 blocks
==10115== Rerun with --leak-check=full to see details of leaked memory
==10115==
==10115== Use --track-origins=yes to see where uninitialised values come from
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115==
==10115== 1 errors in context 1 of 2:
==10115== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10115== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10115== by 0x488CD0: stringsubst (subst.c:301)
==10115== by 0x48801B: prefork (subst.c:77)
==10115== by 0x42B318: execcmd (exec.c:2619)
==10115== by 0x428CA0: execpline2 (exec.c:1697)
==10115== by 0x427FD2: execpline (exec.c:1484)
==10115== by 0x427756: execlist (exec.c:1267)
==10115== by 0x42717C: execode (exec.c:1073)
==10115== by 0x431299: runshfunc (exec.c:5040)
==10115== by 0x430E76: doshfunc (exec.c:4920)
==10115== by 0x4302FB: execshfunc (exec.c:4557)
==10115== by 0x42D8C1: execcmd (exec.c:3373)
==10115==
==10115==
==10115== 2 errors in context 2 of 2:
==10115== Conditional jump or move depends on uninitialised value(s)
==10115== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10115== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10115== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10115== by 0x40EFC2: execbuiltin (builtin.c:450)
==10115== by 0x42D8E9: execcmd (exec.c:3378)
==10115== by 0x428CA0: execpline2 (exec.c:1697)
==10115== by 0x427FD2: execpline (exec.c:1484)
==10115== by 0x42779A: execlist (exec.c:1275)
==10115== by 0x42717C: execode (exec.c:1073)
==10115== by 0x431299: runshfunc (exec.c:5040)
==10115== by 0x430E76: doshfunc (exec.c:4920)
==10115== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10115==
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10096-- Caught __NR_exit; running __libc_freeres()
--10096-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10096==
==10096== HEAP SUMMARY:
==10096== in use at exit: 3,127,063 bytes in 69,225 blocks
==10096== total heap usage: 1,597,615 allocs, 1,528,390 frees, 129,078,241 bytes allocated
==10096==
==10096== Searching for pointers to 69,225 not-freed blocks
--10096-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10096-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10096-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10096-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10096-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10096-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10096-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10096-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10096-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10096-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10096-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10096-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10096-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10096-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10096-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10096-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10096-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10096-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10096-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10096-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10096-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10096-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10096-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10096-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10096-- Scanning root segment: 0x701a000..0x701afff (4096)
--10096-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10096-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10096-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10096-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10096-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10096-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10096-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10096-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10096-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10096-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10096== Checked 4,791,208 bytes
==10096==
==10096== LEAK SUMMARY:
==10096== definitely lost: 2,197 bytes in 13 blocks
==10096== indirectly lost: 6,756 bytes in 7 blocks
==10096== possibly lost: 0 bytes in 0 blocks
==10096== still reachable: 3,118,110 bytes in 69,205 blocks
==10096== suppressed: 0 bytes in 0 blocks
==10096== Rerun with --leak-check=full to see details of leaked memory
==10096==
==10096== Use --track-origins=yes to see where uninitialised values come from
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10096==
==10096== 1 errors in context 1 of 2:
==10096== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10096== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10096== by 0x488CD0: stringsubst (subst.c:301)
==10096== by 0x48801B: prefork (subst.c:77)
==10096== by 0x42B318: execcmd (exec.c:2619)
==10096== by 0x428CA0: execpline2 (exec.c:1697)
==10096== by 0x427FD2: execpline (exec.c:1484)
==10096== by 0x427756: execlist (exec.c:1267)
==10096== by 0x42717C: execode (exec.c:1073)
==10096== by 0x431299: runshfunc (exec.c:5040)
==10096== by 0x430E76: doshfunc (exec.c:4920)
==10096== by 0x4302FB: execshfunc (exec.c:4557)
==10096== by 0x42D8C1: execcmd (exec.c:3373)
==10096==
==10096==
==10096== 2 errors in context 2 of 2:
==10096== Conditional jump or move depends on uninitialised value(s)
==10096== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10096== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10096== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10096== by 0x40EFC2: execbuiltin (builtin.c:450)
==10096== by 0x42D8E9: execcmd (exec.c:3378)
==10096== by 0x428CA0: execpline2 (exec.c:1697)
==10096== by 0x427FD2: execpline (exec.c:1484)
==10096== by 0x42779A: execlist (exec.c:1275)
==10096== by 0x42717C: execode (exec.c:1073)
==10096== by 0x431299: runshfunc (exec.c:5040)
==10096== by 0x430E76: doshfunc (exec.c:4920)
==10096== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10096==
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10095-- Caught __NR_exit; running __libc_freeres()
--10095-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10095==
==10095== HEAP SUMMARY:
==10095== in use at exit: 3,125,647 bytes in 69,187 blocks
==10095== total heap usage: 1,597,514 allocs, 1,528,327 frees, 129,006,363 bytes allocated
==10095==
==10095== Searching for pointers to 69,187 not-freed blocks
--10095-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10095-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10095-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10095-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10095-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10095-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10095-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10095-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10095-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10095-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10095-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10095-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10095-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10095-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10095-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10095-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10095-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10095-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10095-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10095-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10095-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10095-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10095-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10095-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10095-- Scanning root segment: 0x701a000..0x701afff (4096)
--10095-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10095-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10095-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10095-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10095-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10095-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10095-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10095-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10095-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10095-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10095== Checked 4,788,048 bytes
==10095==
==10095== LEAK SUMMARY:
==10095== definitely lost: 2,197 bytes in 13 blocks
==10095== indirectly lost: 6,756 bytes in 7 blocks
==10095== possibly lost: 0 bytes in 0 blocks
==10095== still reachable: 3,116,694 bytes in 69,167 blocks
==10095== suppressed: 0 bytes in 0 blocks
==10095== Rerun with --leak-check=full to see details of leaked memory
==10095==
==10095== Use --track-origins=yes to see where uninitialised values come from
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095==
==10095== 1 errors in context 1 of 2:
==10095== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10095== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10095== by 0x488CD0: stringsubst (subst.c:301)
==10095== by 0x48801B: prefork (subst.c:77)
==10095== by 0x42B318: execcmd (exec.c:2619)
==10095== by 0x428CA0: execpline2 (exec.c:1697)
==10095== by 0x427FD2: execpline (exec.c:1484)
==10095== by 0x427756: execlist (exec.c:1267)
==10095== by 0x42717C: execode (exec.c:1073)
==10095== by 0x431299: runshfunc (exec.c:5040)
==10095== by 0x430E76: doshfunc (exec.c:4920)
==10095== by 0x4302FB: execshfunc (exec.c:4557)
==10095== by 0x42D8C1: execcmd (exec.c:3373)
==10095==
==10095==
==10095== 2 errors in context 2 of 2:
==10095== Conditional jump or move depends on uninitialised value(s)
==10095== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10095== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10095== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10095== by 0x40EFC2: execbuiltin (builtin.c:450)
==10095== by 0x42D8E9: execcmd (exec.c:3378)
==10095== by 0x428CA0: execpline2 (exec.c:1697)
==10095== by 0x427FD2: execpline (exec.c:1484)
==10095== by 0x42779A: execlist (exec.c:1275)
==10095== by 0x42717C: execode (exec.c:1073)
==10095== by 0x431299: runshfunc (exec.c:5040)
==10095== by 0x430E76: doshfunc (exec.c:4920)
==10095== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10095==
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10120-by-pythonnut-on-???
==10120== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10120-by-pythonnut-on-???
==10120== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10120-by-pythonnut-on-???
==10120==
==10120== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10120== don't want to do, unless you know exactly what you're doing,
==10120== or are doing some strange experiment):
==10120== /usr/lib/valgrind/../../bin/vgdb --pid=10120 ...command...
==10120==
==10120== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10120== /path/to/gdb ./zsh
==10120== and then give GDB the following command
==10120== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10120
==10120== --pid is optional if only one valgrind process is running
==10120==
==10121== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10121-by-pythonnut-on-???
==10121== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10121-by-pythonnut-on-???
==10121== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10121-by-pythonnut-on-???
==10121==
==10121== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10121== don't want to do, unless you know exactly what you're doing,
==10121== or are doing some strange experiment):
==10121== /usr/lib/valgrind/../../bin/vgdb --pid=10121 ...command...
==10121==
==10121== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10121== /path/to/gdb ./zsh
==10121== and then give GDB the following command
==10121== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10121
==10121== --pid is optional if only one valgrind process is running
==10121==
==10123== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10123-by-pythonnut-on-???
==10123== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10123-by-pythonnut-on-???
==10123== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10123-by-pythonnut-on-???
==10123==
==10123== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10123== don't want to do, unless you know exactly what you're doing,
==10123== or are doing some strange experiment):
==10123== /usr/lib/valgrind/../../bin/vgdb --pid=10123 ...command...
==10123==
==10123== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10123== /path/to/gdb ./zsh
==10123== and then give GDB the following command
==10123== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10123
==10123== --pid is optional if only one valgrind process is running
==10123==
--10122-- Caught __NR_exit; running __libc_freeres()
==10122== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10122-by-pythonnut-on-???
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==10122== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10122-by-pythonnut-on-???
==10122== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10122-by-pythonnut-on-???
==10122==
==10122== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10122== don't want to do, unless you know exactly what you're doing,
==10122== or are doing some strange experiment):
==10122== /usr/lib/valgrind/../../bin/vgdb --pid=10122 ...command...
==10122==
==10122== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10122== /path/to/gdb ./zsh
==10122== and then give GDB the following command
==10122== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10122
==10122== --pid is optional if only one valgrind process is running
==10122==
==10125== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10125-by-pythonnut-on-???
==10125== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10125-by-pythonnut-on-???
==10125== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10125-by-pythonnut-on-???
==10125==
==10125== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10125== don't want to do, unless you know exactly what you're doing,
==10125== or are doing some strange experiment):
==10125== /usr/lib/valgrind/../../bin/vgdb --pid=10125 ...command...
==10125==
==10125== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10125== /path/to/gdb ./zsh
==10125== and then give GDB the following command
==10125== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10125
==10125== --pid is optional if only one valgrind process is running
==10125==
--10122-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10126-by-pythonnut-on-???
==10126== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10126-by-pythonnut-on-???
==10126== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10126-by-pythonnut-on-???
==10126==
==10126== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10126== don't want to do, unless you know exactly what you're doing,
==10126== or are doing some strange experiment):
==10126== /usr/lib/valgrind/../../bin/vgdb --pid=10126 ...command...
==10126==
==10126== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10126== /path/to/gdb ./zsh
==10126== and then give GDB the following command
==10126== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10126
==10126== --pid is optional if only one valgrind process is running
==10126==
==10122==
==10122== HEAP SUMMARY:
==10122== in use at exit: 3,111,995 bytes in 68,923 blocks
==10122== total heap usage: 1,597,746 allocs, 1,528,823 frees, 129,009,694 bytes allocated
==10122==
client request: code 4d430005, addr 0xFFEFE66FC, len 4
--10126-- Caught __NR_exit; running __libc_freeres()
==10122== Searching for pointers to 68,923 not-freed blocks
--10122-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10122-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10122-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10122-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10122-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10122-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10122-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10122-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10122-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10122-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10122-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10122-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10122-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10122-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10122-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10122-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10122-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10122-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10122-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10122-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10122-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10122-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10122-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10122-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10122-- Scanning root segment: 0x701a000..0x701afff (4096)
--10122-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10122-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10122-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10122-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10122-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10122-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10122-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10122-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10122-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10122-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10126-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126==
==10126== HEAP SUMMARY:
==10126== in use at exit: 3,137,562 bytes in 69,547 blocks
==10126== total heap usage: 1,595,146 allocs, 1,525,599 frees, 128,918,844 bytes allocated
==10126==
==10126== Searching for pointers to 69,547 not-freed blocks
--10126-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10126-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10126-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10126-- Scanning root segment: 0x4037000..0x403efff (32768)
--10126-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10126-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10126-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10126-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10126-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10126-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10126-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10126-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10126-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10126-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10126-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10126-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10126-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10126-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10126-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10126-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10126-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10126-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10126-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10126-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10126-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10126-- Scanning root segment: 0x701a000..0x701afff (4096)
--10126-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10126-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10126-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10126-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10126-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10126-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10126-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10126-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10126-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10126-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10122== Checked 4,768,120 bytes
==10122==
==10122== LEAK SUMMARY:
==10122== definitely lost: 2,197 bytes in 13 blocks
==10122== indirectly lost: 6,756 bytes in 7 blocks
==10122== possibly lost: 0 bytes in 0 blocks
==10122== still reachable: 3,103,042 bytes in 68,903 blocks
==10122== suppressed: 0 bytes in 0 blocks
==10122== Rerun with --leak-check=full to see details of leaked memory
==10122==
==10122== Use --track-origins=yes to see where uninitialised values come from
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10122==
==10122== 1 errors in context 1 of 2:
==10122== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10122== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10122== by 0x488CD0: stringsubst (subst.c:301)
==10122== by 0x48801B: prefork (subst.c:77)
==10122== by 0x42B318: execcmd (exec.c:2619)
==10122== by 0x428CA0: execpline2 (exec.c:1697)
==10122== by 0x427FD2: execpline (exec.c:1484)
==10122== by 0x427756: execlist (exec.c:1267)
==10122== by 0x42717C: execode (exec.c:1073)
==10122== by 0x431299: runshfunc (exec.c:5040)
==10122== by 0x430E76: doshfunc (exec.c:4920)
==10122== by 0x4302FB: execshfunc (exec.c:4557)
==10122== by 0x42D8C1: execcmd (exec.c:3373)
==10122==
==10122==
==10122== 2 errors in context 2 of 2:
==10122== Conditional jump or move depends on uninitialised value(s)
==10122== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10122== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10122== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10122== by 0x40EFC2: execbuiltin (builtin.c:450)
==10122== by 0x42D8E9: execcmd (exec.c:3378)
==10122== by 0x428CA0: execpline2 (exec.c:1697)
==10122== by 0x427FD2: execpline (exec.c:1484)
==10122== by 0x42779A: execlist (exec.c:1275)
==10122== by 0x42717C: execode (exec.c:1073)
==10122== by 0x431299: runshfunc (exec.c:5040)
==10122== by 0x430E76: doshfunc (exec.c:4920)
==10122== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10122==
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10120-- Caught __NR_exit; running __libc_freeres()
==10126== Checked 4,841,488 bytes
==10126==
--10120-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10120==
==10120== HEAP SUMMARY:
==10120== in use at exit: 3,111,628 bytes in 68,913 blocks
==10120== total heap usage: 1,597,749 allocs, 1,528,836 frees, 129,010,334 bytes allocated
==10120==
==10126== LEAK SUMMARY:
==10126== definitely lost: 2,221 bytes in 14 blocks
==10126== indirectly lost: 6,796 bytes in 9 blocks
==10126== possibly lost: 0 bytes in 0 blocks
==10126== still reachable: 3,128,545 bytes in 69,524 blocks
==10126== suppressed: 0 bytes in 0 blocks
==10126== Rerun with --leak-check=full to see details of leaked memory
==10126==
==10126== Use --track-origins=yes to see where uninitialised values come from
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10126==
==10126== 1 errors in context 1 of 2:
==10126== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10126== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10126== by 0x488CD0: stringsubst (subst.c:301)
==10126== by 0x48801B: prefork (subst.c:77)
==10126== by 0x42B318: execcmd (exec.c:2619)
==10126== by 0x428CA0: execpline2 (exec.c:1697)
==10126== by 0x427FD2: execpline (exec.c:1484)
==10126== by 0x427756: execlist (exec.c:1267)
==10126== by 0x42717C: execode (exec.c:1073)
==10126== by 0x431299: runshfunc (exec.c:5040)
==10126== by 0x430E76: doshfunc (exec.c:4920)
==10126== by 0x4302FB: execshfunc (exec.c:4557)
==10126== by 0x42D8C1: execcmd (exec.c:3373)
==10126==
==10126==
==10126== 2 errors in context 2 of 2:
==10126== Conditional jump or move depends on uninitialised value(s)
==10126== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10126== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10126== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10126== by 0x40EFC2: execbuiltin (builtin.c:450)
==10126== by 0x42D8E9: execcmd (exec.c:3378)
==10126== by 0x428CA0: execpline2 (exec.c:1697)
==10126== by 0x427FD2: execpline (exec.c:1484)
==10126== by 0x42779A: execlist (exec.c:1275)
==10126== by 0x42717C: execode (exec.c:1073)
==10126== by 0x431299: runshfunc (exec.c:5040)
==10126== by 0x430E76: doshfunc (exec.c:4920)
==10126== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10126==
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== Searching for pointers to 68,913 not-freed blocks
--10120-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10120-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10120-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10120-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10120-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10120-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10120-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10120-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10120-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10120-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10120-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10120-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10120-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10120-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10120-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10120-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10120-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10120-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10120-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10120-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10120-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10120-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10120-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10120-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10120-- Scanning root segment: 0x701a000..0x701afff (4096)
--10120-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10120-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10120-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10120-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10120-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10120-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10120-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10120-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10120-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10120-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFE6BAC, len 4
==10120== Checked 4,765,792 bytes
==10120==
==10120== LEAK SUMMARY:
==10120== definitely lost: 2,197 bytes in 13 blocks
==10120== indirectly lost: 6,756 bytes in 7 blocks
==10120== possibly lost: 0 bytes in 0 blocks
==10120== still reachable: 3,102,675 bytes in 68,893 blocks
==10120== suppressed: 0 bytes in 0 blocks
==10120== Rerun with --leak-check=full to see details of leaked memory
==10120==
==10120== Use --track-origins=yes to see where uninitialised values come from
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120==
==10120== 1 errors in context 1 of 2:
==10120== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10120== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10120== by 0x488CD0: stringsubst (subst.c:301)
==10120== by 0x48801B: prefork (subst.c:77)
==10120== by 0x42B318: execcmd (exec.c:2619)
==10120== by 0x428CA0: execpline2 (exec.c:1697)
==10120== by 0x427FD2: execpline (exec.c:1484)
==10120== by 0x427756: execlist (exec.c:1267)
==10120== by 0x42717C: execode (exec.c:1073)
==10120== by 0x431299: runshfunc (exec.c:5040)
==10120== by 0x430E76: doshfunc (exec.c:4920)
==10120== by 0x4302FB: execshfunc (exec.c:4557)
==10120== by 0x42D8C1: execcmd (exec.c:3373)
==10120==
==10120==
==10120== 2 errors in context 2 of 2:
==10120== Conditional jump or move depends on uninitialised value(s)
==10120== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10120== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10120== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10120== by 0x40EFC2: execbuiltin (builtin.c:450)
==10120== by 0x42D8E9: execcmd (exec.c:3378)
==10120== by 0x428CA0: execpline2 (exec.c:1697)
==10120== by 0x427FD2: execpline (exec.c:1484)
==10120== by 0x42779A: execlist (exec.c:1275)
==10120== by 0x42717C: execode (exec.c:1073)
==10120== by 0x431299: runshfunc (exec.c:5040)
==10120== by 0x430E76: doshfunc (exec.c:4920)
==10120== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10120==
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10128-- Caught __NR_exit; running __libc_freeres()
--10177-- Caught __NR_exit; running __libc_freeres()
==10128== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10128-by-pythonnut-on-???
==10128== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10128-by-pythonnut-on-???
==10128== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10128-by-pythonnut-on-???
==10128==
==10128== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10128== don't want to do, unless you know exactly what you're doing,
==10128== or are doing some strange experiment):
==10128== /usr/lib/valgrind/../../bin/vgdb --pid=10128 ...command...
==10128==
==10128== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10128== /path/to/gdb ./zsh
==10128== and then give GDB the following command
==10128== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10128
==10128== --pid is optional if only one valgrind process is running
==10128==
==10177== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10177-by-pythonnut-on-???
==10177== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10177-by-pythonnut-on-???
==10177== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10177-by-pythonnut-on-???
==10177==
==10177== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10177== don't want to do, unless you know exactly what you're doing,
==10177== or are doing some strange experiment):
==10177== /usr/lib/valgrind/../../bin/vgdb --pid=10177 ...command...
==10177==
==10177== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10177== /path/to/gdb ./zsh
==10177== and then give GDB the following command
==10177== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10177
==10177== --pid is optional if only one valgrind process is running
==10177==
--10128-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF268C, len 4
==10128==
==10128== HEAP SUMMARY:
==10128== in use at exit: 3,137,839 bytes in 69,552 blocks
==10128== total heap usage: 1,595,159 allocs, 1,525,607 frees, 128,922,841 bytes allocated
==10128==
--10177-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF25EC, len 4
==10177==
==10177== HEAP SUMMARY:
==10177== in use at exit: 3,112,084 bytes in 68,925 blocks
==10177== total heap usage: 1,597,788 allocs, 1,528,863 frees, 129,025,954 bytes allocated
==10177==
==10128== Searching for pointers to 69,552 not-freed blocks
--10128-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10128-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10128-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10128-- Scanning root segment: 0x4037000..0x403efff (32768)
--10128-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10128-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10128-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10128-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10128-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10128-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10128-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10128-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10128-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10128-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10128-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10128-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10128-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10128-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10128-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10128-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10128-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10128-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10128-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10128-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10128-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10128-- Scanning root segment: 0x701a000..0x701afff (4096)
--10128-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10128-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10128-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10128-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10128-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10128-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10128-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10128-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10128-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10128-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10177== Searching for pointers to 68,925 not-freed blocks
--10177-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10177-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10177-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10177-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10177-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10177-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10177-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10177-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10177-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10177-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10177-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10177-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10177-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10177-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10177-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10177-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10177-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10177-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10177-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10177-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10177-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10177-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10177-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10177-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10177-- Scanning root segment: 0x701a000..0x701afff (4096)
--10177-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10177-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10177-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10177-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10177-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10177-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10177-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10177-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10177-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10177-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10128== Checked 4,841,472 bytes
==10128==
==10177== Checked 4,770,168 bytes
==10177==
==10177== LEAK SUMMARY:
==10177== definitely lost: 2,197 bytes in 13 blocks
==10177== indirectly lost: 6,756 bytes in 7 blocks
==10177== possibly lost: 0 bytes in 0 blocks
==10177== still reachable: 3,103,131 bytes in 68,905 blocks
==10177== suppressed: 0 bytes in 0 blocks
==10177== Rerun with --leak-check=full to see details of leaked memory
==10177==
==10177== Use --track-origins=yes to see where uninitialised values come from
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10177==
==10177== 1 errors in context 1 of 2:
==10177== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10177== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10177== by 0x488CD0: stringsubst (subst.c:301)
==10177== by 0x48801B: prefork (subst.c:77)
==10177== by 0x42B318: execcmd (exec.c:2619)
==10177== by 0x428CA0: execpline2 (exec.c:1697)
==10177== by 0x427FD2: execpline (exec.c:1484)
==10177== by 0x427756: execlist (exec.c:1267)
==10177== by 0x42717C: execode (exec.c:1073)
==10177== by 0x431299: runshfunc (exec.c:5040)
==10177== by 0x430E76: doshfunc (exec.c:4920)
==10177== by 0x4302FB: execshfunc (exec.c:4557)
==10177== by 0x42D8C1: execcmd (exec.c:3373)
==10177==
==10177==
==10177== 2 errors in context 2 of 2:
==10177== Conditional jump or move depends on uninitialised value(s)
==10177== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10177== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10177== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10177== by 0x40EFC2: execbuiltin (builtin.c:450)
==10177== by 0x42D8E9: execcmd (exec.c:3378)
==10177== by 0x428CA0: execpline2 (exec.c:1697)
==10177== by 0x427FD2: execpline (exec.c:1484)
==10177== by 0x42779A: execlist (exec.c:1275)
==10177== by 0x42717C: execode (exec.c:1073)
==10177== by 0x431299: runshfunc (exec.c:5040)
==10177== by 0x430E76: doshfunc (exec.c:4920)
==10177== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10177==
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128== LEAK SUMMARY:
==10128== definitely lost: 2,221 bytes in 14 blocks
==10128== indirectly lost: 6,796 bytes in 9 blocks
==10128== possibly lost: 0 bytes in 0 blocks
==10128== still reachable: 3,128,822 bytes in 69,529 blocks
==10128== suppressed: 0 bytes in 0 blocks
==10128== Rerun with --leak-check=full to see details of leaked memory
==10128==
==10128== Use --track-origins=yes to see where uninitialised values come from
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128==
==10128== 1 errors in context 1 of 2:
==10128== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10128== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10128== by 0x488CD0: stringsubst (subst.c:301)
==10128== by 0x48801B: prefork (subst.c:77)
==10128== by 0x42B318: execcmd (exec.c:2619)
==10128== by 0x428CA0: execpline2 (exec.c:1697)
==10128== by 0x427FD2: execpline (exec.c:1484)
==10128== by 0x427756: execlist (exec.c:1267)
==10128== by 0x42717C: execode (exec.c:1073)
==10128== by 0x431299: runshfunc (exec.c:5040)
==10128== by 0x430E76: doshfunc (exec.c:4920)
==10128== by 0x4302FB: execshfunc (exec.c:4557)
==10128== by 0x42D8C1: execcmd (exec.c:3373)
==10128==
==10128==
==10128== 2 errors in context 2 of 2:
==10128== Conditional jump or move depends on uninitialised value(s)
==10128== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10128== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10128== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10128== by 0x40EFC2: execbuiltin (builtin.c:450)
==10128== by 0x42D8E9: execcmd (exec.c:3378)
==10128== by 0x428CA0: execpline2 (exec.c:1697)
==10128== by 0x427FD2: execpline (exec.c:1484)
==10128== by 0x42779A: execlist (exec.c:1275)
==10128== by 0x42717C: execode (exec.c:1073)
==10128== by 0x431299: runshfunc (exec.c:5040)
==10128== by 0x430E76: doshfunc (exec.c:4920)
==10128== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10128==
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10175-- Caught __NR_exit; running __libc_freeres()
--10125-- Caught __NR_exit; running __libc_freeres()
==10175== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10175-by-pythonnut-on-???
==10175== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10175-by-pythonnut-on-???
==10175== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10175-by-pythonnut-on-???
==10175==
==10175== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10175== don't want to do, unless you know exactly what you're doing,
==10175== or are doing some strange experiment):
==10175== /usr/lib/valgrind/../../bin/vgdb --pid=10175 ...command...
==10175==
==10175== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10175== /path/to/gdb ./zsh
==10175== and then give GDB the following command
==10175== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10175
==10175== --pid is optional if only one valgrind process is running
==10175==
--10125-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10175-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10125==
==10125== HEAP SUMMARY:
==10125== in use at exit: 3,135,675 bytes in 69,477 blocks
==10125== total heap usage: 1,595,110 allocs, 1,525,633 frees, 128,923,452 bytes allocated
==10125==
==10175==
==10175== HEAP SUMMARY:
==10175== in use at exit: 3,112,065 bytes in 68,926 blocks
==10175== total heap usage: 1,597,785 allocs, 1,528,859 frees, 129,022,394 bytes allocated
==10175==
==10125== Searching for pointers to 69,477 not-freed blocks
--10125-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10125-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10125-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10125-- Scanning root segment: 0x4037000..0x403afff (16384)
--10125-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10125-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10125-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10125-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10125-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10125-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10125-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10125-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10125-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10125-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10125-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10125-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10125-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10125-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10125-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10125-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10125-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10125-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10125-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10125-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10125-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10125-- Scanning root segment: 0x701a000..0x701afff (4096)
--10125-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10125-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10125-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10125-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10125-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10125-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10125-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10125-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10125-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10125-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10175== Searching for pointers to 68,926 not-freed blocks
--10175-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10175-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10175-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10175-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10175-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10175-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10175-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10175-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10175-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10175-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10175-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10175-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10175-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10175-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10175-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10175-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10175-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10175-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10175-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10175-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10175-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10175-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10175-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10175-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10175-- Scanning root segment: 0x701a000..0x701afff (4096)
--10175-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10175-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10175-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10175-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10175-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10175-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10175-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10175-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10175-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10175-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10125== Checked 4,821,400 bytes
==10125==
==10175== Checked 4,769,840 bytes
==10175==
==10125== LEAK SUMMARY:
==10125== definitely lost: 2,221 bytes in 14 blocks
==10125== indirectly lost: 6,796 bytes in 9 blocks
==10125== possibly lost: 0 bytes in 0 blocks
==10125== still reachable: 3,126,658 bytes in 69,454 blocks
==10125== suppressed: 0 bytes in 0 blocks
==10125== Rerun with --leak-check=full to see details of leaked memory
==10125==
==10125== Use --track-origins=yes to see where uninitialised values come from
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10125==
==10125== 1 errors in context 1 of 2:
==10125== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10125== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10125== by 0x488CD0: stringsubst (subst.c:301)
==10125== by 0x48801B: prefork (subst.c:77)
==10125== by 0x42B318: execcmd (exec.c:2619)
==10125== by 0x428CA0: execpline2 (exec.c:1697)
==10125== by 0x427FD2: execpline (exec.c:1484)
==10125== by 0x427756: execlist (exec.c:1267)
==10125== by 0x42717C: execode (exec.c:1073)
==10125== by 0x431299: runshfunc (exec.c:5040)
==10125== by 0x430E76: doshfunc (exec.c:4920)
==10125== by 0x4302FB: execshfunc (exec.c:4557)
==10125== by 0x42D8C1: execcmd (exec.c:3373)
==10125==
==10125==
==10125== 2 errors in context 2 of 2:
==10125== Conditional jump or move depends on uninitialised value(s)
==10125== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10125== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10125== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10125== by 0x40EFC2: execbuiltin (builtin.c:450)
==10125== by 0x42D8E9: execcmd (exec.c:3378)
==10125== by 0x428CA0: execpline2 (exec.c:1697)
==10125== by 0x427FD2: execpline (exec.c:1484)
==10125== by 0x42779A: execlist (exec.c:1275)
==10125== by 0x42717C: execode (exec.c:1073)
==10125== by 0x431299: runshfunc (exec.c:5040)
==10125== by 0x430E76: doshfunc (exec.c:4920)
==10125== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10125==
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175== LEAK SUMMARY:
==10175== definitely lost: 2,197 bytes in 13 blocks
==10175== indirectly lost: 6,756 bytes in 7 blocks
==10175== possibly lost: 0 bytes in 0 blocks
==10175== still reachable: 3,103,112 bytes in 68,906 blocks
==10175== suppressed: 0 bytes in 0 blocks
==10175== Rerun with --leak-check=full to see details of leaked memory
==10175==
==10175== Use --track-origins=yes to see where uninitialised values come from
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175==
==10175== 1 errors in context 1 of 2:
==10175== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10175== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10175== by 0x488CD0: stringsubst (subst.c:301)
==10175== by 0x48801B: prefork (subst.c:77)
==10175== by 0x42B318: execcmd (exec.c:2619)
==10175== by 0x428CA0: execpline2 (exec.c:1697)
==10175== by 0x427FD2: execpline (exec.c:1484)
==10175== by 0x427756: execlist (exec.c:1267)
==10175== by 0x42717C: execode (exec.c:1073)
==10175== by 0x431299: runshfunc (exec.c:5040)
==10175== by 0x430E76: doshfunc (exec.c:4920)
==10175== by 0x4302FB: execshfunc (exec.c:4557)
==10175== by 0x42D8C1: execcmd (exec.c:3373)
==10175==
==10175==
==10175== 2 errors in context 2 of 2:
==10175== Conditional jump or move depends on uninitialised value(s)
==10175== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10175== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10175== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10175== by 0x40EFC2: execbuiltin (builtin.c:450)
==10175== by 0x42D8E9: execcmd (exec.c:3378)
==10175== by 0x428CA0: execpline2 (exec.c:1697)
==10175== by 0x427FD2: execpline (exec.c:1484)
==10175== by 0x42779A: execlist (exec.c:1275)
==10175== by 0x42717C: execode (exec.c:1073)
==10175== by 0x431299: runshfunc (exec.c:5040)
==10175== by 0x430E76: doshfunc (exec.c:4920)
==10175== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10175==
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10182-by-pythonnut-on-???
==10182== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10182-by-pythonnut-on-???
==10182== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10182-by-pythonnut-on-???
==10182==
==10182== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10182== don't want to do, unless you know exactly what you're doing,
==10182== or are doing some strange experiment):
==10182== /usr/lib/valgrind/../../bin/vgdb --pid=10182 ...command...
==10182==
==10182== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10182== /path/to/gdb ./zsh
==10182== and then give GDB the following command
==10182== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10182
==10182== --pid is optional if only one valgrind process is running
==10182==
--10182-- Caught __NR_exit; running __libc_freeres()
==10181== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10181-by-pythonnut-on-???
==10181== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10181-by-pythonnut-on-???
==10181== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10181-by-pythonnut-on-???
==10181==
==10181== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10181== don't want to do, unless you know exactly what you're doing,
==10181== or are doing some strange experiment):
==10181== /usr/lib/valgrind/../../bin/vgdb --pid=10181 ...command...
==10181==
==10181== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10181== /path/to/gdb ./zsh
==10181== and then give GDB the following command
==10181== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10181
==10181== --pid is optional if only one valgrind process is running
==10181==
==10183== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10183-by-pythonnut-on-???
==10183== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10183-by-pythonnut-on-???
==10183== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10183-by-pythonnut-on-???
==10183==
==10183== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10183== don't want to do, unless you know exactly what you're doing,
==10183== or are doing some strange experiment):
==10183== /usr/lib/valgrind/../../bin/vgdb --pid=10183 ...command...
==10183==
==10183== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10183== /path/to/gdb ./zsh
==10183== and then give GDB the following command
==10183== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10183
==10183== --pid is optional if only one valgrind process is running
==10183==
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--10182-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10181-- Caught __NR_exit; running __libc_freeres()
==10182==
==10182== HEAP SUMMARY:
==10182== in use at exit: 3,137,416 bytes in 69,539 blocks
==10182== total heap usage: 1,595,178 allocs, 1,525,639 frees, 128,932,119 bytes allocated
==10182==
--10181-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10181==
==10182== Searching for pointers to 69,539 not-freed blocks
--10182-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10182-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10182-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10182-- Scanning root segment: 0x4037000..0x403efff (32768)
--10182-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10182-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10182-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10182-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10182-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10182-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10182-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10182-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10182-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10182-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10182-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10182-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10182-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10182-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10182-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10182-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10182-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10182-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10182-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10181== HEAP SUMMARY:
==10181== in use at exit: 3,112,296 bytes in 68,931 blocks
==10181== total heap usage: 1,597,796 allocs, 1,528,865 frees, 129,027,482 bytes allocated
==10181==
--10182-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10182-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10182-- Scanning root segment: 0x701a000..0x701afff (4096)
--10182-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10182-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10182-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10182-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10182-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10182-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10182-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10182-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10182-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10182-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10181== Searching for pointers to 68,931 not-freed blocks
--10181-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10181-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10181-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10181-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10181-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10181-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10181-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10181-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10181-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10181-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10181-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10181-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10181-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10181-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10181-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10181-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10181-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10181-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10181-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10181-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10181-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10181-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10181-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10181-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10181-- Scanning root segment: 0x701a000..0x701afff (4096)
--10181-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10181-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10181-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10181-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10181-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10181-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10181-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10181-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10181-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10181-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10182== Checked 4,840,024 bytes
==10182==
==10182== LEAK SUMMARY:
==10182== definitely lost: 2,221 bytes in 14 blocks
==10182== indirectly lost: 6,796 bytes in 9 blocks
==10182== possibly lost: 0 bytes in 0 blocks
==10182== still reachable: 3,128,399 bytes in 69,516 blocks
==10182== suppressed: 0 bytes in 0 blocks
==10182== Rerun with --leak-check=full to see details of leaked memory
==10182==
==10182== Use --track-origins=yes to see where uninitialised values come from
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182==
==10182== 1 errors in context 1 of 2:
==10182== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10182== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10182== by 0x488CD0: stringsubst (subst.c:301)
==10182== by 0x48801B: prefork (subst.c:77)
==10182== by 0x42B318: execcmd (exec.c:2619)
==10182== by 0x428CA0: execpline2 (exec.c:1697)
==10182== by 0x427FD2: execpline (exec.c:1484)
==10182== by 0x427756: execlist (exec.c:1267)
==10182== by 0x42717C: execode (exec.c:1073)
==10182== by 0x431299: runshfunc (exec.c:5040)
==10182== by 0x430E76: doshfunc (exec.c:4920)
==10182== by 0x4302FB: execshfunc (exec.c:4557)
==10182== by 0x42D8C1: execcmd (exec.c:3373)
==10182==
==10182==
==10182== 2 errors in context 2 of 2:
==10182== Conditional jump or move depends on uninitialised value(s)
==10182== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10182== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10182== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10182== by 0x40EFC2: execbuiltin (builtin.c:450)
==10182== by 0x42D8E9: execcmd (exec.c:3378)
==10182== by 0x428CA0: execpline2 (exec.c:1697)
==10182== by 0x427FD2: execpline (exec.c:1484)
==10182== by 0x42779A: execlist (exec.c:1275)
==10182== by 0x42717C: execode (exec.c:1073)
==10182== by 0x431299: runshfunc (exec.c:5040)
==10182== by 0x430E76: doshfunc (exec.c:4920)
==10182== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10182==
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10180-by-pythonnut-on-???
==10180== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10180-by-pythonnut-on-???
==10180== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10180-by-pythonnut-on-???
==10180==
==10180== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10180== don't want to do, unless you know exactly what you're doing,
==10180== or are doing some strange experiment):
==10180== /usr/lib/valgrind/../../bin/vgdb --pid=10180 ...command...
==10180==
==10180== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10180== /path/to/gdb ./zsh
==10180== and then give GDB the following command
==10180== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10180
==10180== --pid is optional if only one valgrind process is running
==10180==
--10180-- Caught __NR_exit; running __libc_freeres()
==10181== Checked 4,769,792 bytes
==10181==
==10181== LEAK SUMMARY:
==10181== definitely lost: 2,197 bytes in 13 blocks
==10181== indirectly lost: 6,756 bytes in 7 blocks
==10181== possibly lost: 0 bytes in 0 blocks
==10181== still reachable: 3,103,343 bytes in 68,911 blocks
==10181== suppressed: 0 bytes in 0 blocks
==10181== Rerun with --leak-check=full to see details of leaked memory
==10181==
==10181== Use --track-origins=yes to see where uninitialised values come from
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10181==
==10181== 1 errors in context 1 of 2:
==10181== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10181== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10181== by 0x488CD0: stringsubst (subst.c:301)
==10181== by 0x48801B: prefork (subst.c:77)
==10181== by 0x42B318: execcmd (exec.c:2619)
==10181== by 0x428CA0: execpline2 (exec.c:1697)
==10181== by 0x427FD2: execpline (exec.c:1484)
==10181== by 0x427756: execlist (exec.c:1267)
==10181== by 0x42717C: execode (exec.c:1073)
==10181== by 0x431299: runshfunc (exec.c:5040)
==10181== by 0x430E76: doshfunc (exec.c:4920)
==10181== by 0x4302FB: execshfunc (exec.c:4557)
==10181== by 0x42D8C1: execcmd (exec.c:3373)
==10181==
==10181==
==10181== 2 errors in context 2 of 2:
==10181== Conditional jump or move depends on uninitialised value(s)
==10181== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10181== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10181== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10181== by 0x40EFC2: execbuiltin (builtin.c:450)
==10181== by 0x42D8E9: execcmd (exec.c:3378)
==10181== by 0x428CA0: execpline2 (exec.c:1697)
==10181== by 0x427FD2: execpline (exec.c:1484)
==10181== by 0x42779A: execlist (exec.c:1275)
==10181== by 0x42717C: execode (exec.c:1073)
==10181== by 0x431299: runshfunc (exec.c:5040)
==10181== by 0x430E76: doshfunc (exec.c:4920)
==10181== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10181==
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10180-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10180==
==10180== HEAP SUMMARY:
==10180== in use at exit: 3,137,352 bytes in 69,536 blocks
==10180== total heap usage: 1,595,180 allocs, 1,525,644 frees, 128,932,663 bytes allocated
==10180==
client request: code 4d430005, addr 0xFFEFF272C, len 4
==10180== Searching for pointers to 69,536 not-freed blocks
--10180-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10180-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10180-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10180-- Scanning root segment: 0x4037000..0x403efff (32768)
--10180-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10180-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10180-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10180-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10180-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10180-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10180-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10180-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10180-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10180-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10180-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10180-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10180-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10180-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10180-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10180-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10180-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10180-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10180-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10180-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10180-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10180-- Scanning root segment: 0x701a000..0x701afff (4096)
--10180-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10180-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10180-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10180-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10180-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10180-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10180-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10180-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10180-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10180-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10187-- Caught __NR_exit; running __libc_freeres()
==10187== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10187-by-pythonnut-on-???
==10187== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10187-by-pythonnut-on-???
==10187== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10187-by-pythonnut-on-???
==10187==
==10187== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10187== don't want to do, unless you know exactly what you're doing,
==10187== or are doing some strange experiment):
==10187== /usr/lib/valgrind/../../bin/vgdb --pid=10187 ...command...
==10187==
==10187== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10187== /path/to/gdb ./zsh
==10187== and then give GDB the following command
==10187== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10187
==10187== --pid is optional if only one valgrind process is running
==10187==
--10187-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187==
==10187== HEAP SUMMARY:
==10187== in use at exit: 3,112,403 bytes in 68,935 blocks
==10187== total heap usage: 1,597,804 allocs, 1,528,869 frees, 129,029,701 bytes allocated
==10187==
==10187== Searching for pointers to 68,935 not-freed blocks
--10187-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10187-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10187-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10187-- Scanning root segment: 0x4037000..0x403afff (16384)
--10187-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10187-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10187-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10187-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10187-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10187-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10187-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10187-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10187-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10187-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10187-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10187-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10187-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10187-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10187-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10187-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10187-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10187-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10187-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10187-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10187-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10187-- Scanning root segment: 0x701a000..0x701afff (4096)
--10187-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10187-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10187-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10187-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10187-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10187-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10187-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10187-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10187-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10187-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10180== Checked 4,839,336 bytes
==10180==
==10180== LEAK SUMMARY:
==10180== definitely lost: 2,221 bytes in 14 blocks
==10180== indirectly lost: 6,796 bytes in 9 blocks
==10180== possibly lost: 0 bytes in 0 blocks
==10180== still reachable: 3,128,335 bytes in 69,513 blocks
==10180== suppressed: 0 bytes in 0 blocks
==10180== Rerun with --leak-check=full to see details of leaked memory
==10180==
==10180== Use --track-origins=yes to see where uninitialised values come from
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180==
==10180== 1 errors in context 1 of 2:
==10180== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10180== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10180== by 0x488CD0: stringsubst (subst.c:301)
==10180== by 0x48801B: prefork (subst.c:77)
==10180== by 0x42B318: execcmd (exec.c:2619)
==10180== by 0x428CA0: execpline2 (exec.c:1697)
==10180== by 0x427FD2: execpline (exec.c:1484)
==10180== by 0x427756: execlist (exec.c:1267)
==10180== by 0x42717C: execode (exec.c:1073)
==10180== by 0x431299: runshfunc (exec.c:5040)
==10180== by 0x430E76: doshfunc (exec.c:4920)
==10180== by 0x4302FB: execshfunc (exec.c:4557)
==10180== by 0x42D8C1: execcmd (exec.c:3373)
==10180==
==10180==
==10180== 2 errors in context 2 of 2:
==10180== Conditional jump or move depends on uninitialised value(s)
==10180== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10180== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10180== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10180== by 0x40EFC2: execbuiltin (builtin.c:450)
==10180== by 0x42D8E9: execcmd (exec.c:3378)
==10180== by 0x428CA0: execpline2 (exec.c:1697)
==10180== by 0x427FD2: execpline (exec.c:1484)
==10180== by 0x42779A: execlist (exec.c:1275)
==10180== by 0x42717C: execode (exec.c:1073)
==10180== by 0x431299: runshfunc (exec.c:5040)
==10180== by 0x430E76: doshfunc (exec.c:4920)
==10180== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10180==
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10189-by-pythonnut-on-???
==10189== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10189-by-pythonnut-on-???
==10189== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10189-by-pythonnut-on-???
==10189==
==10189== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10189== don't want to do, unless you know exactly what you're doing,
==10189== or are doing some strange experiment):
==10189== /usr/lib/valgrind/../../bin/vgdb --pid=10189 ...command...
==10189==
==10189== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10189== /path/to/gdb ./zsh
==10189== and then give GDB the following command
==10189== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10189
==10189== --pid is optional if only one valgrind process is running
==10189==
--10189-- Caught __NR_exit; running __libc_freeres()
--10189-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187== Checked 4,786,544 bytes
==10187==
==10189==
==10189== HEAP SUMMARY:
==10189== in use at exit: 3,137,356 bytes in 69,536 blocks
==10189== total heap usage: 1,595,197 allocs, 1,525,661 frees, 128,937,683 bytes allocated
==10189==
==10187== LEAK SUMMARY:
==10187== definitely lost: 2,197 bytes in 13 blocks
==10187== indirectly lost: 6,756 bytes in 7 blocks
==10187== possibly lost: 0 bytes in 0 blocks
==10187== still reachable: 3,103,450 bytes in 68,915 blocks
==10187== suppressed: 0 bytes in 0 blocks
==10187== Rerun with --leak-check=full to see details of leaked memory
==10187==
==10187== Use --track-origins=yes to see where uninitialised values come from
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10187==
==10187== 1 errors in context 1 of 2:
==10187== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10187== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10187== by 0x488CD0: stringsubst (subst.c:301)
==10187== by 0x48801B: prefork (subst.c:77)
==10187== by 0x42B318: execcmd (exec.c:2619)
==10187== by 0x428CA0: execpline2 (exec.c:1697)
==10187== by 0x427FD2: execpline (exec.c:1484)
==10187== by 0x427756: execlist (exec.c:1267)
==10187== by 0x42717C: execode (exec.c:1073)
==10187== by 0x431299: runshfunc (exec.c:5040)
==10187== by 0x430E76: doshfunc (exec.c:4920)
==10187== by 0x4302FB: execshfunc (exec.c:4557)
==10187== by 0x42D8C1: execcmd (exec.c:3373)
==10187==
==10187==
==10187== 2 errors in context 2 of 2:
==10187== Conditional jump or move depends on uninitialised value(s)
==10187== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10187== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10187== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10187== by 0x40EFC2: execbuiltin (builtin.c:450)
==10187== by 0x42D8E9: execcmd (exec.c:3378)
==10187== by 0x428CA0: execpline2 (exec.c:1697)
==10187== by 0x427FD2: execpline (exec.c:1484)
==10187== by 0x42779A: execlist (exec.c:1275)
==10187== by 0x42717C: execode (exec.c:1073)
==10187== by 0x431299: runshfunc (exec.c:5040)
==10187== by 0x430E76: doshfunc (exec.c:4920)
==10187== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10187==
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== Searching for pointers to 69,536 not-freed blocks
--10189-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10189-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10189-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10189-- Scanning root segment: 0x4037000..0x403efff (32768)
--10189-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10189-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10189-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10189-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10189-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10189-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10189-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10189-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10189-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10189-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10189-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10189-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10189-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10189-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10189-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10189-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10189-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10190== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10190-by-pythonnut-on-???
==10190== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10190-by-pythonnut-on-???
==10190== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10190-by-pythonnut-on-???
==10190==
==10190== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10190== don't want to do, unless you know exactly what you're doing,
==10190== or are doing some strange experiment):
==10190== /usr/lib/valgrind/../../bin/vgdb --pid=10190 ...command...
==10190==
==10190== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10190== /path/to/gdb ./zsh
==10190== and then give GDB the following command
==10190== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10190
==10190== --pid is optional if only one valgrind process is running
==10190==
--10189-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10189-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10189-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10189-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10189-- Scanning root segment: 0x701a000..0x701afff (4096)
--10189-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10189-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10189-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10189-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10189-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10189-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10189-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10189-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10189-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10189-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
--10192-- Caught __NR_exit; running __libc_freeres()
==10192== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10192-by-pythonnut-on-???
==10192== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10192-by-pythonnut-on-???
==10192== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10192-by-pythonnut-on-???
==10192==
==10192== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10192== don't want to do, unless you know exactly what you're doing,
==10192== or are doing some strange experiment):
==10192== /usr/lib/valgrind/../../bin/vgdb --pid=10192 ...command...
==10192==
==10192== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10192== /path/to/gdb ./zsh
==10192== and then give GDB the following command
==10192== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10192
==10192== --pid is optional if only one valgrind process is running
==10192==
--10192-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10189== Checked 4,839,344 bytes
==10189==
==10192==
==10192== HEAP SUMMARY:
==10192== in use at exit: 3,111,710 bytes in 68,918 blocks
==10192== total heap usage: 1,597,854 allocs, 1,528,936 frees, 129,036,602 bytes allocated
==10192==
==10189== LEAK SUMMARY:
==10189== definitely lost: 2,221 bytes in 14 blocks
==10189== indirectly lost: 6,796 bytes in 9 blocks
==10189== possibly lost: 0 bytes in 0 blocks
==10189== still reachable: 3,128,339 bytes in 69,513 blocks
==10189== suppressed: 0 bytes in 0 blocks
==10189== Rerun with --leak-check=full to see details of leaked memory
==10189==
==10189== Use --track-origins=yes to see where uninitialised values come from
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189==
==10189== 1 errors in context 1 of 2:
==10189== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10189== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10189== by 0x488CD0: stringsubst (subst.c:301)
==10189== by 0x48801B: prefork (subst.c:77)
==10189== by 0x42B318: execcmd (exec.c:2619)
==10189== by 0x428CA0: execpline2 (exec.c:1697)
==10189== by 0x427FD2: execpline (exec.c:1484)
==10189== by 0x427756: execlist (exec.c:1267)
==10189== by 0x42717C: execode (exec.c:1073)
==10189== by 0x431299: runshfunc (exec.c:5040)
==10189== by 0x430E76: doshfunc (exec.c:4920)
==10189== by 0x4302FB: execshfunc (exec.c:4557)
==10189== by 0x42D8C1: execcmd (exec.c:3373)
==10189==
==10189==
==10189== 2 errors in context 2 of 2:
==10189== Conditional jump or move depends on uninitialised value(s)
==10189== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10189== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10189== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10189== by 0x40EFC2: execbuiltin (builtin.c:450)
==10189== by 0x42D8E9: execcmd (exec.c:3378)
==10189== by 0x428CA0: execpline2 (exec.c:1697)
==10189== by 0x427FD2: execpline (exec.c:1484)
==10189== by 0x42779A: execlist (exec.c:1275)
==10189== by 0x42717C: execode (exec.c:1073)
==10189== by 0x431299: runshfunc (exec.c:5040)
==10189== by 0x430E76: doshfunc (exec.c:4920)
==10189== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10189==
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10193-by-pythonnut-on-???
==10193== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10193-by-pythonnut-on-???
==10193== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10193-by-pythonnut-on-???
==10193==
==10193== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10193== don't want to do, unless you know exactly what you're doing,
==10193== or are doing some strange experiment):
==10193== /usr/lib/valgrind/../../bin/vgdb --pid=10193 ...command...
==10193==
==10193== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10193== /path/to/gdb ./zsh
==10193== and then give GDB the following command
==10193== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10193
==10193== --pid is optional if only one valgrind process is running
==10193==
==10192== Searching for pointers to 68,918 not-freed blocks
--10192-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10192-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10192-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10192-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10192-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10192-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10192-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10192-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10192-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10192-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10192-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10192-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10192-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10192-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10192-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10192-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10192-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10192-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10192-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10192-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10192-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10192-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10192-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10192-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10192-- Scanning root segment: 0x701a000..0x701afff (4096)
--10192-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10192-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10192-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10192-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10192-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10192-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10192-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10192-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10192-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10192-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10193-- Caught __NR_exit; running __libc_freeres()
--10193-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10193==
==10193== HEAP SUMMARY:
==10193== in use at exit: 3,137,355 bytes in 69,536 blocks
==10193== total heap usage: 1,595,202 allocs, 1,525,666 frees, 128,939,796 bytes allocated
==10193==
==10193== Searching for pointers to 69,536 not-freed blocks
--10193-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10193-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10193-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10193-- Scanning root segment: 0x4037000..0x403efff (32768)
--10193-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10193-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10193-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10193-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10193-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10193-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10193-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10193-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10193-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10193-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10193-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10193-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10193-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10193-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10193-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10193-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10193-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10193-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10193-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10193-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10193-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10193-- Scanning root segment: 0x701a000..0x701afff (4096)
--10193-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10193-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10193-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10193-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10193-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10193-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10193-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10193-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10193-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10193-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10192== Checked 4,786,720 bytes
==10192==
==10192== LEAK SUMMARY:
==10192== definitely lost: 2,197 bytes in 13 blocks
==10192== indirectly lost: 6,756 bytes in 7 blocks
==10192== possibly lost: 0 bytes in 0 blocks
==10192== still reachable: 3,102,757 bytes in 68,898 blocks
==10192== suppressed: 0 bytes in 0 blocks
==10192== Rerun with --leak-check=full to see details of leaked memory
==10192==
==10192== Use --track-origins=yes to see where uninitialised values come from
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10192==
==10192== 1 errors in context 1 of 2:
==10192== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10192== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10192== by 0x488CD0: stringsubst (subst.c:301)
==10192== by 0x48801B: prefork (subst.c:77)
==10192== by 0x42B318: execcmd (exec.c:2619)
==10192== by 0x428CA0: execpline2 (exec.c:1697)
==10192== by 0x427FD2: execpline (exec.c:1484)
==10192== by 0x427756: execlist (exec.c:1267)
==10192== by 0x42717C: execode (exec.c:1073)
==10192== by 0x431299: runshfunc (exec.c:5040)
==10192== by 0x430E76: doshfunc (exec.c:4920)
==10192== by 0x4302FB: execshfunc (exec.c:4557)
==10192== by 0x42D8C1: execcmd (exec.c:3373)
==10192==
==10192==
==10192== 2 errors in context 2 of 2:
==10192== Conditional jump or move depends on uninitialised value(s)
==10192== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10192== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10192== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10192== by 0x40EFC2: execbuiltin (builtin.c:450)
==10192== by 0x42D8E9: execcmd (exec.c:3378)
==10192== by 0x428CA0: execpline2 (exec.c:1697)
==10192== by 0x427FD2: execpline (exec.c:1484)
==10192== by 0x42779A: execlist (exec.c:1275)
==10192== by 0x42717C: execode (exec.c:1073)
==10192== by 0x431299: runshfunc (exec.c:5040)
==10192== by 0x430E76: doshfunc (exec.c:4920)
==10192== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10192==
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF617C, len 4
==10193== Checked 4,839,344 bytes
==10193==
==10195== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10195-by-pythonnut-on-???
==10195== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10195-by-pythonnut-on-???
==10195== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10195-by-pythonnut-on-???
==10195==
==10195== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10195== don't want to do, unless you know exactly what you're doing,
==10195== or are doing some strange experiment):
==10195== /usr/lib/valgrind/../../bin/vgdb --pid=10195 ...command...
==10195==
==10195== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10195== /path/to/gdb ./zsh
==10195== and then give GDB the following command
==10195== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10195
==10195== --pid is optional if only one valgrind process is running
==10195==
==10193== LEAK SUMMARY:
==10193== definitely lost: 2,221 bytes in 14 blocks
==10193== indirectly lost: 6,796 bytes in 9 blocks
==10193== possibly lost: 0 bytes in 0 blocks
==10193== still reachable: 3,128,338 bytes in 69,513 blocks
==10193== suppressed: 0 bytes in 0 blocks
==10193== Rerun with --leak-check=full to see details of leaked memory
==10193==
==10193== Use --track-origins=yes to see where uninitialised values come from
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193==
==10193== 1 errors in context 1 of 2:
==10193== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10193== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10193== by 0x488CD0: stringsubst (subst.c:301)
==10193== by 0x48801B: prefork (subst.c:77)
==10193== by 0x42B318: execcmd (exec.c:2619)
==10193== by 0x428CA0: execpline2 (exec.c:1697)
==10193== by 0x427FD2: execpline (exec.c:1484)
==10193== by 0x427756: execlist (exec.c:1267)
==10193== by 0x42717C: execode (exec.c:1073)
==10193== by 0x431299: runshfunc (exec.c:5040)
==10193== by 0x430E76: doshfunc (exec.c:4920)
==10193== by 0x4302FB: execshfunc (exec.c:4557)
==10193== by 0x42D8C1: execcmd (exec.c:3373)
==10193==
==10193==
==10193== 2 errors in context 2 of 2:
==10193== Conditional jump or move depends on uninitialised value(s)
==10193== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10193== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10193== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10193== by 0x40EFC2: execbuiltin (builtin.c:450)
==10193== by 0x42D8E9: execcmd (exec.c:3378)
==10193== by 0x428CA0: execpline2 (exec.c:1697)
==10193== by 0x427FD2: execpline (exec.c:1484)
==10193== by 0x42779A: execlist (exec.c:1275)
==10193== by 0x42717C: execode (exec.c:1073)
==10193== by 0x431299: runshfunc (exec.c:5040)
==10193== by 0x430E76: doshfunc (exec.c:4920)
==10193== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10193==
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10197-by-pythonnut-on-???
==10197== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10197-by-pythonnut-on-???
==10197== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10197-by-pythonnut-on-???
==10197==
==10197== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10197== don't want to do, unless you know exactly what you're doing,
==10197== or are doing some strange experiment):
==10197== /usr/lib/valgrind/../../bin/vgdb --pid=10197 ...command...
==10197==
==10197== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10197== /path/to/gdb ./zsh
==10197== and then give GDB the following command
==10197== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10197
==10197== --pid is optional if only one valgrind process is running
==10197==
==10198== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10198-by-pythonnut-on-???
==10198== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10198-by-pythonnut-on-???
==10198== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10198-by-pythonnut-on-???
==10198==
==10198== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10198== don't want to do, unless you know exactly what you're doing,
==10198== or are doing some strange experiment):
==10198== /usr/lib/valgrind/../../bin/vgdb --pid=10198 ...command...
==10198==
==10198== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10198== /path/to/gdb ./zsh
==10198== and then give GDB the following command
==10198== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10198
==10198== --pid is optional if only one valgrind process is running
==10198==
--10198-- Caught __NR_exit; running __libc_freeres()
==10200== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10200-by-pythonnut-on-???
==10200== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10200-by-pythonnut-on-???
==10200== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10200-by-pythonnut-on-???
==10200==
==10200== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10200== don't want to do, unless you know exactly what you're doing,
==10200== or are doing some strange experiment):
==10200== /usr/lib/valgrind/../../bin/vgdb --pid=10200 ...command...
==10200==
==10200== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10200== /path/to/gdb ./zsh
==10200== and then give GDB the following command
==10200== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10200
==10200== --pid is optional if only one valgrind process is running
==10200==
==10199== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10199-by-pythonnut-on-???
==10199== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10199-by-pythonnut-on-???
==10199== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10199-by-pythonnut-on-???
==10199==
==10199== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10199== don't want to do, unless you know exactly what you're doing,
==10199== or are doing some strange experiment):
==10199== /usr/lib/valgrind/../../bin/vgdb --pid=10199 ...command...
==10199==
==10199== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10199== /path/to/gdb ./zsh
==10199== and then give GDB the following command
==10199== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10199
==10199== --pid is optional if only one valgrind process is running
==10199==
--10199-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF493C, len 4
==10203== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10203-by-pythonnut-on-???
==10203== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10203-by-pythonnut-on-???
==10203== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10203-by-pythonnut-on-???
==10203==
==10203== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10203== don't want to do, unless you know exactly what you're doing,
==10203== or are doing some strange experiment):
==10203== /usr/lib/valgrind/../../bin/vgdb --pid=10203 ...command...
==10203==
==10203== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10203== /path/to/gdb ./zsh
==10203== and then give GDB the following command
==10203== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10203
==10203== --pid is optional if only one valgrind process is running
==10203==
--10198-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF028C, len 4
--10199-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10198==
==10198== HEAP SUMMARY:
==10198== in use at exit: 3,137,354 bytes in 69,536 blocks
==10198== total heap usage: 1,595,207 allocs, 1,525,671 frees, 128,941,909 bytes allocated
==10198==
==10202== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10202-by-pythonnut-on-???
==10202== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10202-by-pythonnut-on-???
==10202== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10202-by-pythonnut-on-???
==10202==
==10202== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10202== don't want to do, unless you know exactly what you're doing,
==10202== or are doing some strange experiment):
==10202== /usr/lib/valgrind/../../bin/vgdb --pid=10202 ...command...
==10202==
==10202== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10202== /path/to/gdb ./zsh
==10202== and then give GDB the following command
==10202== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10202
==10202== --pid is optional if only one valgrind process is running
==10202==
==10199==
--10202-- Caught __NR_exit; running __libc_freeres()
==10199== HEAP SUMMARY:
==10199== in use at exit: 3,112,786 bytes in 68,971 blocks
==10199== total heap usage: 1,598,090 allocs, 1,529,119 frees, 129,059,014 bytes allocated
==10199==
==10198== Searching for pointers to 69,536 not-freed blocks
--10198-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10198-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10198-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10198-- Scanning root segment: 0x4037000..0x403efff (32768)
--10198-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10198-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10198-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10198-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10198-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10198-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10198-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10198-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10198-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10198-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10198-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10198-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10198-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10198-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10198-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10198-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10198-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10198-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10198-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10198-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10198-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10198-- Scanning root segment: 0x701a000..0x701afff (4096)
--10198-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10198-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10198-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10198-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10198-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10198-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10198-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10198-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10198-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10198-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10199== Searching for pointers to 68,971 not-freed blocks
--10199-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10199-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10199-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10199-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10199-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10199-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10199-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10199-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10199-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10199-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10199-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10199-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10199-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10199-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10199-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10199-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10199-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10199-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10199-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10199-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10199-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10199-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10199-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10199-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10199-- Scanning root segment: 0x701a000..0x701afff (4096)
--10199-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10199-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10199-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10199-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10199-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10199-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10199-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10199-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10199-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10199-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10202-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202==
==10202== HEAP SUMMARY:
==10202== in use at exit: 3,113,975 bytes in 68,960 blocks
==10202== total heap usage: 1,598,076 allocs, 1,529,116 frees, 129,169,912 bytes allocated
==10202==
==10202== Searching for pointers to 68,960 not-freed blocks
--10202-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10202-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10202-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10202-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10202-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10202-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10202-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10202-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10202-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10202-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10202-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10202-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10202-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10202-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10202-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10202-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10202-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10202-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10202-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10202-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10202-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10202-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10202-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10202-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10202-- Scanning root segment: 0x701a000..0x701afff (4096)
--10202-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10202-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10202-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10202-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10202-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10202-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10202-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10202-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10202-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10202-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10198== Checked 4,839,344 bytes
==10198==
==10199== Checked 4,789,064 bytes
==10199==
==10198== LEAK SUMMARY:
==10198== definitely lost: 2,221 bytes in 14 blocks
==10198== indirectly lost: 6,796 bytes in 9 blocks
==10198== possibly lost: 0 bytes in 0 blocks
==10198== still reachable: 3,128,337 bytes in 69,513 blocks
==10198== suppressed: 0 bytes in 0 blocks
==10198== Rerun with --leak-check=full to see details of leaked memory
==10198==
==10198== Use --track-origins=yes to see where uninitialised values come from
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10198==
==10198== 1 errors in context 1 of 2:
==10198== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10198== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10198== by 0x488CD0: stringsubst (subst.c:301)
==10198== by 0x48801B: prefork (subst.c:77)
==10198== by 0x42B318: execcmd (exec.c:2619)
==10198== by 0x428CA0: execpline2 (exec.c:1697)
==10198== by 0x427FD2: execpline (exec.c:1484)
==10198== by 0x427756: execlist (exec.c:1267)
==10198== by 0x42717C: execode (exec.c:1073)
==10198== by 0x431299: runshfunc (exec.c:5040)
==10198== by 0x430E76: doshfunc (exec.c:4920)
==10198== by 0x4302FB: execshfunc (exec.c:4557)
==10198== by 0x42D8C1: execcmd (exec.c:3373)
==10198==
==10198==
==10198== 2 errors in context 2 of 2:
==10198== Conditional jump or move depends on uninitialised value(s)
==10198== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10198== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10198== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10198== by 0x40EFC2: execbuiltin (builtin.c:450)
==10198== by 0x42D8E9: execcmd (exec.c:3378)
==10198== by 0x428CA0: execpline2 (exec.c:1697)
==10198== by 0x427FD2: execpline (exec.c:1484)
==10198== by 0x42779A: execlist (exec.c:1275)
==10198== by 0x42717C: execode (exec.c:1073)
==10198== by 0x431299: runshfunc (exec.c:5040)
==10198== by 0x430E76: doshfunc (exec.c:4920)
==10198== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10198==
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10206-by-pythonnut-on-???
==10206== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10206-by-pythonnut-on-???
==10206== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10206-by-pythonnut-on-???
==10206==
==10206== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10206== don't want to do, unless you know exactly what you're doing,
==10206== or are doing some strange experiment):
==10206== /usr/lib/valgrind/../../bin/vgdb --pid=10206 ...command...
==10206==
==10206== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10206== /path/to/gdb ./zsh
==10206== and then give GDB the following command
==10206== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10206
==10206== --pid is optional if only one valgrind process is running
==10206==
==10199== LEAK SUMMARY:
==10199== definitely lost: 2,197 bytes in 13 blocks
==10199== indirectly lost: 6,756 bytes in 7 blocks
==10199== possibly lost: 0 bytes in 0 blocks
==10199== still reachable: 3,103,833 bytes in 68,951 blocks
==10199== suppressed: 0 bytes in 0 blocks
==10199== Rerun with --leak-check=full to see details of leaked memory
==10199==
==10199== Use --track-origins=yes to see where uninitialised values come from
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10199==
==10199== 1 errors in context 1 of 2:
==10199== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10199== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10199== by 0x488CD0: stringsubst (subst.c:301)
==10199== by 0x48801B: prefork (subst.c:77)
==10199== by 0x42B318: execcmd (exec.c:2619)
==10199== by 0x428CA0: execpline2 (exec.c:1697)
==10199== by 0x427FD2: execpline (exec.c:1484)
==10199== by 0x427756: execlist (exec.c:1267)
==10199== by 0x42717C: execode (exec.c:1073)
==10199== by 0x431299: runshfunc (exec.c:5040)
==10199== by 0x430E76: doshfunc (exec.c:4920)
==10199== by 0x4302FB: execshfunc (exec.c:4557)
==10199== by 0x42D8C1: execcmd (exec.c:3373)
==10199==
==10199==
==10199== 2 errors in context 2 of 2:
==10199== Conditional jump or move depends on uninitialised value(s)
==10199== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10199== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10199== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10199== by 0x40EFC2: execbuiltin (builtin.c:450)
==10199== by 0x42D8E9: execcmd (exec.c:3378)
==10199== by 0x428CA0: execpline2 (exec.c:1697)
==10199== by 0x427FD2: execpline (exec.c:1484)
==10199== by 0x42779A: execlist (exec.c:1275)
==10199== by 0x42717C: execode (exec.c:1073)
==10199== by 0x431299: runshfunc (exec.c:5040)
==10199== by 0x430E76: doshfunc (exec.c:4920)
==10199== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10199==
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10206-- Caught __NR_exit; running __libc_freeres()
--10196-- Caught __NR_exit; running __libc_freeres()
==10196== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10196-by-pythonnut-on-???
==10196== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10196-by-pythonnut-on-???
==10196== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10196-by-pythonnut-on-???
==10196==
==10196== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10196== don't want to do, unless you know exactly what you're doing,
==10196== or are doing some strange experiment):
==10196== /usr/lib/valgrind/../../bin/vgdb --pid=10196 ...command...
==10196==
==10196== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10196== /path/to/gdb ./zsh
==10196== and then give GDB the following command
==10196== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10196
==10196== --pid is optional if only one valgrind process is running
==10196==
==10202== Checked 4,774,928 bytes
==10202==
--10206-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10196-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202== LEAK SUMMARY:
==10202== definitely lost: 2,197 bytes in 13 blocks
==10202== indirectly lost: 6,756 bytes in 7 blocks
==10202== possibly lost: 0 bytes in 0 blocks
==10202== still reachable: 3,105,022 bytes in 68,940 blocks
==10202== suppressed: 0 bytes in 0 blocks
==10202== Rerun with --leak-check=full to see details of leaked memory
==10202==
==10202== Use --track-origins=yes to see where uninitialised values come from
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10202==
==10202== 1 errors in context 1 of 2:
==10202== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10202== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10202== by 0x488CD0: stringsubst (subst.c:301)
==10202== by 0x48801B: prefork (subst.c:77)
==10202== by 0x42B318: execcmd (exec.c:2619)
==10202== by 0x428CA0: execpline2 (exec.c:1697)
==10202== by 0x427FD2: execpline (exec.c:1484)
==10202== by 0x427756: execlist (exec.c:1267)
==10202== by 0x42717C: execode (exec.c:1073)
==10202== by 0x431299: runshfunc (exec.c:5040)
==10202== by 0x430E76: doshfunc (exec.c:4920)
==10202== by 0x4302FB: execshfunc (exec.c:4557)
==10202== by 0x42D8C1: execcmd (exec.c:3373)
==10202==
==10202==
==10202== 2 errors in context 2 of 2:
==10202== Conditional jump or move depends on uninitialised value(s)
==10202== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10202== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10202== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10202== by 0x40EFC2: execbuiltin (builtin.c:450)
==10202== by 0x42D8E9: execcmd (exec.c:3378)
==10202== by 0x428CA0: execpline2 (exec.c:1697)
==10202== by 0x427FD2: execpline (exec.c:1484)
==10202== by 0x42779A: execlist (exec.c:1275)
==10202== by 0x42717C: execode (exec.c:1073)
==10202== by 0x431299: runshfunc (exec.c:5040)
==10202== by 0x430E76: doshfunc (exec.c:4920)
==10202== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10202==
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206==
==10196==
==10206== HEAP SUMMARY:
==10206== in use at exit: 3,137,353 bytes in 69,536 blocks
==10206== total heap usage: 1,595,212 allocs, 1,525,676 frees, 128,944,022 bytes allocated
==10206==
==10196== HEAP SUMMARY:
==10196== in use at exit: 3,112,722 bytes in 68,968 blocks
==10196== total heap usage: 1,598,088 allocs, 1,529,120 frees, 129,058,773 bytes allocated
==10196==
client request: code 4d430005, addr 0xFFEFF073C, len 4
==10196== Searching for pointers to 68,968 not-freed blocks
--10196-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10196-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10196-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10196-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10196-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10196-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10196-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10196-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10196-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10196-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10196-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10196-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10196-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10196-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10196-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10196-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10196-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10196-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10196-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10196-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10196-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10196-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10196-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10196-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10196-- Scanning root segment: 0x701a000..0x701afff (4096)
--10196-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10196-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10196-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10196-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10196-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10196-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10196-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10196-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10196-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10196-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10206== Searching for pointers to 69,536 not-freed blocks
--10206-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10206-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10206-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10206-- Scanning root segment: 0x4037000..0x403efff (32768)
--10206-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10206-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10206-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10206-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10206-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10206-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10206-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10206-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10206-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10206-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10206-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10206-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10206-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10206-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10206-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10206-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10206-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10206-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10206-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10206-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10206-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10206-- Scanning root segment: 0x701a000..0x701afff (4096)
--10206-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10206-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10206-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10206-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10206-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10206-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10206-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10206-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10206-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10206-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10196== Checked 4,788,376 bytes
==10196==
==10206== Checked 4,839,344 bytes
==10206==
==10196== LEAK SUMMARY:
==10196== definitely lost: 2,197 bytes in 13 blocks
==10196== indirectly lost: 6,756 bytes in 7 blocks
==10196== possibly lost: 0 bytes in 0 blocks
==10196== still reachable: 3,103,769 bytes in 68,948 blocks
==10196== suppressed: 0 bytes in 0 blocks
==10196== Rerun with --leak-check=full to see details of leaked memory
==10196==
==10196== Use --track-origins=yes to see where uninitialised values come from
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10196==
==10196== 1 errors in context 1 of 2:
==10196== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10196== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10196== by 0x488CD0: stringsubst (subst.c:301)
==10196== by 0x48801B: prefork (subst.c:77)
==10196== by 0x42B318: execcmd (exec.c:2619)
==10196== by 0x428CA0: execpline2 (exec.c:1697)
==10196== by 0x427FD2: execpline (exec.c:1484)
==10196== by 0x427756: execlist (exec.c:1267)
==10196== by 0x42717C: execode (exec.c:1073)
==10196== by 0x431299: runshfunc (exec.c:5040)
==10196== by 0x430E76: doshfunc (exec.c:4920)
==10196== by 0x4302FB: execshfunc (exec.c:4557)
==10196== by 0x42D8C1: execcmd (exec.c:3373)
==10196==
==10196==
==10196== 2 errors in context 2 of 2:
==10196== Conditional jump or move depends on uninitialised value(s)
==10196== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10196== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10196== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10196== by 0x40EFC2: execbuiltin (builtin.c:450)
==10196== by 0x42D8E9: execcmd (exec.c:3378)
==10196== by 0x428CA0: execpline2 (exec.c:1697)
==10196== by 0x427FD2: execpline (exec.c:1484)
==10196== by 0x42779A: execlist (exec.c:1275)
==10196== by 0x42717C: execode (exec.c:1073)
==10196== by 0x431299: runshfunc (exec.c:5040)
==10196== by 0x430E76: doshfunc (exec.c:4920)
==10196== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10196==
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10207-- Caught __NR_exit; running __libc_freeres()
==10206== LEAK SUMMARY:
==10206== definitely lost: 2,221 bytes in 14 blocks
==10206== indirectly lost: 6,796 bytes in 9 blocks
==10206== possibly lost: 0 bytes in 0 blocks
==10206== still reachable: 3,128,336 bytes in 69,513 blocks
==10206== suppressed: 0 bytes in 0 blocks
==10206== Rerun with --leak-check=full to see details of leaked memory
==10206==
==10206== Use --track-origins=yes to see where uninitialised values come from
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206==
==10206== 1 errors in context 1 of 2:
==10206== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10206== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10206== by 0x488CD0: stringsubst (subst.c:301)
==10206== by 0x48801B: prefork (subst.c:77)
==10206== by 0x42B318: execcmd (exec.c:2619)
==10206== by 0x428CA0: execpline2 (exec.c:1697)
==10206== by 0x427FD2: execpline (exec.c:1484)
==10206== by 0x427756: execlist (exec.c:1267)
==10206== by 0x42717C: execode (exec.c:1073)
==10206== by 0x431299: runshfunc (exec.c:5040)
==10206== by 0x430E76: doshfunc (exec.c:4920)
==10206== by 0x4302FB: execshfunc (exec.c:4557)
==10206== by 0x42D8C1: execcmd (exec.c:3373)
==10206==
==10206==
==10206== 2 errors in context 2 of 2:
==10206== Conditional jump or move depends on uninitialised value(s)
==10206== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10206== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10206== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10206== by 0x40EFC2: execbuiltin (builtin.c:450)
==10206== by 0x42D8E9: execcmd (exec.c:3378)
==10206== by 0x428CA0: execpline2 (exec.c:1697)
==10206== by 0x427FD2: execpline (exec.c:1484)
==10206== by 0x42779A: execlist (exec.c:1275)
==10206== by 0x42717C: execode (exec.c:1073)
==10206== by 0x431299: runshfunc (exec.c:5040)
==10206== by 0x430E76: doshfunc (exec.c:4920)
==10206== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10206==
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10207-by-pythonnut-on-???
==10207== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10207-by-pythonnut-on-???
==10207== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10207-by-pythonnut-on-???
==10207==
==10207== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10207== don't want to do, unless you know exactly what you're doing,
==10207== or are doing some strange experiment):
==10207== /usr/lib/valgrind/../../bin/vgdb --pid=10207 ...command...
==10207==
==10207== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10207== /path/to/gdb ./zsh
==10207== and then give GDB the following command
==10207== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10207
==10207== --pid is optional if only one valgrind process is running
==10207==
--10255-- Caught __NR_exit; running __libc_freeres()
==10256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10256-by-pythonnut-on-???
==10256== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10256-by-pythonnut-on-???
==10256== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10256-by-pythonnut-on-???
==10256==
==10256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10256== don't want to do, unless you know exactly what you're doing,
==10256== or are doing some strange experiment):
==10256== /usr/lib/valgrind/../../bin/vgdb --pid=10256 ...command...
==10256==
==10256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10256== /path/to/gdb ./zsh
==10256== and then give GDB the following command
==10256== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10256
==10256== --pid is optional if only one valgrind process is running
==10256==
--10256-- Caught __NR_exit; running __libc_freeres()
==10255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10255-by-pythonnut-on-???
==10255== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10255-by-pythonnut-on-???
==10255== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10255-by-pythonnut-on-???
==10255==
==10255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10255== don't want to do, unless you know exactly what you're doing,
==10255== or are doing some strange experiment):
==10255== /usr/lib/valgrind/../../bin/vgdb --pid=10255 ...command...
==10255==
==10255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10255== /path/to/gdb ./zsh
==10255== and then give GDB the following command
==10255== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10255
==10255== --pid is optional if only one valgrind process is running
==10255==
--10207-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10207==
==10207== HEAP SUMMARY:
==10207== in use at exit: 3,114,366 bytes in 68,968 blocks
==10207== total heap usage: 1,598,092 allocs, 1,529,124 frees, 129,174,023 bytes allocated
==10207==
--10255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255==
--10256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255== HEAP SUMMARY:
==10255== in use at exit: 3,112,729 bytes in 68,968 blocks
==10255== total heap usage: 1,598,103 allocs, 1,529,135 frees, 129,063,771 bytes allocated
==10255==
==10256==
==10256== HEAP SUMMARY:
==10256== in use at exit: 3,137,352 bytes in 69,536 blocks
==10256== total heap usage: 1,595,217 allocs, 1,525,681 frees, 128,946,135 bytes allocated
==10256==
==10207== Searching for pointers to 68,968 not-freed blocks
--10207-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10207-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10207-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10207-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10207-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10207-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10207-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10207-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10207-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10207-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10207-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10207-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10207-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10207-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10207-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10207-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10207-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10207-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10207-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10207-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10207-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10207-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10207-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10207-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10207-- Scanning root segment: 0x701a000..0x701afff (4096)
--10207-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10207-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10207-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10207-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10207-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10207-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10207-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10207-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10207-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10207-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10255== Searching for pointers to 68,968 not-freed blocks
--10255-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10255-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10255-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10255-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10255-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10255-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10255-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10255-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10255-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10255-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10255-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10255-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10255-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10255-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10255-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10255-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10255-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10255-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10255-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10255-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10255-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10255-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10255-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10255-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10255-- Scanning root segment: 0x701a000..0x701afff (4096)
--10255-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10255-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10255-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10255-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10255-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10255-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10255-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10255-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10255-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10255-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10256== Searching for pointers to 69,536 not-freed blocks
--10256-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10256-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10256-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10256-- Scanning root segment: 0x4037000..0x403efff (32768)
--10256-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10256-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10256-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10256-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10256-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10256-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10256-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10256-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10256-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10256-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10256-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10256-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10256-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10256-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10256-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10256-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10256-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10256-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10256-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10256-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10256-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10256-- Scanning root segment: 0x701a000..0x701afff (4096)
--10256-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10256-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10256-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10256-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10256-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10256-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10256-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10256-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10256-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10256-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10207== Checked 4,775,032 bytes
==10207==
==10255== Checked 4,788,512 bytes
==10255==
==10207== LEAK SUMMARY:
==10207== definitely lost: 2,197 bytes in 13 blocks
==10207== indirectly lost: 6,756 bytes in 7 blocks
==10207== possibly lost: 0 bytes in 0 blocks
==10207== still reachable: 3,105,413 bytes in 68,948 blocks
==10207== suppressed: 0 bytes in 0 blocks
==10207== Rerun with --leak-check=full to see details of leaked memory
==10207==
==10207== Use --track-origins=yes to see where uninitialised values come from
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207==
==10207== 1 errors in context 1 of 2:
==10207== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10207== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10207== by 0x488CD0: stringsubst (subst.c:301)
==10207== by 0x48801B: prefork (subst.c:77)
==10207== by 0x42B318: execcmd (exec.c:2619)
==10207== by 0x428CA0: execpline2 (exec.c:1697)
==10207== by 0x427FD2: execpline (exec.c:1484)
==10207== by 0x427756: execlist (exec.c:1267)
==10207== by 0x42717C: execode (exec.c:1073)
==10207== by 0x431299: runshfunc (exec.c:5040)
==10207== by 0x430E76: doshfunc (exec.c:4920)
==10207== by 0x4302FB: execshfunc (exec.c:4557)
==10207== by 0x42D8C1: execcmd (exec.c:3373)
==10207==
==10207==
==10207== 2 errors in context 2 of 2:
==10207== Conditional jump or move depends on uninitialised value(s)
==10207== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10207== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10207== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10207== by 0x40EFC2: execbuiltin (builtin.c:450)
==10207== by 0x42D8E9: execcmd (exec.c:3378)
==10207== by 0x428CA0: execpline2 (exec.c:1697)
==10207== by 0x427FD2: execpline (exec.c:1484)
==10207== by 0x42779A: execlist (exec.c:1275)
==10207== by 0x42717C: execode (exec.c:1073)
==10207== by 0x431299: runshfunc (exec.c:5040)
==10207== by 0x430E76: doshfunc (exec.c:4920)
==10207== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10207==
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Caught __NR_exit; running __libc_freeres()
==10256== Checked 4,839,344 bytes
==10256==
==10255== LEAK SUMMARY:
==10255== definitely lost: 2,197 bytes in 13 blocks
==10255== indirectly lost: 6,756 bytes in 7 blocks
==10255== possibly lost: 0 bytes in 0 blocks
==10255== still reachable: 3,103,776 bytes in 68,948 blocks
==10255== suppressed: 0 bytes in 0 blocks
==10255== Rerun with --leak-check=full to see details of leaked memory
==10255==
==10255== Use --track-origins=yes to see where uninitialised values come from
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10255==
==10255== 1 errors in context 1 of 2:
==10255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10255== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10255== by 0x488CD0: stringsubst (subst.c:301)
==10255== by 0x48801B: prefork (subst.c:77)
==10255== by 0x42B318: execcmd (exec.c:2619)
==10255== by 0x428CA0: execpline2 (exec.c:1697)
==10255== by 0x427FD2: execpline (exec.c:1484)
==10255== by 0x427756: execlist (exec.c:1267)
==10255== by 0x42717C: execode (exec.c:1073)
==10255== by 0x431299: runshfunc (exec.c:5040)
==10255== by 0x430E76: doshfunc (exec.c:4920)
==10255== by 0x4302FB: execshfunc (exec.c:4557)
==10255== by 0x42D8C1: execcmd (exec.c:3373)
==10255==
==10255==
==10255== 2 errors in context 2 of 2:
==10255== Conditional jump or move depends on uninitialised value(s)
==10255== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10255== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10255== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10255== by 0x40EFC2: execbuiltin (builtin.c:450)
==10255== by 0x42D8E9: execcmd (exec.c:3378)
==10255== by 0x428CA0: execpline2 (exec.c:1697)
==10255== by 0x427FD2: execpline (exec.c:1484)
==10255== by 0x42779A: execlist (exec.c:1275)
==10255== by 0x42717C: execode (exec.c:1073)
==10255== by 0x431299: runshfunc (exec.c:5040)
==10255== by 0x430E76: doshfunc (exec.c:4920)
==10255== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10255==
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10256== LEAK SUMMARY:
==10256== definitely lost: 2,221 bytes in 14 blocks
==10256== indirectly lost: 6,796 bytes in 9 blocks
==10256== possibly lost: 0 bytes in 0 blocks
==10256== still reachable: 3,128,335 bytes in 69,513 blocks
==10256== suppressed: 0 bytes in 0 blocks
==10256== Rerun with --leak-check=full to see details of leaked memory
==10256==
==10256== Use --track-origins=yes to see where uninitialised values come from
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10256==
==10256== 1 errors in context 1 of 2:
==10256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10256== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10256== by 0x488CD0: stringsubst (subst.c:301)
==10256== by 0x48801B: prefork (subst.c:77)
==10256== by 0x42B318: execcmd (exec.c:2619)
==10256== by 0x428CA0: execpline2 (exec.c:1697)
==10256== by 0x427FD2: execpline (exec.c:1484)
==10256== by 0x427756: execlist (exec.c:1267)
==10256== by 0x42717C: execode (exec.c:1073)
==10256== by 0x431299: runshfunc (exec.c:5040)
==10256== by 0x430E76: doshfunc (exec.c:4920)
==10256== by 0x4302FB: execshfunc (exec.c:4557)
==10256== by 0x42D8C1: execcmd (exec.c:3373)
==10256==
==10256==
==10256== 2 errors in context 2 of 2:
==10256== Conditional jump or move depends on uninitialised value(s)
==10256== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10256== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10256== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10256== by 0x40EFC2: execbuiltin (builtin.c:450)
==10256== by 0x42D8E9: execcmd (exec.c:3378)
==10256== by 0x428CA0: execpline2 (exec.c:1697)
==10256== by 0x427FD2: execpline (exec.c:1484)
==10256== by 0x42779A: execlist (exec.c:1275)
==10256== by 0x42717C: execode (exec.c:1073)
==10256== by 0x431299: runshfunc (exec.c:5040)
==10256== by 0x430E76: doshfunc (exec.c:4920)
==10256== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10256==
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200==
--10257-- Caught __NR_exit; running __libc_freeres()
==10200== HEAP SUMMARY:
==10200== in use at exit: 3,113,504 bytes in 68,949 blocks
==10200== total heap usage: 1,598,101 allocs, 1,529,152 frees, 129,176,026 bytes allocated
==10200==
==10258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10258-by-pythonnut-on-???
==10258== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10258-by-pythonnut-on-???
==10258== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10258-by-pythonnut-on-???
==10258==
==10258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10258== don't want to do, unless you know exactly what you're doing,
==10258== or are doing some strange experiment):
==10258== /usr/lib/valgrind/../../bin/vgdb --pid=10258 ...command...
==10258==
==10258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10258== /path/to/gdb ./zsh
==10258== and then give GDB the following command
==10258== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10258
==10258== --pid is optional if only one valgrind process is running
==10258==
==10257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10257-by-pythonnut-on-???
==10257== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10257-by-pythonnut-on-???
==10257== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10257-by-pythonnut-on-???
==10257==
==10257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10257== don't want to do, unless you know exactly what you're doing,
==10257== or are doing some strange experiment):
==10257== /usr/lib/valgrind/../../bin/vgdb --pid=10257 ...command...
==10257==
==10257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10257== /path/to/gdb ./zsh
==10257== and then give GDB the following command
==10257== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10257
==10257== --pid is optional if only one valgrind process is running
==10257==
--10258-- Caught __NR_exit; running __libc_freeres()
--10257-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10200== Searching for pointers to 68,949 not-freed blocks
--10200-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10200-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10200-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10200-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10200-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10200-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10200-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10200-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10200-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10200-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10200-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10200-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10200-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10200-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10200-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10200-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10200-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10200-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10200-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10200-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10200-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10200-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10200-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10200-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10200-- Scanning root segment: 0x701a000..0x701afff (4096)
--10200-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10200-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10200-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10200-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10200-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10200-- Scanning root segment: 0xb46a000..0xb46afff (4096)
==10257==
--10200-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10200-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10200-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10200-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10257== HEAP SUMMARY:
==10257== in use at exit: 3,112,889 bytes in 68,969 blocks
==10257== total heap usage: 1,598,120 allocs, 1,529,151 frees, 129,068,622 bytes allocated
==10257==
--10258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10258==
==10258== HEAP SUMMARY:
==10258== in use at exit: 3,137,351 bytes in 69,536 blocks
==10258== total heap usage: 1,595,225 allocs, 1,525,689 frees, 128,949,788 bytes allocated
==10258==
==10257== Searching for pointers to 68,969 not-freed blocks
--10257-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10257-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10257-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10257-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10257-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10257-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10257-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10257-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10257-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10257-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10257-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10257-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10257-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10257-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10257-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10257-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10257-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10257-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10257-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10257-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10257-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10257-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10257-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10257-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10257-- Scanning root segment: 0x701a000..0x701afff (4096)
--10257-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10257-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10257-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10257-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10257-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10257-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10257-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10257-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10257-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10257-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10258== Searching for pointers to 69,536 not-freed blocks
--10258-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10258-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10258-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10258-- Scanning root segment: 0x4037000..0x403efff (32768)
--10258-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10258-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10258-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10258-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10258-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10258-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10258-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10258-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10258-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10258-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10258-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10258-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10258-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10258-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10258-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10258-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10258-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10258-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10258-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10258-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10258-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10258-- Scanning root segment: 0x701a000..0x701afff (4096)
--10258-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10258-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10258-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10258-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10258-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10258-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10258-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10258-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10258-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10258-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10200== Checked 4,772,416 bytes
==10200==
==10200== LEAK SUMMARY:
==10200== definitely lost: 2,197 bytes in 13 blocks
==10200== indirectly lost: 6,756 bytes in 7 blocks
==10200== possibly lost: 0 bytes in 0 blocks
==10200== still reachable: 3,104,551 bytes in 68,929 blocks
==10200== suppressed: 0 bytes in 0 blocks
==10200== Rerun with --leak-check=full to see details of leaked memory
==10200==
==10200== Use --track-origins=yes to see where uninitialised values come from
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200==
==10200== 1 errors in context 1 of 2:
==10200== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10200== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10200== by 0x488CD0: stringsubst (subst.c:301)
==10200== by 0x48801B: prefork (subst.c:77)
==10200== by 0x42B318: execcmd (exec.c:2619)
==10200== by 0x428CA0: execpline2 (exec.c:1697)
==10200== by 0x427FD2: execpline (exec.c:1484)
==10200== by 0x427756: execlist (exec.c:1267)
==10200== by 0x42717C: execode (exec.c:1073)
==10200== by 0x431299: runshfunc (exec.c:5040)
==10200== by 0x430E76: doshfunc (exec.c:4920)
==10200== by 0x4302FB: execshfunc (exec.c:4557)
==10200== by 0x42D8C1: execcmd (exec.c:3373)
==10200==
==10200==
==10200== 2 errors in context 2 of 2:
==10200== Conditional jump or move depends on uninitialised value(s)
==10200== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10200== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10200== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10200== by 0x40EFC2: execbuiltin (builtin.c:450)
==10200== by 0x42D8E9: execcmd (exec.c:3378)
==10200== by 0x428CA0: execpline2 (exec.c:1697)
==10200== by 0x427FD2: execpline (exec.c:1484)
==10200== by 0x42779A: execlist (exec.c:1275)
==10200== by 0x42717C: execode (exec.c:1073)
==10200== by 0x431299: runshfunc (exec.c:5040)
==10200== by 0x430E76: doshfunc (exec.c:4920)
==10200== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10200==
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257== Checked 4,787,856 bytes
==10257==
==10257== LEAK SUMMARY:
==10257== definitely lost: 2,197 bytes in 13 blocks
==10257== indirectly lost: 6,756 bytes in 7 blocks
==10257== possibly lost: 0 bytes in 0 blocks
==10257== still reachable: 3,103,936 bytes in 68,949 blocks
==10257== suppressed: 0 bytes in 0 blocks
==10257== Rerun with --leak-check=full to see details of leaked memory
==10257==
==10257== Use --track-origins=yes to see where uninitialised values come from
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257==
==10257== 1 errors in context 1 of 2:
==10257== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10257== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10257== by 0x488CD0: stringsubst (subst.c:301)
==10257== by 0x48801B: prefork (subst.c:77)
==10257== by 0x42B318: execcmd (exec.c:2619)
==10257== by 0x428CA0: execpline2 (exec.c:1697)
==10257== by 0x427FD2: execpline (exec.c:1484)
==10257== by 0x427756: execlist (exec.c:1267)
==10257== by 0x42717C: execode (exec.c:1073)
==10257== by 0x431299: runshfunc (exec.c:5040)
==10257== by 0x430E76: doshfunc (exec.c:4920)
==10257== by 0x4302FB: execshfunc (exec.c:4557)
==10257== by 0x42D8C1: execcmd (exec.c:3373)
==10257==
==10257==
==10257== 2 errors in context 2 of 2:
==10257== Conditional jump or move depends on uninitialised value(s)
==10257== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10257== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10257== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10257== by 0x40EFC2: execbuiltin (builtin.c:450)
==10257== by 0x42D8E9: execcmd (exec.c:3378)
==10258== Checked 4,839,344 bytes
==10257== by 0x428CA0: execpline2 (exec.c:1697)
==10258==
==10257== by 0x427FD2: execpline (exec.c:1484)
==10257== by 0x42779A: execlist (exec.c:1275)
==10257== by 0x42717C: execode (exec.c:1073)
==10257== by 0x431299: runshfunc (exec.c:5040)
==10257== by 0x430E76: doshfunc (exec.c:4920)
==10257== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10257==
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10260-- Caught __NR_exit; running __libc_freeres()
==10260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10260-by-pythonnut-on-???
==10260== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10260-by-pythonnut-on-???
==10260== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10260-by-pythonnut-on-???
==10260==
==10260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10260== don't want to do, unless you know exactly what you're doing,
==10260== or are doing some strange experiment):
==10260== /usr/lib/valgrind/../../bin/vgdb --pid=10260 ...command...
==10260==
==10260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10260== /path/to/gdb ./zsh
==10260== and then give GDB the following command
==10260== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10260
==10260== --pid is optional if only one valgrind process is running
==10260==
==10258== LEAK SUMMARY:
==10258== definitely lost: 2,221 bytes in 14 blocks
==10258== indirectly lost: 6,796 bytes in 9 blocks
==10258== possibly lost: 0 bytes in 0 blocks
==10258== still reachable: 3,128,334 bytes in 69,513 blocks
==10258== suppressed: 0 bytes in 0 blocks
==10258== Rerun with --leak-check=full to see details of leaked memory
==10258==
==10258== Use --track-origins=yes to see where uninitialised values come from
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10258==
==10258== 1 errors in context 1 of 2:
==10258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10258== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10258== by 0x488CD0: stringsubst (subst.c:301)
==10258== by 0x48801B: prefork (subst.c:77)
==10258== by 0x42B318: execcmd (exec.c:2619)
==10258== by 0x428CA0: execpline2 (exec.c:1697)
==10258== by 0x427FD2: execpline (exec.c:1484)
==10258== by 0x427756: execlist (exec.c:1267)
==10258== by 0x42717C: execode (exec.c:1073)
==10258== by 0x431299: runshfunc (exec.c:5040)
==10258== by 0x430E76: doshfunc (exec.c:4920)
==10258== by 0x4302FB: execshfunc (exec.c:4557)
==10258== by 0x42D8C1: execcmd (exec.c:3373)
==10258==
==10258==
==10258== 2 errors in context 2 of 2:
==10258== Conditional jump or move depends on uninitialised value(s)
==10258== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10258== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10258== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10258== by 0x40EFC2: execbuiltin (builtin.c:450)
==10258== by 0x42D8E9: execcmd (exec.c:3378)
==10258== by 0x428CA0: execpline2 (exec.c:1697)
==10258== by 0x427FD2: execpline (exec.c:1484)
==10258== by 0x42779A: execlist (exec.c:1275)
==10258== by 0x42717C: execode (exec.c:1073)
==10258== by 0x431299: runshfunc (exec.c:5040)
==10258== by 0x430E76: doshfunc (exec.c:4920)
==10258== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10258==
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10261-by-pythonnut-on-???
==10261== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10261-by-pythonnut-on-???
==10261== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10261-by-pythonnut-on-???
==10261==
==10261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10261== don't want to do, unless you know exactly what you're doing,
==10261== or are doing some strange experiment):
==10261== /usr/lib/valgrind/../../bin/vgdb --pid=10261 ...command...
==10261==
==10261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10261== /path/to/gdb ./zsh
==10261== and then give GDB the following command
==10261== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10261
==10261== --pid is optional if only one valgrind process is running
==10261==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--10260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10263-by-pythonnut-on-???
==10263== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10263-by-pythonnut-on-???
==10263== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10263-by-pythonnut-on-???
==10263==
==10263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10263== don't want to do, unless you know exactly what you're doing,
==10263== or are doing some strange experiment):
==10263== /usr/lib/valgrind/../../bin/vgdb --pid=10263 ...command...
==10263==
==10263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10263== /path/to/gdb ./zsh
==10263== and then give GDB the following command
==10263== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10263
==10263== --pid is optional if only one valgrind process is running
==10263==
--10261-- Caught __NR_exit; running __libc_freeres()
==10260==
==10260== HEAP SUMMARY:
==10260== in use at exit: 3,115,245 bytes in 69,011 blocks
==10260== total heap usage: 1,598,167 allocs, 1,529,156 frees, 129,184,603 bytes allocated
==10260==
--10263-- Caught __NR_exit; running __libc_freeres()
--10261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10260== Searching for pointers to 69,011 not-freed blocks
--10260-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10260-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10260-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10260-- Scanning root segment: 0x4037000..0x403afff (16384)
--10260-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10260-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10260-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10260-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10260-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10260-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10260-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10260-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10260-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10260-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10260-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10260-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10260-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10260-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10260-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10260-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10260-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10260-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10260-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10260-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10260-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10260-- Scanning root segment: 0x701a000..0x701afff (4096)
--10260-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10260-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10260-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10260-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10260-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10260-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10260-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10260-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10260-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10260-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10261==
--10263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10261== HEAP SUMMARY:
==10261== in use at exit: 3,113,095 bytes in 68,974 blocks
==10261== total heap usage: 1,598,167 allocs, 1,529,193 frees, 129,077,574 bytes allocated
==10261==
==10263==
==10263== HEAP SUMMARY:
==10263== in use at exit: 3,137,354 bytes in 69,536 blocks
==10263== total heap usage: 1,595,227 allocs, 1,525,691 frees, 128,950,365 bytes allocated
==10263==
==10261== Searching for pointers to 68,974 not-freed blocks
--10261-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10261-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10261-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10261-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10261-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10261-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10261-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10261-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10261-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10261-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10261-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10261-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10261-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10261-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10261-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10261-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10261-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10261-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10261-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10261-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10261-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==10263== Searching for pointers to 69,536 not-freed blocks
--10261-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261-- Scanning root segment: 0x701a000..0x701afff (4096)
--10261-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10261-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10261-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10263-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10261-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10261-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10261-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10261-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10261-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10261-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10263-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10263-- Scanning root segment: 0x4037000..0x403efff (32768)
--10263-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10263-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10263-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10263-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10263-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10263-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10263-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10263-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10263-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10263-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10263-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10263-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10263-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10263-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10263-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10263-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10263-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10263-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10263-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10263-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10263-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263-- Scanning root segment: 0x701a000..0x701afff (4096)
--10263-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10263-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10263-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10263-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10263-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10263-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10263-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10263-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10263-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10263-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10260== Checked 4,791,024 bytes
==10260==
==10260== LEAK SUMMARY:
==10260== definitely lost: 2,197 bytes in 13 blocks
==10260== indirectly lost: 6,756 bytes in 7 blocks
==10260== possibly lost: 0 bytes in 0 blocks
==10260== still reachable: 3,106,292 bytes in 68,991 blocks
==10260== suppressed: 0 bytes in 0 blocks
==10260== Rerun with --leak-check=full to see details of leaked memory
==10260==
==10260== Use --track-origins=yes to see where uninitialised values come from
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10260==
==10260== 1 errors in context 1 of 2:
==10260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10260== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10260== by 0x488CD0: stringsubst (subst.c:301)
==10260== by 0x48801B: prefork (subst.c:77)
==10260== by 0x42B318: execcmd (exec.c:2619)
==10260== by 0x428CA0: execpline2 (exec.c:1697)
==10260== by 0x427FD2: execpline (exec.c:1484)
==10260== by 0x427756: execlist (exec.c:1267)
==10260== by 0x42717C: execode (exec.c:1073)
==10260== by 0x431299: runshfunc (exec.c:5040)
==10260== by 0x430E76: doshfunc (exec.c:4920)
==10260== by 0x4302FB: execshfunc (exec.c:4557)
==10260== by 0x42D8C1: execcmd (exec.c:3373)
==10260==
==10260==
==10260== 2 errors in context 2 of 2:
==10260== Conditional jump or move depends on uninitialised value(s)
==10260== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10260== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10260== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10260== by 0x40EFC2: execbuiltin (builtin.c:450)
==10260== by 0x42D8E9: execcmd (exec.c:3378)
==10260== by 0x428CA0: execpline2 (exec.c:1697)
==10260== by 0x427FD2: execpline (exec.c:1484)
==10260== by 0x42779A: execlist (exec.c:1275)
==10260== by 0x42717C: execode (exec.c:1073)
==10260== by 0x431299: runshfunc (exec.c:5040)
==10260== by 0x430E76: doshfunc (exec.c:4920)
==10260== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10260==
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Caught __NR_exit; running __libc_freeres()
==10261== Checked 4,788,000 bytes
==10261==
==10263== Checked 4,839,344 bytes
==10263==
==10259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10259-by-pythonnut-on-???
==10259== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10259-by-pythonnut-on-???
==10259== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10259-by-pythonnut-on-???
==10259==
==10259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10259== don't want to do, unless you know exactly what you're doing,
==10259== or are doing some strange experiment):
==10259== /usr/lib/valgrind/../../bin/vgdb --pid=10259 ...command...
==10259==
==10259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10259== /path/to/gdb ./zsh
==10259== and then give GDB the following command
==10259== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10259
==10259== --pid is optional if only one valgrind process is running
==10259==
==10261== LEAK SUMMARY:
==10261== definitely lost: 2,197 bytes in 13 blocks
==10261== indirectly lost: 6,756 bytes in 7 blocks
==10261== possibly lost: 0 bytes in 0 blocks
==10261== still reachable: 3,104,142 bytes in 68,954 blocks
==10261== suppressed: 0 bytes in 0 blocks
==10261== Rerun with --leak-check=full to see details of leaked memory
==10261==
==10261== Use --track-origins=yes to see where uninitialised values come from
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261==
==10261== 1 errors in context 1 of 2:
==10261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10261== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10261== by 0x488CD0: stringsubst (subst.c:301)
==10261== by 0x48801B: prefork (subst.c:77)
==10261== by 0x42B318: execcmd (exec.c:2619)
==10261== by 0x428CA0: execpline2 (exec.c:1697)
==10261== by 0x427FD2: execpline (exec.c:1484)
==10261== by 0x427756: execlist (exec.c:1267)
==10261== by 0x42717C: execode (exec.c:1073)
==10261== by 0x431299: runshfunc (exec.c:5040)
==10261== by 0x430E76: doshfunc (exec.c:4920)
==10261== by 0x4302FB: execshfunc (exec.c:4557)
==10261== by 0x42D8C1: execcmd (exec.c:3373)
==10261==
==10261==
==10261== 2 errors in context 2 of 2:
==10261== Conditional jump or move depends on uninitialised value(s)
==10261== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10261== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10261== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10261== by 0x40EFC2: execbuiltin (builtin.c:450)
==10261== by 0x42D8E9: execcmd (exec.c:3378)
==10261== by 0x428CA0: execpline2 (exec.c:1697)
==10261== by 0x427FD2: execpline (exec.c:1484)
==10261== by 0x42779A: execlist (exec.c:1275)
==10261== by 0x42717C: execode (exec.c:1073)
==10261== by 0x431299: runshfunc (exec.c:5040)
==10261== by 0x430E76: doshfunc (exec.c:4920)
==10261== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10261==
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263== LEAK SUMMARY:
==10263== definitely lost: 2,221 bytes in 14 blocks
==10263== indirectly lost: 6,796 bytes in 9 blocks
==10263== possibly lost: 0 bytes in 0 blocks
==10263== still reachable: 3,128,337 bytes in 69,513 blocks
==10263== suppressed: 0 bytes in 0 blocks
==10263== Rerun with --leak-check=full to see details of leaked memory
==10263==
==10263== Use --track-origins=yes to see where uninitialised values come from
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263==
==10263== 1 errors in context 1 of 2:
==10263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10263== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10263== by 0x488CD0: stringsubst (subst.c:301)
==10263== by 0x48801B: prefork (subst.c:77)
==10263== by 0x42B318: execcmd (exec.c:2619)
==10263== by 0x428CA0: execpline2 (exec.c:1697)
==10263== by 0x427FD2: execpline (exec.c:1484)
==10263== by 0x427756: execlist (exec.c:1267)
==10263== by 0x42717C: execode (exec.c:1073)
==10263== by 0x431299: runshfunc (exec.c:5040)
==10263== by 0x430E76: doshfunc (exec.c:4920)
==10263== by 0x4302FB: execshfunc (exec.c:4557)
==10263== by 0x42D8C1: execcmd (exec.c:3373)
==10263==
==10263==
==10263== 2 errors in context 2 of 2:
==10263== Conditional jump or move depends on uninitialised value(s)
==10263== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10263== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10263== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10263== by 0x40EFC2: execbuiltin (builtin.c:450)
==10263== by 0x42D8E9: execcmd (exec.c:3378)
==10263== by 0x428CA0: execpline2 (exec.c:1697)
==10263== by 0x427FD2: execpline (exec.c:1484)
==10263== by 0x42779A: execlist (exec.c:1275)
==10263== by 0x42717C: execode (exec.c:1073)
==10263== by 0x431299: runshfunc (exec.c:5040)
==10263== by 0x430E76: doshfunc (exec.c:4920)
==10263== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10263==
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10259==
==10259== HEAP SUMMARY:
==10259== in use at exit: 3,115,181 bytes in 69,008 blocks
==10259== total heap usage: 1,598,169 allocs, 1,529,161 frees, 129,185,147 bytes allocated
==10259==
==10267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10267-by-pythonnut-on-???
==10267== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10267-by-pythonnut-on-???
==10267== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10267-by-pythonnut-on-???
==10267==
==10267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10267== don't want to do, unless you know exactly what you're doing,
==10267== or are doing some strange experiment):
==10267== /usr/lib/valgrind/../../bin/vgdb --pid=10267 ...command...
==10267==
==10267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10267== /path/to/gdb ./zsh
==10267== and then give GDB the following command
==10267== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10267
==10267== --pid is optional if only one valgrind process is running
==10267==
--10268-- Caught __NR_exit; running __libc_freeres()
--10266-- Caught __NR_exit; running __libc_freeres()
==10266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10266-by-pythonnut-on-???
==10266== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10266-by-pythonnut-on-???
==10266== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10266-by-pythonnut-on-???
==10266==
==10266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10266== don't want to do, unless you know exactly what you're doing,
==10266== or are doing some strange experiment):
==10266== /usr/lib/valgrind/../../bin/vgdb --pid=10266 ...command...
==10266==
==10266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10266== /path/to/gdb ./zsh
==10266== and then give GDB the following command
==10266== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10266
==10266== --pid is optional if only one valgrind process is running
==10266==
==10268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10268-by-pythonnut-on-???
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
==10268== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10268-by-pythonnut-on-???
==10268== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10268-by-pythonnut-on-???
==10268==
==10268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10268== don't want to do, unless you know exactly what you're doing,
==10268== or are doing some strange experiment):
==10268== /usr/lib/valgrind/../../bin/vgdb --pid=10268 ...command...
==10268==
==10268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10268== /path/to/gdb ./zsh
==10268== and then give GDB the following command
==10268== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10268
==10268== --pid is optional if only one valgrind process is running
==10268==
==10259== Searching for pointers to 69,008 not-freed blocks
--10259-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10259-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10259-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10259-- Scanning root segment: 0x4037000..0x403afff (16384)
--10259-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10259-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10259-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10259-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10259-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10259-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10259-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10259-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10259-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10259-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10259-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10259-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10259-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10259-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10259-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10259-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10259-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10259-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10259-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10259-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10259-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10259-- Scanning root segment: 0x701a000..0x701afff (4096)
--10259-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10259-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10259-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10259-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10259-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10259-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10259-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10259-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10259-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10259-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266==
==10266== HEAP SUMMARY:
==10266== in use at exit: 3,112,999 bytes in 68,974 blocks
==10266== total heap usage: 1,598,147 allocs, 1,529,173 frees, 129,075,344 bytes allocated
==10266==
==10268==
==10268== HEAP SUMMARY:
==10268== in use at exit: 3,137,636 bytes in 69,541 blocks
==10268== total heap usage: 1,595,232 allocs, 1,525,691 frees, 128,953,955 bytes allocated
==10268==
==10266== Searching for pointers to 68,974 not-freed blocks
--10266-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10266-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10266-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10266-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10266-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10266-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10266-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10266-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10266-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10266-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10266-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10266-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10266-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10266-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10266-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10266-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10266-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10266-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10266-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10266-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10266-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10266-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10266-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10266-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10266-- Scanning root segment: 0x701a000..0x701afff (4096)
--10266-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10266-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10266-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10266-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10266-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10266-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10266-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10266-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10266-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10266-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10268== Searching for pointers to 69,541 not-freed blocks
--10268-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10268-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10268-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10268-- Scanning root segment: 0x4037000..0x403efff (32768)
--10268-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10268-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10268-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10268-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10268-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10268-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10268-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10268-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10268-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10268-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10268-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10268-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10268-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10268-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10268-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10268-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10268-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10268-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10268-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10268-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10268-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10268-- Scanning root segment: 0x701a000..0x701afff (4096)
--10268-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10268-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10268-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10268-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10268-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10268-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10268-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10268-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10268-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10268-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10259== Checked 4,790,336 bytes
==10259==
==10259== LEAK SUMMARY:
==10259== definitely lost: 2,197 bytes in 13 blocks
==10259== indirectly lost: 6,756 bytes in 7 blocks
==10259== possibly lost: 0 bytes in 0 blocks
==10259== still reachable: 3,106,228 bytes in 68,988 blocks
==10259== suppressed: 0 bytes in 0 blocks
==10259== Rerun with --leak-check=full to see details of leaked memory
==10259==
==10259== Use --track-origins=yes to see where uninitialised values come from
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10259==
==10259== 1 errors in context 1 of 2:
==10259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10259== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10259== by 0x488CD0: stringsubst (subst.c:301)
==10259== by 0x48801B: prefork (subst.c:77)
==10259== by 0x42B318: execcmd (exec.c:2619)
==10259== by 0x428CA0: execpline2 (exec.c:1697)
==10259== by 0x427FD2: execpline (exec.c:1484)
==10259== by 0x427756: execlist (exec.c:1267)
==10259== by 0x42717C: execode (exec.c:1073)
==10259== by 0x431299: runshfunc (exec.c:5040)
==10259== by 0x430E76: doshfunc (exec.c:4920)
==10259== by 0x4302FB: execshfunc (exec.c:4557)
==10259== by 0x42D8C1: execcmd (exec.c:3373)
==10259==
==10259==
==10259== 2 errors in context 2 of 2:
==10259== Conditional jump or move depends on uninitialised value(s)
==10259== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10259== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10259== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10259== by 0x40EFC2: execbuiltin (builtin.c:450)
==10259== by 0x42D8E9: execcmd (exec.c:3378)
==10259== by 0x428CA0: execpline2 (exec.c:1697)
==10259== by 0x427FD2: execpline (exec.c:1484)
==10259== by 0x42779A: execlist (exec.c:1275)
==10259== by 0x42717C: execode (exec.c:1073)
==10259== by 0x431299: runshfunc (exec.c:5040)
==10259== by 0x430E76: doshfunc (exec.c:4920)
==10259== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10259==
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10270-by-pythonnut-on-???
==10270== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10270-by-pythonnut-on-???
==10270== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10270-by-pythonnut-on-???
==10270==
==10270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10270== don't want to do, unless you know exactly what you're doing,
==10270== or are doing some strange experiment):
==10270== /usr/lib/valgrind/../../bin/vgdb --pid=10270 ...command...
==10270==
==10270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10270== /path/to/gdb ./zsh
==10270== and then give GDB the following command
==10270== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10270
==10270== --pid is optional if only one valgrind process is running
==10270==
--10270-- Caught __NR_exit; running __libc_freeres()
==10266== Checked 4,766,904 bytes
==10266==
--10270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266== LEAK SUMMARY:
==10266== definitely lost: 2,197 bytes in 13 blocks
==10266== indirectly lost: 6,756 bytes in 7 blocks
==10266== possibly lost: 0 bytes in 0 blocks
==10266== still reachable: 3,104,046 bytes in 68,954 blocks
==10266== suppressed: 0 bytes in 0 blocks
==10266== Rerun with --leak-check=full to see details of leaked memory
==10266==
==10266== Use --track-origins=yes to see where uninitialised values come from
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10266==
==10266== 1 errors in context 1 of 2:
==10266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10266== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10266== by 0x488CD0: stringsubst (subst.c:301)
==10266== by 0x48801B: prefork (subst.c:77)
==10266== by 0x42B318: execcmd (exec.c:2619)
==10266== by 0x428CA0: execpline2 (exec.c:1697)
==10266== by 0x427FD2: execpline (exec.c:1484)
==10266== by 0x427756: execlist (exec.c:1267)
==10266== by 0x42717C: execode (exec.c:1073)
==10266== by 0x431299: runshfunc (exec.c:5040)
==10266== by 0x430E76: doshfunc (exec.c:4920)
==10266== by 0x4302FB: execshfunc (exec.c:4557)
==10266== by 0x42D8C1: execcmd (exec.c:3373)
==10266==
==10266==
==10266== 2 errors in context 2 of 2:
==10266== Conditional jump or move depends on uninitialised value(s)
==10266== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10266== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10266== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10266== by 0x40EFC2: execbuiltin (builtin.c:450)
==10266== by 0x42D8E9: execcmd (exec.c:3378)
==10266== by 0x428CA0: execpline2 (exec.c:1697)
==10266== by 0x427FD2: execpline (exec.c:1484)
==10266== by 0x42779A: execlist (exec.c:1275)
==10266== by 0x42717C: execode (exec.c:1073)
==10266== by 0x431299: runshfunc (exec.c:5040)
==10266== by 0x430E76: doshfunc (exec.c:4920)
==10266== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10266==
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268== Checked 4,840,240 bytes
==10268==
==10270==
==10270== HEAP SUMMARY:
==10270== in use at exit: 3,115,185 bytes in 69,008 blocks
==10270== total heap usage: 1,598,185 allocs, 1,529,177 frees, 129,190,143 bytes allocated
==10270==
==10268== LEAK SUMMARY:
==10268== definitely lost: 2,221 bytes in 14 blocks
==10268== indirectly lost: 6,796 bytes in 9 blocks
==10268== possibly lost: 0 bytes in 0 blocks
==10268== still reachable: 3,128,619 bytes in 69,518 blocks
==10268== suppressed: 0 bytes in 0 blocks
==10268== Rerun with --leak-check=full to see details of leaked memory
==10268==
==10268== Use --track-origins=yes to see where uninitialised values come from
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268==
==10268== 1 errors in context 1 of 2:
==10268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10268== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10268== by 0x488CD0: stringsubst (subst.c:301)
==10268== by 0x48801B: prefork (subst.c:77)
==10268== by 0x42B318: execcmd (exec.c:2619)
==10268== by 0x428CA0: execpline2 (exec.c:1697)
==10268== by 0x427FD2: execpline (exec.c:1484)
==10268== by 0x427756: execlist (exec.c:1267)
==10268== by 0x42717C: execode (exec.c:1073)
==10268== by 0x431299: runshfunc (exec.c:5040)
==10268== by 0x430E76: doshfunc (exec.c:4920)
==10268== by 0x4302FB: execshfunc (exec.c:4557)
==10268== by 0x42D8C1: execcmd (exec.c:3373)
==10268==
==10268==
==10268== 2 errors in context 2 of 2:
==10268== Conditional jump or move depends on uninitialised value(s)
==10268== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10268== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10268== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10268== by 0x40EFC2: execbuiltin (builtin.c:450)
==10268== by 0x42D8E9: execcmd (exec.c:3378)
==10268== by 0x428CA0: execpline2 (exec.c:1697)
==10268== by 0x427FD2: execpline (exec.c:1484)
==10268== by 0x42779A: execlist (exec.c:1275)
==10268== by 0x42717C: execode (exec.c:1073)
==10268== by 0x431299: runshfunc (exec.c:5040)
==10268== by 0x430E76: doshfunc (exec.c:4920)
==10268== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10268==
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10267-- Caught __NR_exit; running __libc_freeres()
==10271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10271-by-pythonnut-on-???
==10271== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10271-by-pythonnut-on-???
==10271== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10271-by-pythonnut-on-???
==10271==
==10271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10271== don't want to do, unless you know exactly what you're doing,
==10271== or are doing some strange experiment):
==10271== /usr/lib/valgrind/../../bin/vgdb --pid=10271 ...command...
==10271==
==10271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10271== /path/to/gdb ./zsh
==10271== and then give GDB the following command
==10271== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10271
==10271== --pid is optional if only one valgrind process is running
==10271==
==10270== Searching for pointers to 69,008 not-freed blocks
--10270-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10270-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10270-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10270-- Scanning root segment: 0x4037000..0x403afff (16384)
--10270-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10270-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10270-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10270-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10270-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10270-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10270-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10270-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10270-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10270-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10270-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10270-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10270-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10270-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10270-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10270-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10270-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10270-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10270-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10270-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10270-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10270-- Scanning root segment: 0x701a000..0x701afff (4096)
--10270-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10270-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10270-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10270-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10270-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10270-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10270-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10270-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10270-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10270-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10271-- Caught __NR_exit; running __libc_freeres()
--10267-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10267==
==10267== HEAP SUMMARY:
==10267== in use at exit: 3,137,412 bytes in 69,538 blocks
==10267== total heap usage: 1,595,235 allocs, 1,525,697 frees, 128,954,531 bytes allocated
==10267==
--10271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271==
==10271== HEAP SUMMARY:
==10271== in use at exit: 3,113,027 bytes in 68,975 blocks
==10271== total heap usage: 1,598,160 allocs, 1,529,185 frees, 129,078,031 bytes allocated
==10271==
==10267== Searching for pointers to 69,538 not-freed blocks
--10267-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10267-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10267-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10267-- Scanning root segment: 0x4037000..0x403efff (32768)
--10267-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10267-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10267-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10267-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10267-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10267-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10267-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10267-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10267-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10267-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10267-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10267-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10267-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10267-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10267-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10267-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10267-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10267-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10267-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10267-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10267-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10267-- Scanning root segment: 0x701a000..0x701afff (4096)
--10267-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10267-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10267-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10267-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10267-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10267-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10267-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10267-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10267-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10267-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10271== Searching for pointers to 68,975 not-freed blocks
--10271-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10271-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10271-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10271-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10271-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10271-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10271-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10271-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10271-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10271-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10271-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10271-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10271-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10271-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10271-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10271-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10271-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10271-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10271-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10271-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10271-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10271-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10271-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10271-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10271-- Scanning root segment: 0x701a000..0x701afff (4096)
--10271-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10271-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10271-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10271-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10271-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10271-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10271-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10271-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10271-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10271-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10270== Checked 4,790,344 bytes
==10270==
==10270== LEAK SUMMARY:
==10270== definitely lost: 2,197 bytes in 13 blocks
==10270== indirectly lost: 6,756 bytes in 7 blocks
==10270== possibly lost: 0 bytes in 0 blocks
==10270== still reachable: 3,106,232 bytes in 68,988 blocks
==10270== suppressed: 0 bytes in 0 blocks
==10270== Rerun with --leak-check=full to see details of leaked memory
==10270==
==10270== Use --track-origins=yes to see where uninitialised values come from
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270==
==10270== 1 errors in context 1 of 2:
==10270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10270== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10270== by 0x488CD0: stringsubst (subst.c:301)
==10270== by 0x48801B: prefork (subst.c:77)
==10270== by 0x42B318: execcmd (exec.c:2619)
==10270== by 0x428CA0: execpline2 (exec.c:1697)
==10270== by 0x427FD2: execpline (exec.c:1484)
==10270== by 0x427756: execlist (exec.c:1267)
==10270== by 0x42717C: execode (exec.c:1073)
==10270== by 0x431299: runshfunc (exec.c:5040)
==10270== by 0x430E76: doshfunc (exec.c:4920)
==10270== by 0x4302FB: execshfunc (exec.c:4557)
==10270== by 0x42D8C1: execcmd (exec.c:3373)
==10270==
==10270==
==10270== 2 errors in context 2 of 2:
==10270== Conditional jump or move depends on uninitialised value(s)
==10270== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10270== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10270== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10270== by 0x40EFC2: execbuiltin (builtin.c:450)
==10270== by 0x42D8E9: execcmd (exec.c:3378)
==10270== by 0x428CA0: execpline2 (exec.c:1697)
==10270== by 0x427FD2: execpline (exec.c:1484)
==10270== by 0x42779A: execlist (exec.c:1275)
==10270== by 0x42717C: execode (exec.c:1073)
==10270== by 0x431299: runshfunc (exec.c:5040)
==10270== by 0x430E76: doshfunc (exec.c:4920)
==10270== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10270==
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10272-by-pythonnut-on-???
==10272== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10272-by-pythonnut-on-???
==10272== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10272-by-pythonnut-on-???
==10272==
==10272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10272== don't want to do, unless you know exactly what you're doing,
==10272== or are doing some strange experiment):
==10272== /usr/lib/valgrind/../../bin/vgdb --pid=10272 ...command...
==10272==
==10272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10272== /path/to/gdb ./zsh
==10272== and then give GDB the following command
==10272== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10272
==10272== --pid is optional if only one valgrind process is running
==10272==
--10272-- Caught __NR_exit; running __libc_freeres()
==10267== Checked 4,839,384 bytes
==10267==
--10272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271== Checked 4,766,424 bytes
==10271==
==10267== LEAK SUMMARY:
==10272==
==10267== definitely lost: 2,221 bytes in 14 blocks
==10267== indirectly lost: 6,796 bytes in 9 blocks
==10267== possibly lost: 0 bytes in 0 blocks
==10267== still reachable: 3,128,395 bytes in 69,515 blocks
==10267== suppressed: 0 bytes in 0 blocks
==10267== Rerun with --leak-check=full to see details of leaked memory
==10267==
==10267== Use --track-origins=yes to see where uninitialised values come from
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10267==
==10267== 1 errors in context 1 of 2:
==10267== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10267== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10267== by 0x488CD0: stringsubst (subst.c:301)
==10267== by 0x48801B: prefork (subst.c:77)
==10267== by 0x42B318: execcmd (exec.c:2619)
==10267== by 0x428CA0: execpline2 (exec.c:1697)
==10267== by 0x427FD2: execpline (exec.c:1484)
==10267== by 0x427756: execlist (exec.c:1267)
==10267== by 0x42717C: execode (exec.c:1073)
==10267== by 0x431299: runshfunc (exec.c:5040)
==10267== by 0x430E76: doshfunc (exec.c:4920)
==10267== by 0x4302FB: execshfunc (exec.c:4557)
==10267== by 0x42D8C1: execcmd (exec.c:3373)
==10267==
==10267==
==10267== 2 errors in context 2 of 2:
==10267== Conditional jump or move depends on uninitialised value(s)
==10267== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10267== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10267== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10267== by 0x40EFC2: execbuiltin (builtin.c:450)
==10267== by 0x42D8E9: execcmd (exec.c:3378)
==10267== by 0x428CA0: execpline2 (exec.c:1697)
==10267== by 0x427FD2: execpline (exec.c:1484)
==10267== by 0x42779A: execlist (exec.c:1275)
==10267== by 0x42717C: execode (exec.c:1073)
==10267== by 0x431299: runshfunc (exec.c:5040)
==10267== by 0x430E76: doshfunc (exec.c:4920)
==10267== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10267==
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== HEAP SUMMARY:
==10272== in use at exit: 3,115,184 bytes in 69,008 blocks
==10272== total heap usage: 1,598,190 allocs, 1,529,182 frees, 129,192,256 bytes allocated
==10272==
--10123-- Caught __NR_exit; running __libc_freeres()
==10271== LEAK SUMMARY:
==10271== definitely lost: 2,197 bytes in 13 blocks
==10271== indirectly lost: 6,756 bytes in 7 blocks
==10271== possibly lost: 0 bytes in 0 blocks
==10271== still reachable: 3,104,074 bytes in 68,955 blocks
==10271== suppressed: 0 bytes in 0 blocks
==10271== Rerun with --leak-check=full to see details of leaked memory
==10271==
==10271== Use --track-origins=yes to see where uninitialised values come from
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10271==
==10271== 1 errors in context 1 of 2:
==10271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10271== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10271== by 0x488CD0: stringsubst (subst.c:301)
==10271== by 0x48801B: prefork (subst.c:77)
==10271== by 0x42B318: execcmd (exec.c:2619)
==10271== by 0x428CA0: execpline2 (exec.c:1697)
==10271== by 0x427FD2: execpline (exec.c:1484)
==10271== by 0x427756: execlist (exec.c:1267)
==10271== by 0x42717C: execode (exec.c:1073)
==10271== by 0x431299: runshfunc (exec.c:5040)
==10271== by 0x430E76: doshfunc (exec.c:4920)
==10271== by 0x4302FB: execshfunc (exec.c:4557)
==10271== by 0x42D8C1: execcmd (exec.c:3373)
==10271==
==10271==
==10271== 2 errors in context 2 of 2:
==10271== Conditional jump or move depends on uninitialised value(s)
==10271== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10271== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10271== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10271== by 0x40EFC2: execbuiltin (builtin.c:450)
==10271== by 0x42D8E9: execcmd (exec.c:3378)
==10271== by 0x428CA0: execpline2 (exec.c:1697)
==10271== by 0x427FD2: execpline (exec.c:1484)
==10271== by 0x42779A: execlist (exec.c:1275)
==10271== by 0x42717C: execode (exec.c:1073)
==10271== by 0x431299: runshfunc (exec.c:5040)
==10271== by 0x430E76: doshfunc (exec.c:4920)
==10271== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10271==
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== Searching for pointers to 69,008 not-freed blocks
--10272-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10272-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10272-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10272-- Scanning root segment: 0x4037000..0x403afff (16384)
--10272-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10272-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10272-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10272-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10272-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10272-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10272-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10272-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10272-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10272-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10272-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10272-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10272-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10272-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10272-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10272-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10272-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10272-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10272-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10272-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10272-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10272-- Scanning root segment: 0x701a000..0x701afff (4096)
--10272-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10272-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10272-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10272-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10272-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10272-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10272-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10272-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10272-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10272-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10273-by-pythonnut-on-???
==10273== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10273-by-pythonnut-on-???
==10273== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10273-by-pythonnut-on-???
==10273==
==10273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10273== don't want to do, unless you know exactly what you're doing,
==10273== or are doing some strange experiment):
==10273== /usr/lib/valgrind/../../bin/vgdb --pid=10273 ...command...
==10273==
==10273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10273== /path/to/gdb ./zsh
==10273== and then give GDB the following command
==10273== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10273
==10273== --pid is optional if only one valgrind process is running
==10273==
--10123-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10273-- Caught __NR_exit; running __libc_freeres()
==10123==
==10123== HEAP SUMMARY:
==10123== in use at exit: 3,133,478 bytes in 69,401 blocks
==10123== total heap usage: 1,595,176 allocs, 1,525,775 frees, 128,954,929 bytes allocated
==10123==
--10273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273==
==10273== HEAP SUMMARY:
==10273== in use at exit: 3,111,547 bytes in 68,915 blocks
==10273== total heap usage: 1,598,130 allocs, 1,529,215 frees, 129,081,019 bytes allocated
==10273==
==10123== Searching for pointers to 69,401 not-freed blocks
--10123-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10123-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10123-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10123-- Scanning root segment: 0x4037000..0x403afff (16384)
--10123-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10123-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10123-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10123-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10123-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10123-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10123-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10123-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10123-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10123-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10123-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10123-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10123-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10123-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10123-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10123-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10123-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10123-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10123-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10123-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10123-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10123-- Scanning root segment: 0x701a000..0x701afff (4096)
--10123-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10123-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10123-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10123-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10123-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10123-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10123-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10123-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10123-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10123-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== Searching for pointers to 68,915 not-freed blocks
--10273-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10273-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10273-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10273-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10273-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10273-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10273-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10273-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10273-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10273-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10273-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10273-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10273-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10273-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10273-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10273-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10273-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10273-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10273-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10273-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10273-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10273-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10273-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10273-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10273-- Scanning root segment: 0x701a000..0x701afff (4096)
--10273-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10273-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10273-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10273-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10273-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10273-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10273-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10273-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10273-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10273-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10272== Checked 4,790,344 bytes
==10272==
==10272== LEAK SUMMARY:
==10272== definitely lost: 2,197 bytes in 13 blocks
==10272== indirectly lost: 6,756 bytes in 7 blocks
==10272== possibly lost: 0 bytes in 0 blocks
==10272== still reachable: 3,106,231 bytes in 68,988 blocks
==10272== suppressed: 0 bytes in 0 blocks
==10272== Rerun with --leak-check=full to see details of leaked memory
==10272==
==10272== Use --track-origins=yes to see where uninitialised values come from
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272==
==10272== 1 errors in context 1 of 2:
==10272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10272== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272== by 0x488CD0: stringsubst (subst.c:301)
==10272== by 0x48801B: prefork (subst.c:77)
==10272== by 0x42B318: execcmd (exec.c:2619)
==10272== by 0x428CA0: execpline2 (exec.c:1697)
==10272== by 0x427FD2: execpline (exec.c:1484)
==10272== by 0x427756: execlist (exec.c:1267)
==10272== by 0x42717C: execode (exec.c:1073)
==10272== by 0x431299: runshfunc (exec.c:5040)
==10272== by 0x430E76: doshfunc (exec.c:4920)
==10272== by 0x4302FB: execshfunc (exec.c:4557)
==10272== by 0x42D8C1: execcmd (exec.c:3373)
==10272==
==10272==
==10272== 2 errors in context 2 of 2:
==10272== Conditional jump or move depends on uninitialised value(s)
==10272== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10272== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10272== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10272== by 0x40EFC2: execbuiltin (builtin.c:450)
==10272== by 0x42D8E9: execcmd (exec.c:3378)
==10272== by 0x428CA0: execpline2 (exec.c:1697)
==10272== by 0x427FD2: execpline (exec.c:1484)
==10272== by 0x42779A: execlist (exec.c:1275)
==10272== by 0x42717C: execode (exec.c:1073)
==10272== by 0x431299: runshfunc (exec.c:5040)
==10272== by 0x430E76: doshfunc (exec.c:4920)
==10272== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10272==
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10274-by-pythonnut-on-???
==10274== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10274-by-pythonnut-on-???
==10274== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10274-by-pythonnut-on-???
==10274==
==10274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10274== don't want to do, unless you know exactly what you're doing,
==10274== or are doing some strange experiment):
==10274== /usr/lib/valgrind/../../bin/vgdb --pid=10274 ...command...
==10274==
==10274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10274== /path/to/gdb ./zsh
==10274== and then give GDB the following command
==10274== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10274
==10274== --pid is optional if only one valgrind process is running
==10274==
--10274-- Caught __NR_exit; running __libc_freeres()
==10123== Checked 4,816,336 bytes
==10123==
--10274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273== Checked 4,765,880 bytes
==10273==
==10123== LEAK SUMMARY:
==10123== definitely lost: 2,221 bytes in 14 blocks
==10123== indirectly lost: 6,796 bytes in 9 blocks
==10123== possibly lost: 0 bytes in 0 blocks
==10123== still reachable: 3,124,461 bytes in 69,378 blocks
==10123== suppressed: 0 bytes in 0 blocks
==10123== Rerun with --leak-check=full to see details of leaked memory
==10123==
==10123== Use --track-origins=yes to see where uninitialised values come from
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10123==
==10123== 1 errors in context 1 of 2:
==10123== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10123== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10123== by 0x488CD0: stringsubst (subst.c:301)
==10123== by 0x48801B: prefork (subst.c:77)
==10123== by 0x42B318: execcmd (exec.c:2619)
==10123== by 0x428CA0: execpline2 (exec.c:1697)
==10123== by 0x427FD2: execpline (exec.c:1484)
==10123== by 0x427756: execlist (exec.c:1267)
==10123== by 0x42717C: execode (exec.c:1073)
==10123== by 0x431299: runshfunc (exec.c:5040)
==10123== by 0x430E76: doshfunc (exec.c:4920)
==10123== by 0x4302FB: execshfunc (exec.c:4557)
==10123== by 0x42D8C1: execcmd (exec.c:3373)
==10123==
==10123==
==10123== 2 errors in context 2 of 2:
==10123== Conditional jump or move depends on uninitialised value(s)
==10123== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10123== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10123== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10123== by 0x40EFC2: execbuiltin (builtin.c:450)
==10123== by 0x42D8E9: execcmd (exec.c:3378)
==10123== by 0x428CA0: execpline2 (exec.c:1697)
==10123== by 0x427FD2: execpline (exec.c:1484)
==10123== by 0x42779A: execlist (exec.c:1275)
==10123== by 0x42717C: execode (exec.c:1073)
==10123== by 0x431299: runshfunc (exec.c:5040)
==10123== by 0x430E76: doshfunc (exec.c:4920)
==10123== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10123==
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274==
==10274== HEAP SUMMARY:
==10274== in use at exit: 3,115,183 bytes in 69,008 blocks
==10274== total heap usage: 1,598,195 allocs, 1,529,187 frees, 129,194,369 bytes allocated
==10274==
==10273== LEAK SUMMARY:
==10273== definitely lost: 2,197 bytes in 13 blocks
==10273== indirectly lost: 6,756 bytes in 7 blocks
==10273== possibly lost: 0 bytes in 0 blocks
==10273== still reachable: 3,102,594 bytes in 68,895 blocks
==10273== suppressed: 0 bytes in 0 blocks
==10273== Rerun with --leak-check=full to see details of leaked memory
==10273==
==10273== Use --track-origins=yes to see where uninitialised values come from
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10273==
==10273== 1 errors in context 1 of 2:
==10273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10273== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10273== by 0x488CD0: stringsubst (subst.c:301)
==10273== by 0x48801B: prefork (subst.c:77)
==10273== by 0x42B318: execcmd (exec.c:2619)
==10273== by 0x428CA0: execpline2 (exec.c:1697)
==10273== by 0x427FD2: execpline (exec.c:1484)
==10273== by 0x427756: execlist (exec.c:1267)
==10273== by 0x42717C: execode (exec.c:1073)
==10273== by 0x431299: runshfunc (exec.c:5040)
==10273== by 0x430E76: doshfunc (exec.c:4920)
==10273== by 0x4302FB: execshfunc (exec.c:4557)
==10273== by 0x42D8C1: execcmd (exec.c:3373)
==10273==
==10273==
==10273== 2 errors in context 2 of 2:
==10273== Conditional jump or move depends on uninitialised value(s)
==10273== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10273== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10273== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10273== by 0x40EFC2: execbuiltin (builtin.c:450)
==10273== by 0x42D8E9: execcmd (exec.c:3378)
==10273== by 0x428CA0: execpline2 (exec.c:1697)
==10273== by 0x427FD2: execpline (exec.c:1484)
==10273== by 0x42779A: execlist (exec.c:1275)
==10273== by 0x42717C: execode (exec.c:1073)
==10273== by 0x431299: runshfunc (exec.c:5040)
==10273== by 0x430E76: doshfunc (exec.c:4920)
==10273== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10273==
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10275-by-pythonnut-on-???
==10275== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10275-by-pythonnut-on-???
==10275== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10275-by-pythonnut-on-???
==10275==
==10275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10275== don't want to do, unless you know exactly what you're doing,
==10275== or are doing some strange experiment):
==10275== /usr/lib/valgrind/../../bin/vgdb --pid=10275 ...command...
==10275==
==10275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10275== /path/to/gdb ./zsh
==10275== and then give GDB the following command
==10275== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10275
==10275== --pid is optional if only one valgrind process is running
==10275==
==10274== Searching for pointers to 69,008 not-freed blocks
--10274-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10274-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10274-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10274-- Scanning root segment: 0x4037000..0x403afff (16384)
--10274-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10274-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10274-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10274-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10274-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10274-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10274-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10274-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10274-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10274-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10274-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10274-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10274-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10274-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10274-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10274-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10274-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10274-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10274-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10274-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10274-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10274-- Scanning root segment: 0x701a000..0x701afff (4096)
--10274-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10274-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10274-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10274-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10274-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10274-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10274-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10274-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10274-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10274-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFE8AAC, len 4
==10277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10277-by-pythonnut-on-???
==10277== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10277-by-pythonnut-on-???
==10277== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10277-by-pythonnut-on-???
==10277==
==10277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10277== don't want to do, unless you know exactly what you're doing,
==10277== or are doing some strange experiment):
==10277== /usr/lib/valgrind/../../bin/vgdb --pid=10277 ...command...
==10277==
==10277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10277== /path/to/gdb ./zsh
==10277== and then give GDB the following command
==10277== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10277
==10277== --pid is optional if only one valgrind process is running
==10277==
--10276-- Caught __NR_exit; running __libc_freeres()
==10276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10276-by-pythonnut-on-???
==10276== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10276-by-pythonnut-on-???
==10276== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10276-by-pythonnut-on-???
==10276==
==10276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10276== don't want to do, unless you know exactly what you're doing,
==10276== or are doing some strange experiment):
==10276== /usr/lib/valgrind/../../bin/vgdb --pid=10276 ...command...
==10276==
==10276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10276== /path/to/gdb ./zsh
==10276== and then give GDB the following command
==10276== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10276
==10276== --pid is optional if only one valgrind process is running
==10276==
--10276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10279-- Caught __NR_exit; running __libc_freeres()
==10276==
==10279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10279-by-pythonnut-on-???
==10279== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10279-by-pythonnut-on-???
==10279== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10279-by-pythonnut-on-???
==10279==
==10279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10279== don't want to do, unless you know exactly what you're doing,
==10279== or are doing some strange experiment):
==10279== /usr/lib/valgrind/../../bin/vgdb --pid=10279 ...command...
==10279==
==10279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10279== /path/to/gdb ./zsh
==10279== and then give GDB the following command
==10279== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10279
==10279== --pid is optional if only one valgrind process is running
==10279==
==10276== HEAP SUMMARY:
==10276== in use at exit: 3,135,430 bytes in 69,472 blocks
==10276== total heap usage: 1,595,060 allocs, 1,525,588 frees, 128,911,104 bytes allocated
==10276==
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
--10279-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10279==
==10276== Searching for pointers to 69,472 not-freed blocks
--10276-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10276-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10279== HEAP SUMMARY:
==10279== in use at exit: 3,123,779 bytes in 69,155 blocks
==10279== total heap usage: 1,598,522 allocs, 1,529,367 frees, 129,113,456 bytes allocated
==10279==
--10276-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10276-- Scanning root segment: 0x4037000..0x403afff (16384)
--10276-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10276-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10276-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10276-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10276-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10276-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10276-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10276-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10276-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10276-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10276-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10276-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10276-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10276-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10276-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10276-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10276-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10276-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10276-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10276-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10276-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10276-- Scanning root segment: 0x701a000..0x701afff (4096)
--10276-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10276-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10276-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10276-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10276-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10276-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10276-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10276-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10276-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10276-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== Checked 4,790,344 bytes
==10274==
==10279== Searching for pointers to 69,155 not-freed blocks
--10279-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10279-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10279-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10279-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10279-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10279-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10279-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10279-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10279-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10279-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10279-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10279-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10279-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10279-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10279-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10279-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10279-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10279-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10279-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10279-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10279-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10279-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10279-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10279-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10279-- Scanning root segment: 0x701a000..0x701afff (4096)
--10279-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10279-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10279-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10279-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10279-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10279-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10279-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10279-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10279-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10279-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== LEAK SUMMARY:
==10274== definitely lost: 2,197 bytes in 13 blocks
==10274== indirectly lost: 6,756 bytes in 7 blocks
==10274== possibly lost: 0 bytes in 0 blocks
==10274== still reachable: 3,106,230 bytes in 68,988 blocks
==10274== suppressed: 0 bytes in 0 blocks
==10274== Rerun with --leak-check=full to see details of leaked memory
==10274==
==10274== Use --track-origins=yes to see where uninitialised values come from
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274==
==10274== 1 errors in context 1 of 2:
==10274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10274== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10274== by 0x488CD0: stringsubst (subst.c:301)
==10274== by 0x48801B: prefork (subst.c:77)
==10274== by 0x42B318: execcmd (exec.c:2619)
==10274== by 0x428CA0: execpline2 (exec.c:1697)
==10274== by 0x427FD2: execpline (exec.c:1484)
==10274== by 0x427756: execlist (exec.c:1267)
==10274== by 0x42717C: execode (exec.c:1073)
==10274== by 0x431299: runshfunc (exec.c:5040)
==10274== by 0x430E76: doshfunc (exec.c:4920)
==10274== by 0x4302FB: execshfunc (exec.c:4557)
==10274== by 0x42D8C1: execcmd (exec.c:3373)
==10274==
==10274==
==10274== 2 errors in context 2 of 2:
==10274== Conditional jump or move depends on uninitialised value(s)
==10274== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10274== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10274== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10274== by 0x40EFC2: execbuiltin (builtin.c:450)
==10274== by 0x42D8E9: execcmd (exec.c:3378)
==10274== by 0x428CA0: execpline2 (exec.c:1697)
==10274== by 0x427FD2: execpline (exec.c:1484)
==10274== by 0x42779A: execlist (exec.c:1275)
==10274== by 0x42717C: execode (exec.c:1073)
==10274== by 0x431299: runshfunc (exec.c:5040)
==10274== by 0x430E76: doshfunc (exec.c:4920)
==10274== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10274==
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10281-by-pythonnut-on-???
==10281== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10281-by-pythonnut-on-???
==10281== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10281-by-pythonnut-on-???
==10281==
==10281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10281== don't want to do, unless you know exactly what you're doing,
==10281== or are doing some strange experiment):
==10281== /usr/lib/valgrind/../../bin/vgdb --pid=10281 ...command...
==10281==
==10281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10281== /path/to/gdb ./zsh
==10281== and then give GDB the following command
==10281== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10281
==10281== --pid is optional if only one valgrind process is running
==10281==
--10281-- Caught __NR_exit; running __libc_freeres()
--10281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10281==
==10281== HEAP SUMMARY:
==10281== in use at exit: 3,115,182 bytes in 69,008 blocks
==10281== total heap usage: 1,598,200 allocs, 1,529,192 frees, 129,196,482 bytes allocated
==10281==
==10276== Checked 4,820,104 bytes
==10276==
==10281== Searching for pointers to 69,008 not-freed blocks
--10281-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10281-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10281-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10281-- Scanning root segment: 0x4037000..0x403afff (16384)
--10281-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10281-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10281-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10281-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10281-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10281-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10281-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10281-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10281-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10281-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10281-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10281-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10281-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10281-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10281-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10281-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10281-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10281-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10281-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10281-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10281-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10281-- Scanning root segment: 0x701a000..0x701afff (4096)
--10281-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10281-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10281-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10281-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10281-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10281-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10281-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10281-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10281-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10281-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10276== LEAK SUMMARY:
==10276== definitely lost: 2,221 bytes in 14 blocks
==10276== indirectly lost: 6,796 bytes in 9 blocks
==10276== possibly lost: 0 bytes in 0 blocks
==10276== still reachable: 3,126,413 bytes in 69,449 blocks
==10276== suppressed: 0 bytes in 0 blocks
==10276== Rerun with --leak-check=full to see details of leaked memory
==10276==
==10276== Use --track-origins=yes to see where uninitialised values come from
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10276==
==10276== 1 errors in context 1 of 2:
==10276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10276== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10276== by 0x488CD0: stringsubst (subst.c:301)
==10276== by 0x48801B: prefork (subst.c:77)
==10276== by 0x42B318: execcmd (exec.c:2619)
==10276== by 0x428CA0: execpline2 (exec.c:1697)
==10276== by 0x427FD2: execpline (exec.c:1484)
==10276== by 0x427756: execlist (exec.c:1267)
==10276== by 0x42717C: execode (exec.c:1073)
==10276== by 0x431299: runshfunc (exec.c:5040)
==10276== by 0x430E76: doshfunc (exec.c:4920)
==10276== by 0x4302FB: execshfunc (exec.c:4557)
==10276== by 0x42D8C1: execcmd (exec.c:3373)
==10276==
==10276==
==10276== 2 errors in context 2 of 2:
==10276== Conditional jump or move depends on uninitialised value(s)
==10276== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10276== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10276== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10276== by 0x40EFC2: execbuiltin (builtin.c:450)
==10276== by 0x42D8E9: execcmd (exec.c:3378)
==10276== by 0x428CA0: execpline2 (exec.c:1697)
==10276== by 0x427FD2: execpline (exec.c:1484)
==10276== by 0x42779A: execlist (exec.c:1275)
==10276== by 0x42717C: execode (exec.c:1073)
==10276== by 0x431299: runshfunc (exec.c:5040)
==10276== by 0x430E76: doshfunc (exec.c:4920)
==10276== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10276==
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279== Checked 4,785,128 bytes
==10279==
==10279== LEAK SUMMARY:
==10279== definitely lost: 2,197 bytes in 13 blocks
==10279== indirectly lost: 6,756 bytes in 7 blocks
==10279== possibly lost: 0 bytes in 0 blocks
==10279== still reachable: 3,114,826 bytes in 69,135 blocks
==10279== suppressed: 0 bytes in 0 blocks
==10279== Rerun with --leak-check=full to see details of leaked memory
==10279==
==10279== Use --track-origins=yes to see where uninitialised values come from
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279==
==10279== 1 errors in context 1 of 2:
==10279== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10279== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10279== by 0x488CD0: stringsubst (subst.c:301)
==10279== by 0x48801B: prefork (subst.c:77)
==10279== by 0x42B318: execcmd (exec.c:2619)
==10279== by 0x428CA0: execpline2 (exec.c:1697)
==10279== by 0x427FD2: execpline (exec.c:1484)
==10279== by 0x427756: execlist (exec.c:1267)
==10279== by 0x42717C: execode (exec.c:1073)
==10279== by 0x431299: runshfunc (exec.c:5040)
==10279== by 0x430E76: doshfunc (exec.c:4920)
==10279== by 0x4302FB: execshfunc (exec.c:4557)
==10279== by 0x42D8C1: execcmd (exec.c:3373)
==10279==
==10279==
==10279== 2 errors in context 2 of 2:
==10279== Conditional jump or move depends on uninitialised value(s)
==10279== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10279== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10279== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10279== by 0x40EFC2: execbuiltin (builtin.c:450)
==10279== by 0x42D8E9: execcmd (exec.c:3378)
==10279== by 0x428CA0: execpline2 (exec.c:1697)
==10279== by 0x427FD2: execpline (exec.c:1484)
==10279== by 0x42779A: execlist (exec.c:1275)
==10279== by 0x42717C: execode (exec.c:1073)
==10279== by 0x431299: runshfunc (exec.c:5040)
==10279== by 0x430E76: doshfunc (exec.c:4920)
==10279== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10279==
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFE8F5C, len 4
--10278-- Caught __NR_exit; running __libc_freeres()
==10278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10278-by-pythonnut-on-???
==10278== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10278-by-pythonnut-on-???
==10278== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10278-by-pythonnut-on-???
==10278==
==10278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10278== don't want to do, unless you know exactly what you're doing,
==10278== or are doing some strange experiment):
==10278== /usr/lib/valgrind/../../bin/vgdb --pid=10278 ...command...
==10278==
==10278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10278== /path/to/gdb ./zsh
==10278== and then give GDB the following command
==10278== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10278
==10278== --pid is optional if only one valgrind process is running
==10278==
--10278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10278==
==10278== HEAP SUMMARY:
==10278== in use at exit: 3,123,715 bytes in 69,152 blocks
==10278== total heap usage: 1,598,520 allocs, 1,529,368 frees, 129,113,215 bytes allocated
==10278==
==10278== Searching for pointers to 69,152 not-freed blocks
--10278-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10278-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10278-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10278-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10278-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10278-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10278-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10278-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10278-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10278-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10278-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10278-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10278-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10278-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10278-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10278-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10278-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10278-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10278-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10278-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10278-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10278-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10278-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10278-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10278-- Scanning root segment: 0x701a000..0x701afff (4096)
--10278-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10278-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10278-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10278-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10278-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10278-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10278-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10278-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10278-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10278-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10281== Checked 4,790,344 bytes
==10281==
==10281== LEAK SUMMARY:
==10281== definitely lost: 2,197 bytes in 13 blocks
==10281== indirectly lost: 6,756 bytes in 7 blocks
==10281== possibly lost: 0 bytes in 0 blocks
==10281== still reachable: 3,106,229 bytes in 68,988 blocks
==10281== suppressed: 0 bytes in 0 blocks
==10281== Rerun with --leak-check=full to see details of leaked memory
==10281==
==10281== Use --track-origins=yes to see where uninitialised values come from
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281==
==10281== 1 errors in context 1 of 2:
==10281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10281== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10281== by 0x488CD0: stringsubst (subst.c:301)
==10281== by 0x48801B: prefork (subst.c:77)
==10281== by 0x42B318: execcmd (exec.c:2619)
==10281== by 0x428CA0: execpline2 (exec.c:1697)
==10281== by 0x427FD2: execpline (exec.c:1484)
==10281== by 0x427756: execlist (exec.c:1267)
==10281== by 0x42717C: execode (exec.c:1073)
==10281== by 0x431299: runshfunc (exec.c:5040)
==10281== by 0x430E76: doshfunc (exec.c:4920)
==10281== by 0x4302FB: execshfunc (exec.c:4557)
==10281== by 0x42D8C1: execcmd (exec.c:3373)
==10281==
==10281==
==10281== 2 errors in context 2 of 2:
==10281== Conditional jump or move depends on uninitialised value(s)
==10281== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10281== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10281== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10281== by 0x40EFC2: execbuiltin (builtin.c:450)
==10281== by 0x42D8E9: execcmd (exec.c:3378)
==10281== by 0x428CA0: execpline2 (exec.c:1697)
==10281== by 0x427FD2: execpline (exec.c:1484)
==10281== by 0x42779A: execlist (exec.c:1275)
==10281== by 0x42717C: execode (exec.c:1073)
==10281== by 0x431299: runshfunc (exec.c:5040)
==10281== by 0x430E76: doshfunc (exec.c:4920)
==10281== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10281==
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10328-by-pythonnut-on-???
==10328== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10328-by-pythonnut-on-???
==10328== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10328-by-pythonnut-on-???
==10328==
==10328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10328== don't want to do, unless you know exactly what you're doing,
==10328== or are doing some strange experiment):
==10328== /usr/lib/valgrind/../../bin/vgdb --pid=10328 ...command...
==10328==
==10328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10328== /path/to/gdb ./zsh
==10328== and then give GDB the following command
==10328== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10328
==10328== --pid is optional if only one valgrind process is running
==10328==
--10328-- Caught __NR_exit; running __libc_freeres()
--10282-- Caught __NR_exit; running __libc_freeres()
==10282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10282-by-pythonnut-on-???
==10282== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10282-by-pythonnut-on-???
==10282== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10282-by-pythonnut-on-???
==10282==
==10282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10282== don't want to do, unless you know exactly what you're doing,
==10282== or are doing some strange experiment):
==10282== /usr/lib/valgrind/../../bin/vgdb --pid=10282 ...command...
==10282==
==10282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10282== /path/to/gdb ./zsh
==10282== and then give GDB the following command
==10282== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10282
==10282== --pid is optional if only one valgrind process is running
==10282==
--10328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10328==
==10278== Checked 4,784,448 bytes
==10278==
==10328== HEAP SUMMARY:
==10328== in use at exit: 3,115,181 bytes in 69,008 blocks
==10328== total heap usage: 1,598,205 allocs, 1,529,197 frees, 129,198,595 bytes allocated
==10328==
--10282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10282==
==10282== HEAP SUMMARY:
==10282== in use at exit: 3,135,707 bytes in 69,477 blocks
==10282== total heap usage: 1,595,073 allocs, 1,525,596 frees, 128,915,101 bytes allocated
==10282==
==10278== LEAK SUMMARY:
==10278== definitely lost: 2,197 bytes in 13 blocks
==10278== indirectly lost: 6,756 bytes in 7 blocks
==10278== possibly lost: 0 bytes in 0 blocks
==10278== still reachable: 3,114,762 bytes in 69,132 blocks
==10278== suppressed: 0 bytes in 0 blocks
==10278== Rerun with --leak-check=full to see details of leaked memory
==10278==
==10278== Use --track-origins=yes to see where uninitialised values come from
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10278==
==10278== 1 errors in context 1 of 2:
==10278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10278== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10278== by 0x488CD0: stringsubst (subst.c:301)
==10278== by 0x48801B: prefork (subst.c:77)
==10278== by 0x42B318: execcmd (exec.c:2619)
==10278== by 0x428CA0: execpline2 (exec.c:1697)
==10278== by 0x427FD2: execpline (exec.c:1484)
==10278== by 0x427756: execlist (exec.c:1267)
==10278== by 0x42717C: execode (exec.c:1073)
==10278== by 0x431299: runshfunc (exec.c:5040)
==10278== by 0x430E76: doshfunc (exec.c:4920)
==10278== by 0x4302FB: execshfunc (exec.c:4557)
==10278== by 0x42D8C1: execcmd (exec.c:3373)
==10278==
==10278==
==10278== 2 errors in context 2 of 2:
==10278== Conditional jump or move depends on uninitialised value(s)
==10278== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10278== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10278== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10278== by 0x40EFC2: execbuiltin (builtin.c:450)
==10278== by 0x42D8E9: execcmd (exec.c:3378)
==10278== by 0x428CA0: execpline2 (exec.c:1697)
==10278== by 0x427FD2: execpline (exec.c:1484)
==10278== by 0x42779A: execlist (exec.c:1275)
==10278== by 0x42717C: execode (exec.c:1073)
==10278== by 0x431299: runshfunc (exec.c:5040)
==10278== by 0x430E76: doshfunc (exec.c:4920)
==10278== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10278==
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== Searching for pointers to 69,008 not-freed blocks
--10328-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10328-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10328-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10328-- Scanning root segment: 0x4037000..0x403afff (16384)
--10328-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10328-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10328-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10328-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10328-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10328-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10328-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10328-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10328-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10328-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10328-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10328-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10328-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10328-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10328-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10328-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10328-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10328-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10328-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10328-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10328-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10328-- Scanning root segment: 0x701a000..0x701afff (4096)
--10328-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10328-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10328-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10328-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10328-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10328-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10328-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10328-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10328-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10328-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10282== Searching for pointers to 69,477 not-freed blocks
--10282-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10282-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10282-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10282-- Scanning root segment: 0x4037000..0x403efff (32768)
--10282-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10282-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10282-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10282-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10282-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10282-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10282-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10282-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10282-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10282-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10282-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10282-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10282-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10282-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10282-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10282-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10282-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333-- Caught __NR_exit; running __libc_freeres()
--10282-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10282-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10282-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10282-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10282-- Scanning root segment: 0x701a000..0x701afff (4096)
--10282-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10282-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10282-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10282-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10282-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10282-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10282-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10282-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10282-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10282-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10333-by-pythonnut-on-???
==10333== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10333-by-pythonnut-on-???
==10333== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10333-by-pythonnut-on-???
==10333==
==10333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10333== don't want to do, unless you know exactly what you're doing,
==10333== or are doing some strange experiment):
==10333== /usr/lib/valgrind/../../bin/vgdb --pid=10333 ...command...
==10333==
==10333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10333== /path/to/gdb ./zsh
==10333== and then give GDB the following command
==10333== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10333
==10333== --pid is optional if only one valgrind process is running
==10333==
--10333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10333==
==10333== HEAP SUMMARY:
==10333== in use at exit: 3,123,722 bytes in 69,152 blocks
==10333== total heap usage: 1,598,535 allocs, 1,529,383 frees, 129,118,213 bytes allocated
==10333==
==10333== Searching for pointers to 69,152 not-freed blocks
--10333-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10333-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10333-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10333-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10333-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10333-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10333-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10333-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10333-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10333-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10333-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10333-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10333-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10333-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10333-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10333-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10333-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10333-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10333-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10333-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10333-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10333-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10333-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10333-- Scanning root segment: 0x701a000..0x701afff (4096)
--10333-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10333-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10333-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10333-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10333-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10333-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10333-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10333-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10333-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10333-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10328== Checked 4,790,344 bytes
==10328==
==10282== Checked 4,836,472 bytes
==10282==
==10328== LEAK SUMMARY:
==10328== definitely lost: 2,197 bytes in 13 blocks
==10328== indirectly lost: 6,756 bytes in 7 blocks
==10328== possibly lost: 0 bytes in 0 blocks
==10328== still reachable: 3,106,228 bytes in 68,988 blocks
==10328== suppressed: 0 bytes in 0 blocks
==10328== Rerun with --leak-check=full to see details of leaked memory
==10328==
==10328== Use --track-origins=yes to see where uninitialised values come from
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328==
==10328== 1 errors in context 1 of 2:
==10328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10328== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10328== by 0x488CD0: stringsubst (subst.c:301)
==10328== by 0x48801B: prefork (subst.c:77)
==10328== by 0x42B318: execcmd (exec.c:2619)
==10328== by 0x428CA0: execpline2 (exec.c:1697)
==10328== by 0x427FD2: execpline (exec.c:1484)
==10328== by 0x427756: execlist (exec.c:1267)
==10328== by 0x42717C: execode (exec.c:1073)
==10328== by 0x431299: runshfunc (exec.c:5040)
==10328== by 0x430E76: doshfunc (exec.c:4920)
==10328== by 0x4302FB: execshfunc (exec.c:4557)
==10328== by 0x42D8C1: execcmd (exec.c:3373)
==10328==
==10328==
==10328== 2 errors in context 2 of 2:
==10328== Conditional jump or move depends on uninitialised value(s)
==10328== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10328== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10328== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10328== by 0x40EFC2: execbuiltin (builtin.c:450)
==10328== by 0x42D8E9: execcmd (exec.c:3378)
==10328== by 0x428CA0: execpline2 (exec.c:1697)
==10328== by 0x427FD2: execpline (exec.c:1484)
==10328== by 0x42779A: execlist (exec.c:1275)
==10328== by 0x42717C: execode (exec.c:1073)
==10328== by 0x431299: runshfunc (exec.c:5040)
==10328== by 0x430E76: doshfunc (exec.c:4920)
==10328== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10328==
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282== LEAK SUMMARY:
==10282== definitely lost: 2,221 bytes in 14 blocks
==10282== indirectly lost: 6,796 bytes in 9 blocks
==10282== possibly lost: 0 bytes in 0 blocks
==10282== still reachable: 3,126,690 bytes in 69,454 blocks
==10282== suppressed: 0 bytes in 0 blocks
==10282== Rerun with --leak-check=full to see details of leaked memory
==10282==
==10282== Use --track-origins=yes to see where uninitialised values come from
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282==
==10282== 1 errors in context 1 of 2:
==10282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10282== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10282== by 0x488CD0: stringsubst (subst.c:301)
==10282== by 0x48801B: prefork (subst.c:77)
==10282== by 0x42B318: execcmd (exec.c:2619)
==10282== by 0x428CA0: execpline2 (exec.c:1697)
==10282== by 0x427FD2: execpline (exec.c:1484)
==10282== by 0x427756: execlist (exec.c:1267)
==10282== by 0x42717C: execode (exec.c:1073)
==10282== by 0x431299: runshfunc (exec.c:5040)
==10282== by 0x430E76: doshfunc (exec.c:4920)
==10282== by 0x4302FB: execshfunc (exec.c:4557)
==10282== by 0x42D8C1: execcmd (exec.c:3373)
==10282==
==10282==
==10282== 2 errors in context 2 of 2:
==10282== Conditional jump or move depends on uninitialised value(s)
==10282== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10282== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10282== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10282== by 0x40EFC2: execbuiltin (builtin.c:450)
==10282== by 0x42D8E9: execcmd (exec.c:3378)
==10282== by 0x428CA0: execpline2 (exec.c:1697)
==10282== by 0x427FD2: execpline (exec.c:1484)
==10282== by 0x42779A: execlist (exec.c:1275)
==10282== by 0x42717C: execode (exec.c:1073)
==10282== by 0x431299: runshfunc (exec.c:5040)
==10282== by 0x430E76: doshfunc (exec.c:4920)
==10282== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10282==
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10334-by-pythonnut-on-???
==10334== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10334-by-pythonnut-on-???
==10334== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10334-by-pythonnut-on-???
==10334==
==10334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10334== don't want to do, unless you know exactly what you're doing,
==10334== or are doing some strange experiment):
==10334== /usr/lib/valgrind/../../bin/vgdb --pid=10334 ...command...
==10334==
==10334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10334== /path/to/gdb ./zsh
==10334== and then give GDB the following command
==10334== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10334
==10334== --pid is optional if only one valgrind process is running
==10334==
--10334-- Caught __NR_exit; running __libc_freeres()
--10275-- Caught __NR_exit; running __libc_freeres()
--10334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10334==
==10334== HEAP SUMMARY:
==10334== in use at exit: 3,115,180 bytes in 69,008 blocks
==10334== total heap usage: 1,598,213 allocs, 1,529,205 frees, 129,202,248 bytes allocated
==10334==
==10275==
==10333== Checked 4,784,584 bytes
==10333==
==10275== HEAP SUMMARY:
==10275== in use at exit: 3,133,543 bytes in 69,402 blocks
==10275== total heap usage: 1,595,024 allocs, 1,525,622 frees, 128,915,712 bytes allocated
==10275==
==10333== LEAK SUMMARY:
==10333== definitely lost: 2,197 bytes in 13 blocks
==10333== indirectly lost: 6,756 bytes in 7 blocks
==10333== possibly lost: 0 bytes in 0 blocks
==10333== still reachable: 3,114,769 bytes in 69,132 blocks
==10333== suppressed: 0 bytes in 0 blocks
==10333== Rerun with --leak-check=full to see details of leaked memory
==10333==
==10333== Use --track-origins=yes to see where uninitialised values come from
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10333==
==10333== 1 errors in context 1 of 2:
==10333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10333== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10333== by 0x488CD0: stringsubst (subst.c:301)
==10333== by 0x48801B: prefork (subst.c:77)
==10333== by 0x42B318: execcmd (exec.c:2619)
==10333== by 0x428CA0: execpline2 (exec.c:1697)
==10333== by 0x427FD2: execpline (exec.c:1484)
==10333== by 0x427756: execlist (exec.c:1267)
==10333== by 0x42717C: execode (exec.c:1073)
==10333== by 0x431299: runshfunc (exec.c:5040)
==10333== by 0x430E76: doshfunc (exec.c:4920)
==10333== by 0x4302FB: execshfunc (exec.c:4557)
==10333== by 0x42D8C1: execcmd (exec.c:3373)
==10333==
==10333==
==10333== 2 errors in context 2 of 2:
==10333== Conditional jump or move depends on uninitialised value(s)
==10333== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10333== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10333== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10333== by 0x40EFC2: execbuiltin (builtin.c:450)
==10333== by 0x42D8E9: execcmd (exec.c:3378)
==10333== by 0x428CA0: execpline2 (exec.c:1697)
==10333== by 0x427FD2: execpline (exec.c:1484)
==10333== by 0x42779A: execlist (exec.c:1275)
==10333== by 0x42717C: execode (exec.c:1073)
==10333== by 0x431299: runshfunc (exec.c:5040)
==10333== by 0x430E76: doshfunc (exec.c:4920)
==10333== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10333==
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== Searching for pointers to 69,008 not-freed blocks
--10334-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10334-- Scanning root segment: 0x4037000..0x403afff (16384)
--10334-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10334-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10334-- Scanning root segment: 0x4223000..0x4223fff (4096)
==10275== Searching for pointers to 69,402 not-freed blocks
--10275-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10334-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10334-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10334-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10334-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10334-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10334-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10334-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10334-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10334-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10275-- Scanning root segment: 0x4037000..0x403afff (16384)
--10275-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10334-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10334-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10275-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10275-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10275-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10275-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10275-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10275-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10275-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10275-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10275-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10275-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10275-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10334-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10275-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10275-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10275-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10334-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10334-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334-- Scanning root segment: 0x701a000..0x701afff (4096)
--10275-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10334-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10275-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10334-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10275-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10275-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10275-- Scanning root segment: 0x701a000..0x701afff (4096)
--10275-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10334-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10275-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10334-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10275-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10334-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10334-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10334-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10275-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10334-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10334-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10275-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10275-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10335-by-pythonnut-on-???
==10335== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10335-by-pythonnut-on-???
==10335== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10335-by-pythonnut-on-???
==10335==
==10335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10335== don't want to do, unless you know exactly what you're doing,
==10335== or are doing some strange experiment):
==10335== /usr/lib/valgrind/../../bin/vgdb --pid=10335 ...command...
==10335==
==10335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10335== /path/to/gdb ./zsh
==10335== and then give GDB the following command
==10335== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10335
==10335== --pid is optional if only one valgrind process is running
==10335==
--10335-- Caught __NR_exit; running __libc_freeres()
--10335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10335==
==10335== HEAP SUMMARY:
==10335== in use at exit: 3,123,818 bytes in 69,152 blocks
==10335== total heap usage: 1,598,551 allocs, 1,529,399 frees, 129,123,000 bytes allocated
==10335==
==10335== Searching for pointers to 69,152 not-freed blocks
--10335-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10335-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10335-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10335-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10335-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10335-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10335-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10335-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10335-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10335-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10335-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10335-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10335-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10335-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10335-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10335-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10335-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10335-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10335-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10335-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10335-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10335-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10335-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10335-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10335-- Scanning root segment: 0x701a000..0x701afff (4096)
--10335-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10335-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10335-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10335-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10335-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10335-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10335-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10335-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10335-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10335-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10275== Checked 4,816,400 bytes
==10275==
==10334== Checked 4,790,344 bytes
==10334==
==10275== LEAK SUMMARY:
==10275== definitely lost: 2,221 bytes in 14 blocks
==10275== indirectly lost: 6,796 bytes in 9 blocks
==10275== possibly lost: 0 bytes in 0 blocks
==10275== still reachable: 3,124,526 bytes in 69,379 blocks
==10275== suppressed: 0 bytes in 0 blocks
==10275== Rerun with --leak-check=full to see details of leaked memory
==10275==
==10275== Use --track-origins=yes to see where uninitialised values come from
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275==
==10275== 1 errors in context 1 of 2:
==10275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10275== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10275== by 0x488CD0: stringsubst (subst.c:301)
==10275== by 0x48801B: prefork (subst.c:77)
==10275== by 0x42B318: execcmd (exec.c:2619)
==10275== by 0x428CA0: execpline2 (exec.c:1697)
==10275== by 0x427FD2: execpline (exec.c:1484)
==10275== by 0x427756: execlist (exec.c:1267)
==10275== by 0x42717C: execode (exec.c:1073)
==10275== by 0x431299: runshfunc (exec.c:5040)
==10275== by 0x430E76: doshfunc (exec.c:4920)
==10275== by 0x4302FB: execshfunc (exec.c:4557)
==10275== by 0x42D8C1: execcmd (exec.c:3373)
==10275==
==10275==
==10275== 2 errors in context 2 of 2:
==10275== Conditional jump or move depends on uninitialised value(s)
==10275== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10275== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10275== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10275== by 0x40EFC2: execbuiltin (builtin.c:450)
==10275== by 0x42D8E9: execcmd (exec.c:3378)
==10275== by 0x428CA0: execpline2 (exec.c:1697)
==10275== by 0x427FD2: execpline (exec.c:1484)
==10275== by 0x42779A: execlist (exec.c:1275)
==10275== by 0x42717C: execode (exec.c:1073)
==10275== by 0x431299: runshfunc (exec.c:5040)
==10275== by 0x430E76: doshfunc (exec.c:4920)
==10275== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10275==
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== LEAK SUMMARY:
==10334== definitely lost: 2,197 bytes in 13 blocks
==10334== indirectly lost: 6,756 bytes in 7 blocks
==10334== possibly lost: 0 bytes in 0 blocks
==10334== still reachable: 3,106,227 bytes in 68,988 blocks
==10334== suppressed: 0 bytes in 0 blocks
==10334== Rerun with --leak-check=full to see details of leaked memory
==10334==
==10334== Use --track-origins=yes to see where uninitialised values come from
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334==
==10334== 1 errors in context 1 of 2:
==10334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10334== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10334== by 0x488CD0: stringsubst (subst.c:301)
==10334== by 0x48801B: prefork (subst.c:77)
==10334== by 0x42B318: execcmd (exec.c:2619)
==10334== by 0x428CA0: execpline2 (exec.c:1697)
==10334== by 0x427FD2: execpline (exec.c:1484)
==10334== by 0x427756: execlist (exec.c:1267)
==10334== by 0x42717C: execode (exec.c:1073)
==10334== by 0x431299: runshfunc (exec.c:5040)
==10334== by 0x430E76: doshfunc (exec.c:4920)
==10334== by 0x4302FB: execshfunc (exec.c:4557)
==10334== by 0x42D8C1: execcmd (exec.c:3373)
==10334==
==10334==
==10334== 2 errors in context 2 of 2:
==10334== Conditional jump or move depends on uninitialised value(s)
==10334== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10334== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10334== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10334== by 0x40EFC2: execbuiltin (builtin.c:450)
==10334== by 0x42D8E9: execcmd (exec.c:3378)
==10334== by 0x428CA0: execpline2 (exec.c:1697)
==10334== by 0x427FD2: execpline (exec.c:1484)
==10334== by 0x42779A: execlist (exec.c:1275)
==10334== by 0x42717C: execode (exec.c:1073)
==10334== by 0x431299: runshfunc (exec.c:5040)
==10334== by 0x430E76: doshfunc (exec.c:4920)
==10334== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10334==
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121-- Caught __NR_exit; running __libc_freeres()
==10336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10336-by-pythonnut-on-???
==10336== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10336-by-pythonnut-on-???
==10336== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10336-by-pythonnut-on-???
==10336==
==10336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10336== don't want to do, unless you know exactly what you're doing,
==10336== or are doing some strange experiment):
==10336== /usr/lib/valgrind/../../bin/vgdb --pid=10336 ...command...
==10336==
==10336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10336== /path/to/gdb ./zsh
==10336== and then give GDB the following command
==10336== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10336
==10336== --pid is optional if only one valgrind process is running
==10336==
--10336-- Caught __NR_exit; running __libc_freeres()
--10121-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121==
==10336==
==10336== HEAP SUMMARY:
==10336== in use at exit: 3,115,183 bytes in 69,008 blocks
==10336== total heap usage: 1,598,215 allocs, 1,529,207 frees, 129,202,825 bytes allocated
==10336==
==10121== HEAP SUMMARY:
==10121== in use at exit: 3,131,268 bytes in 69,329 blocks
==10121== total heap usage: 1,595,007 allocs, 1,525,678 frees, 128,911,905 bytes allocated
==10121==
==10335== Checked 4,783,864 bytes
==10335==
==10336== Searching for pointers to 69,008 not-freed blocks
--10336-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10336-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10336-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10336-- Scanning root segment: 0x4037000..0x403afff (16384)
--10336-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10336-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10336-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10336-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10336-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10336-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10336-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10336-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10336-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10336-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10336-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10336-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10336-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10336-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10336-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10336-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10336-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10336-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10336-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10336-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10336-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10336-- Scanning root segment: 0x701a000..0x701afff (4096)
--10336-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10336-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10336-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10336-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10336-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10336-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10336-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10336-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10336-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10336-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10121== Searching for pointers to 69,329 not-freed blocks
--10121-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10121-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10121-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10121-- Scanning root segment: 0x4037000..0x403afff (16384)
--10121-- Scanning root segment: 0x4049000..0x404cfff (16384)
==10335== LEAK SUMMARY:
==10335== definitely lost: 2,197 bytes in 13 blocks
==10335== indirectly lost: 6,756 bytes in 7 blocks
==10335== possibly lost: 0 bytes in 0 blocks
==10335== still reachable: 3,114,865 bytes in 69,132 blocks
==10335== suppressed: 0 bytes in 0 blocks
==10335== Rerun with --leak-check=full to see details of leaked memory
==10335==
==10335== Use --track-origins=yes to see where uninitialised values come from
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10335==
==10335== 1 errors in context 1 of 2:
==10335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10335== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10335== by 0x488CD0: stringsubst (subst.c:301)
==10335== by 0x48801B: prefork (subst.c:77)
--10121-- Scanning root segment: 0x4222000..0x4222fff (4096)
==10335== by 0x42B318: execcmd (exec.c:2619)
==10335== by 0x428CA0: execpline2 (exec.c:1697)
==10335== by 0x427FD2: execpline (exec.c:1484)
==10335== by 0x427756: execlist (exec.c:1267)
--10121-- Scanning root segment: 0x4223000..0x4223fff (4096)
==10335== by 0x42717C: execode (exec.c:1073)
==10335== by 0x431299: runshfunc (exec.c:5040)
==10335== by 0x430E76: doshfunc (exec.c:4920)
==10335== by 0x4302FB: execshfunc (exec.c:4557)
==10335== by 0x42D8C1: execcmd (exec.c:3373)
==10335==
--10121-- Scanning root segment: 0x4224000..0x4224fff (4096)
==10335==
==10335== 2 errors in context 2 of 2:
==10335== Conditional jump or move depends on uninitialised value(s)
--10121-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
==10335== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10335== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10335== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--10121-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
==10335== by 0x40EFC2: execbuiltin (builtin.c:450)
==10335== by 0x42D8E9: execcmd (exec.c:3378)
==10335== by 0x428CA0: execpline2 (exec.c:1697)
==10335== by 0x427FD2: execpline (exec.c:1484)
==10335== by 0x42779A: execlist (exec.c:1275)
==10335== by 0x42717C: execode (exec.c:1073)
==10335== by 0x431299: runshfunc (exec.c:5040)
==10335== by 0x430E76: doshfunc (exec.c:4920)
==10335== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10335==
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10121-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10121-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10121-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10121-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10121-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10121-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10121-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10121-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10121-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10121-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10121-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10121-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10121-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10121-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10121-- Scanning root segment: 0x701a000..0x701afff (4096)
--10121-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10121-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10121-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10121-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10121-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10121-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10121-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10121-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10121-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10121-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFEC7DC, len 4
==10338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10338-by-pythonnut-on-???
==10338== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10338-by-pythonnut-on-???
==10338== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10338-by-pythonnut-on-???
==10338==
==10338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10338== don't want to do, unless you know exactly what you're doing,
==10338== or are doing some strange experiment):
==10338== /usr/lib/valgrind/../../bin/vgdb --pid=10338 ...command...
==10338==
==10338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10338== /path/to/gdb ./zsh
==10338== and then give GDB the following command
==10338== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10338
==10338== --pid is optional if only one valgrind process is running
==10338==
--10338-- Caught __NR_exit; running __libc_freeres()
==10336== Checked 4,790,344 bytes
==10336==
==10121== Checked 4,813,744 bytes
==10121==
==10336== LEAK SUMMARY:
==10336== definitely lost: 2,197 bytes in 13 blocks
==10336== indirectly lost: 6,756 bytes in 7 blocks
==10336== possibly lost: 0 bytes in 0 blocks
==10336== still reachable: 3,106,230 bytes in 68,988 blocks
==10336== suppressed: 0 bytes in 0 blocks
==10336== Rerun with --leak-check=full to see details of leaked memory
==10336==
==10336== Use --track-origins=yes to see where uninitialised values come from
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10336==
==10336== 1 errors in context 1 of 2:
==10336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10336== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10336== by 0x488CD0: stringsubst (subst.c:301)
==10336== by 0x48801B: prefork (subst.c:77)
==10336== by 0x42B318: execcmd (exec.c:2619)
==10336== by 0x428CA0: execpline2 (exec.c:1697)
==10336== by 0x427FD2: execpline (exec.c:1484)
==10336== by 0x427756: execlist (exec.c:1267)
==10336== by 0x42717C: execode (exec.c:1073)
==10336== by 0x431299: runshfunc (exec.c:5040)
==10336== by 0x430E76: doshfunc (exec.c:4920)
==10336== by 0x4302FB: execshfunc (exec.c:4557)
==10336== by 0x42D8C1: execcmd (exec.c:3373)
==10336==
==10336==
==10336== 2 errors in context 2 of 2:
==10336== Conditional jump or move depends on uninitialised value(s)
==10336== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10336== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10336== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10336== by 0x40EFC2: execbuiltin (builtin.c:450)
==10336== by 0x42D8E9: execcmd (exec.c:3378)
==10336== by 0x428CA0: execpline2 (exec.c:1697)
==10336== by 0x427FD2: execpline (exec.c:1484)
==10336== by 0x42779A: execlist (exec.c:1275)
==10336== by 0x42717C: execode (exec.c:1073)
==10336== by 0x431299: runshfunc (exec.c:5040)
==10336== by 0x430E76: doshfunc (exec.c:4920)
==10336== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10336==
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121== LEAK SUMMARY:
==10121== definitely lost: 2,221 bytes in 14 blocks
==10121== indirectly lost: 6,796 bytes in 9 blocks
==10121== possibly lost: 0 bytes in 0 blocks
==10121== still reachable: 3,122,251 bytes in 69,306 blocks
==10121== suppressed: 0 bytes in 0 blocks
==10121== Rerun with --leak-check=full to see details of leaked memory
==10121==
==10121== Use --track-origins=yes to see where uninitialised values come from
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10121==
==10121== 1 errors in context 1 of 2:
==10121== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10121== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10121== by 0x488CD0: stringsubst (subst.c:301)
==10121== by 0x48801B: prefork (subst.c:77)
==10121== by 0x42B318: execcmd (exec.c:2619)
==10121== by 0x428CA0: execpline2 (exec.c:1697)
==10121== by 0x427FD2: execpline (exec.c:1484)
==10121== by 0x427756: execlist (exec.c:1267)
==10121== by 0x42717C: execode (exec.c:1073)
==10121== by 0x431299: runshfunc (exec.c:5040)
==10121== by 0x430E76: doshfunc (exec.c:4920)
==10121== by 0x4302FB: execshfunc (exec.c:4557)
==10121== by 0x42D8C1: execcmd (exec.c:3373)
==10121==
==10121==
==10121== 2 errors in context 2 of 2:
==10121== Conditional jump or move depends on uninitialised value(s)
==10121== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10121== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10121== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10121== by 0x40EFC2: execbuiltin (builtin.c:450)
==10121== by 0x42D8E9: execcmd (exec.c:3378)
==10121== by 0x428CA0: execpline2 (exec.c:1697)
==10121== by 0x427FD2: execpline (exec.c:1484)
==10121== by 0x42779A: execlist (exec.c:1275)
==10121== by 0x42717C: execode (exec.c:1073)
==10121== by 0x431299: runshfunc (exec.c:5040)
==10121== by 0x430E76: doshfunc (exec.c:4920)
==10121== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10121==
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338==
==10338== HEAP SUMMARY:
==10338== in use at exit: 3,124,092 bytes in 69,158 blocks
==10338== total heap usage: 1,599,076 allocs, 1,529,918 frees, 129,275,030 bytes allocated
==10338==
==10339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10339-by-pythonnut-on-???
==10339== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10339-by-pythonnut-on-???
==10339== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10339-by-pythonnut-on-???
==10339==
==10339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10339== don't want to do, unless you know exactly what you're doing,
==10339== or are doing some strange experiment):
==10339== /usr/lib/valgrind/../../bin/vgdb --pid=10339 ...command...
==10339==
==10339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10339== /path/to/gdb ./zsh
==10339== and then give GDB the following command
==10339== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10339
==10339== --pid is optional if only one valgrind process is running
==10339==
--10340-- Caught __NR_exit; running __libc_freeres()
==10340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10340-by-pythonnut-on-???
==10340== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10340-by-pythonnut-on-???
==10340== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10340-by-pythonnut-on-???
==10340==
==10340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10340== don't want to do, unless you know exactly what you're doing,
==10340== or are doing some strange experiment):
==10340== /usr/lib/valgrind/../../bin/vgdb --pid=10340 ...command...
==10340==
==10340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10340== /path/to/gdb ./zsh
==10340== and then give GDB the following command
==10340== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10340
==10340== --pid is optional if only one valgrind process is running
==10340==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
==10338== Searching for pointers to 69,158 not-freed blocks
--10338-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10338-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10338-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10338-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10338-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10338-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10338-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10338-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10338-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10338-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10338-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10338-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10338-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10338-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10338-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10338-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10338-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10338-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10338-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10338-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10338-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10338-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10338-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10338-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10338-- Scanning root segment: 0x701a000..0x701afff (4096)
--10338-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10338-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10338-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10338-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10338-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10338-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10338-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10338-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10338-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10338-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10340==
==10340== HEAP SUMMARY:
==10340== in use at exit: 3,115,465 bytes in 69,013 blocks
==10340== total heap usage: 1,598,221 allocs, 1,529,208 frees, 129,206,439 bytes allocated
==10340==
==10340== Searching for pointers to 69,013 not-freed blocks
--10340-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10340-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10340-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10340-- Scanning root segment: 0x4037000..0x403afff (16384)
--10340-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10340-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10340-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10340-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10340-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10340-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10340-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10340-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10340-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10340-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10340-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10340-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10340-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10340-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10340-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10340-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10340-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10340-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10340-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10340-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10340-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10340-- Scanning root segment: 0x701a000..0x701afff (4096)
--10340-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10340-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10340-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10340-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10340-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10340-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10340-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10340-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10340-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10340-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10338== Checked 4,784,072 bytes
==10338==
==10338== LEAK SUMMARY:
==10338== definitely lost: 2,197 bytes in 13 blocks
==10338== indirectly lost: 6,756 bytes in 7 blocks
==10338== possibly lost: 0 bytes in 0 blocks
==10338== still reachable: 3,115,139 bytes in 69,138 blocks
==10338== suppressed: 0 bytes in 0 blocks
==10338== Rerun with --leak-check=full to see details of leaked memory
==10338==
==10338== Use --track-origins=yes to see where uninitialised values come from
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338==
==10338== 1 errors in context 1 of 2:
==10338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10338== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10338== by 0x488CD0: stringsubst (subst.c:301)
==10338== by 0x48801B: prefork (subst.c:77)
==10338== by 0x42B318: execcmd (exec.c:2619)
==10338== by 0x428CA0: execpline2 (exec.c:1697)
==10338== by 0x427FD2: execpline (exec.c:1484)
==10338== by 0x427756: execlist (exec.c:1267)
==10338== by 0x42717C: execode (exec.c:1073)
==10338== by 0x431299: runshfunc (exec.c:5040)
==10338== by 0x430E76: doshfunc (exec.c:4920)
==10338== by 0x4302FB: execshfunc (exec.c:4557)
==10338== by 0x42D8C1: execcmd (exec.c:3373)
==10338==
==10338==
==10338== 2 errors in context 2 of 2:
==10338== Conditional jump or move depends on uninitialised value(s)
==10338== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10338== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10338== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10338== by 0x40EFC2: execbuiltin (builtin.c:450)
==10338== by 0x42D8E9: execcmd (exec.c:3378)
==10338== by 0x428CA0: execpline2 (exec.c:1697)
==10338== by 0x427FD2: execpline (exec.c:1484)
==10338== by 0x42779A: execlist (exec.c:1275)
==10338== by 0x42717C: execode (exec.c:1073)
==10338== by 0x431299: runshfunc (exec.c:5040)
==10338== by 0x430E76: doshfunc (exec.c:4920)
==10338== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10338==
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Caught __NR_exit; running __libc_freeres()
==10340== Checked 4,791,256 bytes
==10340==
==10342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10342-by-pythonnut-on-???
==10342== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10342-by-pythonnut-on-???
==10342== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10342-by-pythonnut-on-???
==10342==
==10342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10342== don't want to do, unless you know exactly what you're doing,
==10342== or are doing some strange experiment):
==10342== /usr/lib/valgrind/../../bin/vgdb --pid=10342 ...command...
==10342==
==10342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10342== /path/to/gdb ./zsh
==10342== and then give GDB the following command
==10342== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10342
==10342== --pid is optional if only one valgrind process is running
==10342==
==10340== LEAK SUMMARY:
==10340== definitely lost: 2,197 bytes in 13 blocks
==10340== indirectly lost: 6,756 bytes in 7 blocks
==10340== possibly lost: 0 bytes in 0 blocks
==10340== still reachable: 3,106,512 bytes in 68,993 blocks
==10340== suppressed: 0 bytes in 0 blocks
==10340== Rerun with --leak-check=full to see details of leaked memory
==10340==
==10340== Use --track-origins=yes to see where uninitialised values come from
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10340==
==10340== 1 errors in context 1 of 2:
==10340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10340== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10340== by 0x488CD0: stringsubst (subst.c:301)
==10340== by 0x48801B: prefork (subst.c:77)
==10340== by 0x42B318: execcmd (exec.c:2619)
==10340== by 0x428CA0: execpline2 (exec.c:1697)
==10340== by 0x427FD2: execpline (exec.c:1484)
==10340== by 0x427756: execlist (exec.c:1267)
==10340== by 0x42717C: execode (exec.c:1073)
==10340== by 0x431299: runshfunc (exec.c:5040)
==10340== by 0x430E76: doshfunc (exec.c:4920)
==10340== by 0x4302FB: execshfunc (exec.c:4557)
==10340== by 0x42D8C1: execcmd (exec.c:3373)
==10340==
==10340==
==10340== 2 errors in context 2 of 2:
==10340== Conditional jump or move depends on uninitialised value(s)
==10340== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10340== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10340== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10340== by 0x40EFC2: execbuiltin (builtin.c:450)
==10340== by 0x42D8E9: execcmd (exec.c:3378)
==10340== by 0x428CA0: execpline2 (exec.c:1697)
==10340== by 0x427FD2: execpline (exec.c:1484)
==10340== by 0x42779A: execlist (exec.c:1275)
==10340== by 0x42717C: execode (exec.c:1073)
==10340== by 0x431299: runshfunc (exec.c:5040)
==10340== by 0x430E76: doshfunc (exec.c:4920)
==10340== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10340==
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10339-- Caught __NR_exit; running __libc_freeres()
==10342==
==10342== HEAP SUMMARY:
==10342== in use at exit: 3,123,996 bytes in 69,158 blocks
==10342== total heap usage: 1,599,056 allocs, 1,529,898 frees, 129,272,800 bytes allocated
==10342==
--10339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10342== Searching for pointers to 69,158 not-freed blocks
--10342-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10342-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10342-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10342-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10342-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10342-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10342-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10342-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10342-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10342-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10342-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10342-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10342-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10342-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10342-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10342-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10342-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10342-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10342-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10342-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10342-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10342-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10342-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10342-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10342-- Scanning root segment: 0x701a000..0x701afff (4096)
--10342-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10342-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10342-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10342-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10342-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10342-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10342-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10342-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10342-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10342-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10339==
==10339== HEAP SUMMARY:
==10339== in use at exit: 3,115,241 bytes in 69,010 blocks
==10339== total heap usage: 1,598,224 allocs, 1,529,214 frees, 129,207,015 bytes allocated
==10339==
==10339== Searching for pointers to 69,010 not-freed blocks
--10339-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10339-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10339-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10339-- Scanning root segment: 0x4037000..0x403afff (16384)
--10339-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10339-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10339-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10339-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10339-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10339-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10339-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10339-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10339-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10339-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10339-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10339-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10339-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10339-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10339-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10339-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10339-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10339-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10339-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10339-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10339-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10339-- Scanning root segment: 0x701a000..0x701afff (4096)
--10339-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10339-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10339-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10339-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10339-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10339-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10339-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10339-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10339-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10339-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10342== Checked 4,783,976 bytes
==10342==
==10342== LEAK SUMMARY:
==10342== definitely lost: 2,197 bytes in 13 blocks
==10342== indirectly lost: 6,756 bytes in 7 blocks
==10342== possibly lost: 0 bytes in 0 blocks
==10342== still reachable: 3,115,043 bytes in 69,138 blocks
==10342== suppressed: 0 bytes in 0 blocks
==10342== Rerun with --leak-check=full to see details of leaked memory
==10342==
==10342== Use --track-origins=yes to see where uninitialised values come from
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10342==
==10342== 1 errors in context 1 of 2:
==10342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10342== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10342== by 0x488CD0: stringsubst (subst.c:301)
==10342== by 0x48801B: prefork (subst.c:77)
==10342== by 0x42B318: execcmd (exec.c:2619)
==10342== by 0x428CA0: execpline2 (exec.c:1697)
==10342== by 0x427FD2: execpline (exec.c:1484)
==10342== by 0x427756: execlist (exec.c:1267)
==10342== by 0x42717C: execode (exec.c:1073)
==10342== by 0x431299: runshfunc (exec.c:5040)
==10342== by 0x430E76: doshfunc (exec.c:4920)
==10342== by 0x4302FB: execshfunc (exec.c:4557)
==10342== by 0x42D8C1: execcmd (exec.c:3373)
==10342==
==10342==
==10342== 2 errors in context 2 of 2:
==10342== Conditional jump or move depends on uninitialised value(s)
==10342== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10342== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10342== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10342== by 0x40EFC2: execbuiltin (builtin.c:450)
==10342== by 0x42D8E9: execcmd (exec.c:3378)
==10342== by 0x428CA0: execpline2 (exec.c:1697)
==10342== by 0x427FD2: execpline (exec.c:1484)
==10342== by 0x42779A: execlist (exec.c:1275)
==10342== by 0x42717C: execode (exec.c:1073)
==10342== by 0x431299: runshfunc (exec.c:5040)
==10342== by 0x430E76: doshfunc (exec.c:4920)
==10342== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10342==
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339== Checked 4,790,400 bytes
==10339==
==10345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10345-by-pythonnut-on-???
==10345== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10345-by-pythonnut-on-???
==10345== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10345-by-pythonnut-on-???
==10345==
==10345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10345== don't want to do, unless you know exactly what you're doing,
==10345== or are doing some strange experiment):
==10345== /usr/lib/valgrind/../../bin/vgdb --pid=10345 ...command...
==10345==
==10345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10345== /path/to/gdb ./zsh
==10345== and then give GDB the following command
==10345== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10345
==10345== --pid is optional if only one valgrind process is running
==10345==
==10339== LEAK SUMMARY:
==10339== definitely lost: 2,197 bytes in 13 blocks
==10339== indirectly lost: 6,756 bytes in 7 blocks
==10339== possibly lost: 0 bytes in 0 blocks
==10339== still reachable: 3,106,288 bytes in 68,990 blocks
==10339== suppressed: 0 bytes in 0 blocks
==10339== Rerun with --leak-check=full to see details of leaked memory
==10339==
==10339== Use --track-origins=yes to see where uninitialised values come from
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339==
==10339== 1 errors in context 1 of 2:
==10339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10339== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10339== by 0x488CD0: stringsubst (subst.c:301)
==10339== by 0x48801B: prefork (subst.c:77)
==10339== by 0x42B318: execcmd (exec.c:2619)
==10339== by 0x428CA0: execpline2 (exec.c:1697)
==10339== by 0x427FD2: execpline (exec.c:1484)
==10339== by 0x427756: execlist (exec.c:1267)
==10339== by 0x42717C: execode (exec.c:1073)
==10339== by 0x431299: runshfunc (exec.c:5040)
==10339== by 0x430E76: doshfunc (exec.c:4920)
==10339== by 0x4302FB: execshfunc (exec.c:4557)
==10339== by 0x42D8C1: execcmd (exec.c:3373)
==10339==
==10339==
==10339== 2 errors in context 2 of 2:
==10339== Conditional jump or move depends on uninitialised value(s)
==10339== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10339== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10339== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10339== by 0x40EFC2: execbuiltin (builtin.c:450)
==10339== by 0x42D8E9: execcmd (exec.c:3378)
==10339== by 0x428CA0: execpline2 (exec.c:1697)
==10339== by 0x427FD2: execpline (exec.c:1484)
==10339== by 0x42779A: execlist (exec.c:1275)
==10339== by 0x42717C: execode (exec.c:1073)
==10339== by 0x431299: runshfunc (exec.c:5040)
==10339== by 0x430E76: doshfunc (exec.c:4920)
==10339== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10339==
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10345-- Caught __NR_exit; running __libc_freeres()
--10197-- Caught __NR_exit; running __libc_freeres()
--10345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10197-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10345==
==10197==
==10345== HEAP SUMMARY:
==10345== in use at exit: 3,124,024 bytes in 69,159 blocks
==10345== total heap usage: 1,599,069 allocs, 1,529,910 frees, 129,275,487 bytes allocated
==10345==
==10197== HEAP SUMMARY:
==10197== in use at exit: 3,112,747 bytes in 68,933 blocks
==10197== total heap usage: 1,598,223 allocs, 1,529,290 frees, 129,208,805 bytes allocated
==10197==
==10345== Searching for pointers to 69,159 not-freed blocks
--10345-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10345-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10345-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10345-- Scanning root segment: 0x4037000..0x403afff (16384)
--10345-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10345-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10345-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10345-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10345-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10345-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10345-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10345-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10345-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10345-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10345-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10345-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10345-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10345-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10345-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10345-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10345-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10345-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10345-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10345-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10345-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10345-- Scanning root segment: 0x701a000..0x701afff (4096)
--10345-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10345-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10345-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10345-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10345-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10345-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10345-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10345-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10345-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10345-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10197== Searching for pointers to 68,933 not-freed blocks
--10197-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10197-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10197-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10197-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10197-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10197-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10197-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10197-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10197-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10197-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10197-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10197-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10197-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10197-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10197-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10197-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10197-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10197-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10197-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10197-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10197-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10197-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10197-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10197-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10197-- Scanning root segment: 0x701a000..0x701afff (4096)
--10197-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10197-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10197-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10197-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10197-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10197-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10197-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10197-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10197-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10197-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10345== Checked 4,799,872 bytes
==10345==
==10197== Checked 4,768,544 bytes
==10197==
==10345== LEAK SUMMARY:
==10345== definitely lost: 2,197 bytes in 13 blocks
==10345== indirectly lost: 6,756 bytes in 7 blocks
==10345== possibly lost: 0 bytes in 0 blocks
==10345== still reachable: 3,115,071 bytes in 69,139 blocks
==10345== suppressed: 0 bytes in 0 blocks
==10345== Rerun with --leak-check=full to see details of leaked memory
==10345==
==10345== Use --track-origins=yes to see where uninitialised values come from
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10345==
==10345== 1 errors in context 1 of 2:
==10345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10345== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10345== by 0x488CD0: stringsubst (subst.c:301)
==10345== by 0x48801B: prefork (subst.c:77)
==10345== by 0x42B318: execcmd (exec.c:2619)
==10345== by 0x428CA0: execpline2 (exec.c:1697)
==10345== by 0x427FD2: execpline (exec.c:1484)
==10345== by 0x427756: execlist (exec.c:1267)
==10345== by 0x42717C: execode (exec.c:1073)
==10345== by 0x431299: runshfunc (exec.c:5040)
==10345== by 0x430E76: doshfunc (exec.c:4920)
==10345== by 0x4302FB: execshfunc (exec.c:4557)
==10345== by 0x42D8C1: execcmd (exec.c:3373)
==10345==
==10345==
==10345== 2 errors in context 2 of 2:
==10345== Conditional jump or move depends on uninitialised value(s)
==10345== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10345== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10345== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10345== by 0x40EFC2: execbuiltin (builtin.c:450)
==10345== by 0x42D8E9: execcmd (exec.c:3378)
==10345== by 0x428CA0: execpline2 (exec.c:1697)
==10345== by 0x427FD2: execpline (exec.c:1484)
==10345== by 0x42779A: execlist (exec.c:1275)
==10345== by 0x42717C: execode (exec.c:1073)
==10345== by 0x431299: runshfunc (exec.c:5040)
==10345== by 0x430E76: doshfunc (exec.c:4920)
==10345== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10345==
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== LEAK SUMMARY:
==10197== definitely lost: 2,197 bytes in 13 blocks
==10197== indirectly lost: 6,756 bytes in 7 blocks
==10197== possibly lost: 0 bytes in 0 blocks
==10197== still reachable: 3,103,794 bytes in 68,913 blocks
==10197== suppressed: 0 bytes in 0 blocks
==10197== Rerun with --leak-check=full to see details of leaked memory
==10197==
==10197== Use --track-origins=yes to see where uninitialised values come from
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197==
==10197== 1 errors in context 1 of 2:
==10197== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10197== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10197== by 0x488CD0: stringsubst (subst.c:301)
==10197== by 0x48801B: prefork (subst.c:77)
==10197== by 0x42B318: execcmd (exec.c:2619)
==10197== by 0x428CA0: execpline2 (exec.c:1697)
==10197== by 0x427FD2: execpline (exec.c:1484)
==10197== by 0x427756: execlist (exec.c:1267)
==10197== by 0x42717C: execode (exec.c:1073)
==10197== by 0x431299: runshfunc (exec.c:5040)
==10197== by 0x430E76: doshfunc (exec.c:4920)
==10197== by 0x4302FB: execshfunc (exec.c:4557)
==10197== by 0x42D8C1: execcmd (exec.c:3373)
==10197==
==10197==
==10197== 2 errors in context 2 of 2:
==10197== Conditional jump or move depends on uninitialised value(s)
==10197== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10197== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10197== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10197== by 0x40EFC2: execbuiltin (builtin.c:450)
==10197== by 0x42D8E9: execcmd (exec.c:3378)
==10197== by 0x428CA0: execpline2 (exec.c:1697)
==10197== by 0x427FD2: execpline (exec.c:1484)
==10197== by 0x42779A: execlist (exec.c:1275)
==10197== by 0x42717C: execode (exec.c:1073)
==10197== by 0x431299: runshfunc (exec.c:5040)
==10197== by 0x430E76: doshfunc (exec.c:4920)
==10197== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10197==
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10346-by-pythonnut-on-???
==10346== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10346-by-pythonnut-on-???
==10346== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10346-by-pythonnut-on-???
==10346==
==10346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10346== don't want to do, unless you know exactly what you're doing,
==10346== or are doing some strange experiment):
==10346== /usr/lib/valgrind/../../bin/vgdb --pid=10346 ...command...
==10346==
==10346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10346== /path/to/gdb ./zsh
==10346== and then give GDB the following command
==10346== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10346
==10346== --pid is optional if only one valgrind process is running
==10346==
==10348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10348-by-pythonnut-on-???
==10348== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10348-by-pythonnut-on-???
==10348== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10348-by-pythonnut-on-???
==10348==
==10348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10348== don't want to do, unless you know exactly what you're doing,
==10348== or are doing some strange experiment):
==10348== /usr/lib/valgrind/../../bin/vgdb --pid=10348 ...command...
==10348==
==10348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10348== /path/to/gdb ./zsh
==10348== and then give GDB the following command
==10348== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10348
==10348== --pid is optional if only one valgrind process is running
==10348==
client request: code 4d430005, addr 0xFFEFF263C, len 4
==10347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10347-by-pythonnut-on-???
==10347== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10347-by-pythonnut-on-???
==10347== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10347-by-pythonnut-on-???
==10347==
==10347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10347== don't want to do, unless you know exactly what you're doing,
==10347== or are doing some strange experiment):
==10347== /usr/lib/valgrind/../../bin/vgdb --pid=10347 ...command...
==10347==
==10347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10347== /path/to/gdb ./zsh
==10347== and then give GDB the following command
==10347== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10347
==10347== --pid is optional if only one valgrind process is running
==10347==
--10347-- Caught __NR_exit; running __libc_freeres()
==10349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10349-by-pythonnut-on-???
==10349== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10349-by-pythonnut-on-???
==10349== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10349-by-pythonnut-on-???
==10349==
==10349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10349== don't want to do, unless you know exactly what you're doing,
==10349== or are doing some strange experiment):
==10349== /usr/lib/valgrind/../../bin/vgdb --pid=10349 ...command...
==10349==
==10349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10349== /path/to/gdb ./zsh
==10349== and then give GDB the following command
==10349== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10349
==10349== --pid is optional if only one valgrind process is running
==10349==
--10347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10347==
==10347== HEAP SUMMARY:
==10347== in use at exit: 3,113,283 bytes in 68,945 blocks
==10347== total heap usage: 1,598,050 allocs, 1,529,105 frees, 129,163,612 bytes allocated
==10347==
--10350-- Caught __NR_exit; running __libc_freeres()
==10350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10350-by-pythonnut-on-???
==10350== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10350-by-pythonnut-on-???
==10350== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10350-by-pythonnut-on-???
==10350==
==10350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10350== don't want to do, unless you know exactly what you're doing,
==10350== or are doing some strange experiment):
==10350== /usr/lib/valgrind/../../bin/vgdb --pid=10350 ...command...
==10350==
==10350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10350== /path/to/gdb ./zsh
==10350== and then give GDB the following command
==10350== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10350
==10350== --pid is optional if only one valgrind process is running
==10350==
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==10347== Searching for pointers to 68,945 not-freed blocks
--10347-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10347-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10347-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10347-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10347-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10347-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10347-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10347-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10347-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10347-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10347-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10347-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10347-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10347-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10347-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10347-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10347-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10347-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10347-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10347-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10347-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10347-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10347-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10347-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10347-- Scanning root segment: 0x701a000..0x701afff (4096)
--10347-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10347-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10347-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10347-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10347-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10347-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10347-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10347-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10347-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10347-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10350==
==10350== HEAP SUMMARY:
==10350== in use at exit: 3,124,497 bytes in 69,171 blocks
==10350== total heap usage: 1,600,742 allocs, 1,531,571 frees, 129,368,399 bytes allocated
==10350==
==10350== Searching for pointers to 69,171 not-freed blocks
--10350-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10350-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10350-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10350-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10350-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10350-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10350-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10350-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10350-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10350-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10350-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10350-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10350-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10350-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10350-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10350-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10350-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10350-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10350-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10350-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10350-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10350-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10350-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10350-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10350-- Scanning root segment: 0x701a000..0x701afff (4096)
--10350-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10350-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10350-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10350-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10350-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10350-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10350-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10350-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10350-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10350-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10347== Checked 4,771,120 bytes
==10347==
==10347== LEAK SUMMARY:
==10347== definitely lost: 2,197 bytes in 13 blocks
==10347== indirectly lost: 6,756 bytes in 7 blocks
==10347== possibly lost: 0 bytes in 0 blocks
==10347== still reachable: 3,104,330 bytes in 68,925 blocks
==10347== suppressed: 0 bytes in 0 blocks
==10347== Rerun with --leak-check=full to see details of leaked memory
==10347==
==10347== Use --track-origins=yes to see where uninitialised values come from
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10347==
==10347== 1 errors in context 1 of 2:
==10347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10347== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10347== by 0x488CD0: stringsubst (subst.c:301)
==10347== by 0x48801B: prefork (subst.c:77)
==10347== by 0x42B318: execcmd (exec.c:2619)
==10347== by 0x428CA0: execpline2 (exec.c:1697)
==10347== by 0x427FD2: execpline (exec.c:1484)
==10347== by 0x427756: execlist (exec.c:1267)
==10347== by 0x42717C: execode (exec.c:1073)
==10347== by 0x431299: runshfunc (exec.c:5040)
==10347== by 0x430E76: doshfunc (exec.c:4920)
==10347== by 0x4302FB: execshfunc (exec.c:4557)
==10347== by 0x42D8C1: execcmd (exec.c:3373)
==10347==
==10347==
==10347== 2 errors in context 2 of 2:
==10347== Conditional jump or move depends on uninitialised value(s)
==10347== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10347== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10347== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10347== by 0x40EFC2: execbuiltin (builtin.c:450)
==10347== by 0x42D8E9: execcmd (exec.c:3378)
==10347== by 0x428CA0: execpline2 (exec.c:1697)
==10347== by 0x427FD2: execpline (exec.c:1484)
==10347== by 0x42779A: execlist (exec.c:1275)
==10347== by 0x42717C: execode (exec.c:1073)
==10347== by 0x431299: runshfunc (exec.c:5040)
==10347== by 0x430E76: doshfunc (exec.c:4920)
==10347== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10347==
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2AEC, len 4
==10350== Checked 4,785,808 bytes
==10350==
==10350== LEAK SUMMARY:
==10350== definitely lost: 2,205 bytes in 14 blocks
==10350== indirectly lost: 6,756 bytes in 7 blocks
==10350== possibly lost: 0 bytes in 0 blocks
==10350== still reachable: 3,115,536 bytes in 69,150 blocks
==10350== suppressed: 0 bytes in 0 blocks
==10350== Rerun with --leak-check=full to see details of leaked memory
==10350==
==10350== Use --track-origins=yes to see where uninitialised values come from
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10350==
==10350== 1 errors in context 1 of 2:
==10350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10350== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10350== by 0x488CD0: stringsubst (subst.c:301)
==10350== by 0x48801B: prefork (subst.c:77)
==10350== by 0x42B318: execcmd (exec.c:2619)
==10350== by 0x428CA0: execpline2 (exec.c:1697)
==10350== by 0x427FD2: execpline (exec.c:1484)
==10350== by 0x427756: execlist (exec.c:1267)
==10350== by 0x42717C: execode (exec.c:1073)
==10350== by 0x431299: runshfunc (exec.c:5040)
==10350== by 0x430E76: doshfunc (exec.c:4920)
==10350== by 0x4302FB: execshfunc (exec.c:4557)
==10350== by 0x42D8C1: execcmd (exec.c:3373)
==10350==
==10350==
==10350== 2 errors in context 2 of 2:
==10350== Conditional jump or move depends on uninitialised value(s)
==10350== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10350== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10350== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10350== by 0x40EFC2: execbuiltin (builtin.c:450)
==10350== by 0x42D8E9: execcmd (exec.c:3378)
==10350== by 0x428CA0: execpline2 (exec.c:1697)
==10350== by 0x427FD2: execpline (exec.c:1484)
==10350== by 0x42779A: execlist (exec.c:1275)
==10350== by 0x42717C: execode (exec.c:1073)
==10350== by 0x431299: runshfunc (exec.c:5040)
==10350== by 0x430E76: doshfunc (exec.c:4920)
==10350== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10350==
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10349-- Caught __NR_exit; running __libc_freeres()
--10349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10349==
==10349== HEAP SUMMARY:
==10349== in use at exit: 3,124,433 bytes in 69,168 blocks
==10349== total heap usage: 1,600,740 allocs, 1,531,572 frees, 129,368,158 bytes allocated
==10349==
--10352-- Caught __NR_exit; running __libc_freeres()
==10349== Searching for pointers to 69,168 not-freed blocks
--10349-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10349-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10349-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10349-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10349-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10349-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10349-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10349-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10349-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10349-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10349-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10349-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10349-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10349-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10349-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10349-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10349-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10349-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10349-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10349-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10349-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10349-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10349-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10349-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10349-- Scanning root segment: 0x701a000..0x701afff (4096)
--10349-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10349-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10349-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10349-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10349-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10349-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10349-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10349-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10349-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10349-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10352-by-pythonnut-on-???
==10352== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10352-by-pythonnut-on-???
==10352== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10352-by-pythonnut-on-???
==10352==
==10352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10352== don't want to do, unless you know exactly what you're doing,
==10352== or are doing some strange experiment):
==10352== /usr/lib/valgrind/../../bin/vgdb --pid=10352 ...command...
==10352==
==10352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10352== /path/to/gdb ./zsh
==10352== and then give GDB the following command
==10352== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10352
==10352== --pid is optional if only one valgrind process is running
==10352==
--10352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10352==
==10352== HEAP SUMMARY:
==10352== in use at exit: 3,113,674 bytes in 68,953 blocks
==10352== total heap usage: 1,598,066 allocs, 1,529,113 frees, 129,167,723 bytes allocated
==10352==
==10352== Searching for pointers to 68,953 not-freed blocks
--10352-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10352-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10352-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10352-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10352-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10352-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10352-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10352-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10352-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10352-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10352-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10352-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10352-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10352-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10352-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10352-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10352-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10352-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10352-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10352-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10352-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10352-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10352-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10352-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10352-- Scanning root segment: 0x701a000..0x701afff (4096)
--10352-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10352-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10352-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10352-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10352-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10352-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10352-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10352-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10352-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10352-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10349== Checked 4,785,120 bytes
==10349==
==10349== LEAK SUMMARY:
==10349== definitely lost: 2,205 bytes in 14 blocks
==10349== indirectly lost: 6,756 bytes in 7 blocks
==10349== possibly lost: 0 bytes in 0 blocks
==10349== still reachable: 3,115,472 bytes in 69,147 blocks
==10349== suppressed: 0 bytes in 0 blocks
==10349== Rerun with --leak-check=full to see details of leaked memory
==10349==
==10349== Use --track-origins=yes to see where uninitialised values come from
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10349==
==10349== 1 errors in context 1 of 2:
==10349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10349== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10349== by 0x488CD0: stringsubst (subst.c:301)
==10349== by 0x48801B: prefork (subst.c:77)
==10349== by 0x42B318: execcmd (exec.c:2619)
==10349== by 0x428CA0: execpline2 (exec.c:1697)
==10349== by 0x427FD2: execpline (exec.c:1484)
==10349== by 0x427756: execlist (exec.c:1267)
==10349== by 0x42717C: execode (exec.c:1073)
==10349== by 0x431299: runshfunc (exec.c:5040)
==10349== by 0x430E76: doshfunc (exec.c:4920)
==10349== by 0x4302FB: execshfunc (exec.c:4557)
==10349== by 0x42D8C1: execcmd (exec.c:3373)
==10349==
==10349==
==10349== 2 errors in context 2 of 2:
==10349== Conditional jump or move depends on uninitialised value(s)
==10349== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10349== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10349== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10349== by 0x40EFC2: execbuiltin (builtin.c:450)
==10349== by 0x42D8E9: execcmd (exec.c:3378)
==10349== by 0x428CA0: execpline2 (exec.c:1697)
==10349== by 0x427FD2: execpline (exec.c:1484)
==10349== by 0x42779A: execlist (exec.c:1275)
==10349== by 0x42717C: execode (exec.c:1073)
==10349== by 0x431299: runshfunc (exec.c:5040)
==10349== by 0x430E76: doshfunc (exec.c:4920)
==10349== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10349==
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Caught __NR_exit; running __libc_freeres()
==10352== Checked 4,771,224 bytes
==10352==
==10400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10400-by-pythonnut-on-???
==10400== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10400-by-pythonnut-on-???
==10400== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10400-by-pythonnut-on-???
==10400==
==10400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10400== don't want to do, unless you know exactly what you're doing,
==10400== or are doing some strange experiment):
==10400== /usr/lib/valgrind/../../bin/vgdb --pid=10400 ...command...
==10400==
==10400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10400== /path/to/gdb ./zsh
==10400== and then give GDB the following command
==10400== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10400
==10400== --pid is optional if only one valgrind process is running
==10400==
==10352== LEAK SUMMARY:
==10352== definitely lost: 2,197 bytes in 13 blocks
==10352== indirectly lost: 6,756 bytes in 7 blocks
==10352== possibly lost: 0 bytes in 0 blocks
==10352== still reachable: 3,104,721 bytes in 68,933 blocks
==10352== suppressed: 0 bytes in 0 blocks
==10352== Rerun with --leak-check=full to see details of leaked memory
==10352==
==10352== Use --track-origins=yes to see where uninitialised values come from
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10352==
==10352== 1 errors in context 1 of 2:
==10352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10352== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10352== by 0x488CD0: stringsubst (subst.c:301)
==10352== by 0x48801B: prefork (subst.c:77)
==10352== by 0x42B318: execcmd (exec.c:2619)
==10352== by 0x428CA0: execpline2 (exec.c:1697)
==10352== by 0x427FD2: execpline (exec.c:1484)
==10352== by 0x427756: execlist (exec.c:1267)
==10352== by 0x42717C: execode (exec.c:1073)
==10352== by 0x431299: runshfunc (exec.c:5040)
==10352== by 0x430E76: doshfunc (exec.c:4920)
==10352== by 0x4302FB: execshfunc (exec.c:4557)
==10352== by 0x42D8C1: execcmd (exec.c:3373)
==10352==
==10352==
==10352== 2 errors in context 2 of 2:
==10352== Conditional jump or move depends on uninitialised value(s)
==10352== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10352== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10352== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10352== by 0x40EFC2: execbuiltin (builtin.c:450)
==10352== by 0x42D8E9: execcmd (exec.c:3378)
==10352== by 0x428CA0: execpline2 (exec.c:1697)
==10352== by 0x427FD2: execpline (exec.c:1484)
==10352== by 0x42779A: execlist (exec.c:1275)
==10352== by 0x42717C: execode (exec.c:1073)
==10352== by 0x431299: runshfunc (exec.c:5040)
==10352== by 0x430E76: doshfunc (exec.c:4920)
==10352== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10352==
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10346-- Caught __NR_exit; running __libc_freeres()
==10400==
==10400== HEAP SUMMARY:
==10400== in use at exit: 3,124,440 bytes in 69,168 blocks
==10400== total heap usage: 1,600,755 allocs, 1,531,587 frees, 129,373,156 bytes allocated
==10400==
--10346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10400== Searching for pointers to 69,168 not-freed blocks
--10400-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10400-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10400-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10400-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10400-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10400-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10400-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10400-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10400-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10400-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10400-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10400-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10400-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10400-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10400-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10400-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10400-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10400-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10400-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
==10346==
--10400-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10400-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10400-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10400-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10400-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10400-- Scanning root segment: 0x701a000..0x701afff (4096)
--10400-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10400-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10400-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10400-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10400-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10400-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10400-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10400-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10400-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10400-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10346== HEAP SUMMARY:
==10346== in use at exit: 3,112,812 bytes in 68,934 blocks
==10346== total heap usage: 1,598,075 allocs, 1,529,141 frees, 129,169,726 bytes allocated
==10346==
==10346== Searching for pointers to 68,934 not-freed blocks
--10346-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10346-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10346-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10346-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10346-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10346-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10346-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10346-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10346-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10346-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10346-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10346-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10346-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10346-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10346-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10346-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10346-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10346-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10346-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10346-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10346-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10346-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10346-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10346-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10346-- Scanning root segment: 0x701a000..0x701afff (4096)
--10346-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10346-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10346-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10346-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10346-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10346-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10346-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10346-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10346-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10346-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10400== Checked 4,785,256 bytes
==10400==
==10400== LEAK SUMMARY:
==10400== definitely lost: 2,205 bytes in 14 blocks
==10400== indirectly lost: 6,756 bytes in 7 blocks
==10400== possibly lost: 0 bytes in 0 blocks
==10400== still reachable: 3,115,479 bytes in 69,147 blocks
==10400== suppressed: 0 bytes in 0 blocks
==10400== Rerun with --leak-check=full to see details of leaked memory
==10400==
==10400== Use --track-origins=yes to see where uninitialised values come from
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10400==
==10400== 1 errors in context 1 of 2:
==10400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10400== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10400== by 0x488CD0: stringsubst (subst.c:301)
==10400== by 0x48801B: prefork (subst.c:77)
==10400== by 0x42B318: execcmd (exec.c:2619)
==10400== by 0x428CA0: execpline2 (exec.c:1697)
==10400== by 0x427FD2: execpline (exec.c:1484)
==10400== by 0x427756: execlist (exec.c:1267)
==10400== by 0x42717C: execode (exec.c:1073)
==10400== by 0x431299: runshfunc (exec.c:5040)
==10400== by 0x430E76: doshfunc (exec.c:4920)
==10400== by 0x4302FB: execshfunc (exec.c:4557)
==10400== by 0x42D8C1: execcmd (exec.c:3373)
==10400==
==10400==
==10400== 2 errors in context 2 of 2:
==10400== Conditional jump or move depends on uninitialised value(s)
==10400== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10400== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10400== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10400== by 0x40EFC2: execbuiltin (builtin.c:450)
==10400== by 0x42D8E9: execcmd (exec.c:3378)
==10400== by 0x428CA0: execpline2 (exec.c:1697)
==10400== by 0x427FD2: execpline (exec.c:1484)
==10400== by 0x42779A: execlist (exec.c:1275)
==10400== by 0x42717C: execode (exec.c:1073)
==10400== by 0x431299: runshfunc (exec.c:5040)
==10400== by 0x430E76: doshfunc (exec.c:4920)
==10400== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10400==
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== Checked 4,768,608 bytes
==10346==
==10346== LEAK SUMMARY:
==10346== definitely lost: 2,197 bytes in 13 blocks
==10346== indirectly lost: 6,756 bytes in 7 blocks
==10346== possibly lost: 0 bytes in 0 blocks
==10346== still reachable: 3,103,859 bytes in 68,914 blocks
==10346== suppressed: 0 bytes in 0 blocks
==10346== Rerun with --leak-check=full to see details of leaked memory
==10346==
==10346== Use --track-origins=yes to see where uninitialised values come from
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346==
==10346== 1 errors in context 1 of 2:
==10346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10346== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10346== by 0x488CD0: stringsubst (subst.c:301)
==10346== by 0x48801B: prefork (subst.c:77)
==10346== by 0x42B318: execcmd (exec.c:2619)
==10346== by 0x428CA0: execpline2 (exec.c:1697)
==10346== by 0x427FD2: execpline (exec.c:1484)
==10346== by 0x427756: execlist (exec.c:1267)
==10346== by 0x42717C: execode (exec.c:1073)
==10346== by 0x431299: runshfunc (exec.c:5040)
==10346== by 0x430E76: doshfunc (exec.c:4920)
==10346== by 0x4302FB: execshfunc (exec.c:4557)
==10346== by 0x42D8C1: execcmd (exec.c:3373)
==10346==
==10346==
==10346== 2 errors in context 2 of 2:
==10346== Conditional jump or move depends on uninitialised value(s)
==10346== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10346== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10346== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10346== by 0x40EFC2: execbuiltin (builtin.c:450)
==10346== by 0x42D8E9: execcmd (exec.c:3378)
==10346== by 0x428CA0: execpline2 (exec.c:1697)
==10346== by 0x427FD2: execpline (exec.c:1484)
==10346== by 0x42779A: execlist (exec.c:1275)
==10346== by 0x42717C: execode (exec.c:1073)
==10346== by 0x431299: runshfunc (exec.c:5040)
==10346== by 0x430E76: doshfunc (exec.c:4920)
==10346== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10346==
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10403-- Caught __NR_exit; running __libc_freeres()
==10403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10403-by-pythonnut-on-???
==10403== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10403-by-pythonnut-on-???
==10403== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10403-by-pythonnut-on-???
==10403==
==10403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10403== don't want to do, unless you know exactly what you're doing,
==10403== or are doing some strange experiment):
==10403== /usr/lib/valgrind/../../bin/vgdb --pid=10403 ...command...
==10403==
==10403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10403== /path/to/gdb ./zsh
==10403== and then give GDB the following command
==10403== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10403
==10403== --pid is optional if only one valgrind process is running
==10403==
--10195-- Caught __NR_exit; running __libc_freeres()
--10403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10403==
==10403== HEAP SUMMARY:
==10403== in use at exit: 3,124,536 bytes in 69,168 blocks
==10403== total heap usage: 1,600,771 allocs, 1,531,603 frees, 129,377,943 bytes allocated
==10403==
--10195-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10195==
==10195== HEAP SUMMARY:
==10195== in use at exit: 3,112,015 bytes in 68,921 blocks
==10195== total heap usage: 1,598,109 allocs, 1,529,188 frees, 129,167,101 bytes allocated
==10195==
==10403== Searching for pointers to 69,168 not-freed blocks
--10403-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10403-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10403-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10403-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10403-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10403-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10403-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10403-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10403-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10403-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10403-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10403-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10403-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10403-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10403-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10403-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10403-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10403-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10403-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10403-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10403-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10403-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10403-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10403-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10403-- Scanning root segment: 0x701a000..0x701afff (4096)
--10403-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10403-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10403-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10403-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10403-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10403-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10403-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10403-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10403-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10403-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10195== Searching for pointers to 68,921 not-freed blocks
--10195-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10195-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10195-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10195-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10195-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10195-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10195-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10195-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10195-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10195-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10195-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10195-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10195-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10195-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10195-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10195-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10195-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10195-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10195-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10195-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10195-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10195-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10195-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10195-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10195-- Scanning root segment: 0x701a000..0x701afff (4096)
--10195-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10195-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10195-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10195-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10195-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10195-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10195-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10195-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10195-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10195-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10403== Checked 4,784,536 bytes
==10403==
==10403== LEAK SUMMARY:
==10403== definitely lost: 2,205 bytes in 14 blocks
==10403== indirectly lost: 6,756 bytes in 7 blocks
==10403== possibly lost: 0 bytes in 0 blocks
==10403== still reachable: 3,115,575 bytes in 69,147 blocks
==10403== suppressed: 0 bytes in 0 blocks
==10403== Rerun with --leak-check=full to see details of leaked memory
==10403==
==10403== Use --track-origins=yes to see where uninitialised values come from
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10403==
==10403== 1 errors in context 1 of 2:
==10403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10403== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10403== by 0x488CD0: stringsubst (subst.c:301)
==10403== by 0x48801B: prefork (subst.c:77)
==10403== by 0x42B318: execcmd (exec.c:2619)
==10403== by 0x428CA0: execpline2 (exec.c:1697)
==10403== by 0x427FD2: execpline (exec.c:1484)
==10403== by 0x427756: execlist (exec.c:1267)
==10403== by 0x42717C: execode (exec.c:1073)
==10403== by 0x431299: runshfunc (exec.c:5040)
==10403== by 0x430E76: doshfunc (exec.c:4920)
==10403== by 0x4302FB: execshfunc (exec.c:4557)
==10403== by 0x42D8C1: execcmd (exec.c:3373)
==10403==
==10403==
==10403== 2 errors in context 2 of 2:
==10403== Conditional jump or move depends on uninitialised value(s)
==10403== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10403== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10403== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10403== by 0x40EFC2: execbuiltin (builtin.c:450)
==10403== by 0x42D8E9: execcmd (exec.c:3378)
==10403== by 0x428CA0: execpline2 (exec.c:1697)
==10403== by 0x427FD2: execpline (exec.c:1484)
==10403== by 0x42779A: execlist (exec.c:1275)
==10403== by 0x42717C: execode (exec.c:1073)
==10403== by 0x431299: runshfunc (exec.c:5040)
==10403== by 0x430E76: doshfunc (exec.c:4920)
==10403== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10403==
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195== Checked 4,767,168 bytes
==10195==
==10195== LEAK SUMMARY:
==10195== definitely lost: 2,197 bytes in 13 blocks
==10195== indirectly lost: 6,756 bytes in 7 blocks
==10195== possibly lost: 0 bytes in 0 blocks
==10195== still reachable: 3,103,062 bytes in 68,901 blocks
==10195== suppressed: 0 bytes in 0 blocks
==10195== Rerun with --leak-check=full to see details of leaked memory
==10195==
==10195== Use --track-origins=yes to see where uninitialised values come from
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195==
==10195== 1 errors in context 1 of 2:
==10195== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10195== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10195== by 0x488CD0: stringsubst (subst.c:301)
==10195== by 0x48801B: prefork (subst.c:77)
==10195== by 0x42B318: execcmd (exec.c:2619)
==10195== by 0x428CA0: execpline2 (exec.c:1697)
==10195== by 0x427FD2: execpline (exec.c:1484)
==10195== by 0x427756: execlist (exec.c:1267)
==10195== by 0x42717C: execode (exec.c:1073)
==10195== by 0x431299: runshfunc (exec.c:5040)
==10195== by 0x430E76: doshfunc (exec.c:4920)
==10195== by 0x4302FB: execshfunc (exec.c:4557)
==10195== by 0x42D8C1: execcmd (exec.c:3373)
==10195==
==10195==
==10195== 2 errors in context 2 of 2:
==10195== Conditional jump or move depends on uninitialised value(s)
==10195== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10195== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10195== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10195== by 0x40EFC2: execbuiltin (builtin.c:450)
==10195== by 0x42D8E9: execcmd (exec.c:3378)
==10195== by 0x428CA0: execpline2 (exec.c:1697)
==10195== by 0x427FD2: execpline (exec.c:1484)
==10195== by 0x42779A: execlist (exec.c:1275)
==10195== by 0x42717C: execode (exec.c:1073)
==10195== by 0x431299: runshfunc (exec.c:5040)
==10195== by 0x430E76: doshfunc (exec.c:4920)
==10195== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10195==
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFEC7DC, len 4
==10405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10405-by-pythonnut-on-???
==10405== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10405-by-pythonnut-on-???
==10405== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10405-by-pythonnut-on-???
==10405==
==10405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10405== don't want to do, unless you know exactly what you're doing,
==10405== or are doing some strange experiment):
==10405== /usr/lib/valgrind/../../bin/vgdb --pid=10405 ...command...
==10405==
==10405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10405== /path/to/gdb ./zsh
==10405== and then give GDB the following command
==10405== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10405
==10405== --pid is optional if only one valgrind process is running
==10405==
--10405-- Caught __NR_exit; running __libc_freeres()
--10405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10405==
==10405== HEAP SUMMARY:
==10405== in use at exit: 3,124,814 bytes in 69,174 blocks
==10405== total heap usage: 1,601,296 allocs, 1,532,122 frees, 129,529,981 bytes allocated
==10405==
==10405== Searching for pointers to 69,174 not-freed blocks
--10405-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10405-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10405-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10405-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10405-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10405-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10405-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10405-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10405-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10405-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10405-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10405-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10405-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10405-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10405-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10405-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10405-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10405-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10405-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10405-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10405-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10405-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10405-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10405-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10405-- Scanning root segment: 0x701a000..0x701afff (4096)
--10405-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10405-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10405-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10405-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10405-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10405-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10405-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10405-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10405-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10405-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10405== Checked 4,784,728 bytes
==10405==
==10405== LEAK SUMMARY:
==10405== definitely lost: 2,205 bytes in 14 blocks
==10405== indirectly lost: 6,756 bytes in 7 blocks
==10405== possibly lost: 0 bytes in 0 blocks
==10405== still reachable: 3,115,853 bytes in 69,153 blocks
==10405== suppressed: 0 bytes in 0 blocks
==10405== Rerun with --leak-check=full to see details of leaked memory
==10405==
==10405== Use --track-origins=yes to see where uninitialised values come from
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10405==
==10405== 1 errors in context 1 of 2:
==10405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10405== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10405== by 0x488CD0: stringsubst (subst.c:301)
==10405== by 0x48801B: prefork (subst.c:77)
==10405== by 0x42B318: execcmd (exec.c:2619)
==10405== by 0x428CA0: execpline2 (exec.c:1697)
==10405== by 0x427FD2: execpline (exec.c:1484)
==10405== by 0x427756: execlist (exec.c:1267)
==10405== by 0x42717C: execode (exec.c:1073)
==10405== by 0x431299: runshfunc (exec.c:5040)
==10405== by 0x430E76: doshfunc (exec.c:4920)
==10405== by 0x4302FB: execshfunc (exec.c:4557)
==10405== by 0x42D8C1: execcmd (exec.c:3373)
==10405==
==10405==
==10405== 2 errors in context 2 of 2:
==10405== Conditional jump or move depends on uninitialised value(s)
==10405== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10405== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10405== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10405== by 0x40EFC2: execbuiltin (builtin.c:450)
==10405== by 0x42D8E9: execcmd (exec.c:3378)
==10405== by 0x428CA0: execpline2 (exec.c:1697)
==10405== by 0x427FD2: execpline (exec.c:1484)
==10405== by 0x42779A: execlist (exec.c:1275)
==10405== by 0x42717C: execode (exec.c:1073)
==10405== by 0x431299: runshfunc (exec.c:5040)
==10405== by 0x430E76: doshfunc (exec.c:4920)
==10405== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10405==
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10406-- Caught __NR_exit; running __libc_freeres()
==10406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10406-by-pythonnut-on-???
==10406== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10406-by-pythonnut-on-???
==10406== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10406-by-pythonnut-on-???
==10406==
==10406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10406== don't want to do, unless you know exactly what you're doing,
==10406== or are doing some strange experiment):
==10406== /usr/lib/valgrind/../../bin/vgdb --pid=10406 ...command...
==10406==
==10406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10406== /path/to/gdb ./zsh
==10406== and then give GDB the following command
==10406== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10406
==10406== --pid is optional if only one valgrind process is running
==10406==
--10406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10406==
==10406== HEAP SUMMARY:
==10406== in use at exit: 3,124,718 bytes in 69,174 blocks
==10406== total heap usage: 1,601,276 allocs, 1,532,102 frees, 129,527,751 bytes allocated
==10406==
==10406== Searching for pointers to 69,174 not-freed blocks
--10406-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10406-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10406-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10406-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10406-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10406-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10406-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10406-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10406-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10406-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10406-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10406-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10406-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10406-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10406-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10406-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10406-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10406-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10406-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10406-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10406-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10406-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10406-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10406-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10406-- Scanning root segment: 0x701a000..0x701afff (4096)
--10406-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10406-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10406-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10406-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10406-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10406-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10406-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10406-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10406-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10406-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10406== Checked 4,784,632 bytes
==10406==
==10406== LEAK SUMMARY:
==10406== definitely lost: 2,205 bytes in 14 blocks
==10406== indirectly lost: 6,756 bytes in 7 blocks
==10406== possibly lost: 0 bytes in 0 blocks
==10406== still reachable: 3,115,757 bytes in 69,153 blocks
==10406== suppressed: 0 bytes in 0 blocks
==10406== Rerun with --leak-check=full to see details of leaked memory
==10406==
==10406== Use --track-origins=yes to see where uninitialised values come from
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10406==
==10406== 1 errors in context 1 of 2:
==10406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10406== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10406== by 0x488CD0: stringsubst (subst.c:301)
==10406== by 0x48801B: prefork (subst.c:77)
==10406== by 0x42B318: execcmd (exec.c:2619)
==10406== by 0x428CA0: execpline2 (exec.c:1697)
==10406== by 0x427FD2: execpline (exec.c:1484)
==10406== by 0x427756: execlist (exec.c:1267)
==10406== by 0x42717C: execode (exec.c:1073)
==10406== by 0x431299: runshfunc (exec.c:5040)
==10406== by 0x430E76: doshfunc (exec.c:4920)
==10406== by 0x4302FB: execshfunc (exec.c:4557)
==10406== by 0x42D8C1: execcmd (exec.c:3373)
==10406==
==10406==
==10406== 2 errors in context 2 of 2:
==10406== Conditional jump or move depends on uninitialised value(s)
==10406== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10406== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10406== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10406== by 0x40EFC2: execbuiltin (builtin.c:450)
==10406== by 0x42D8E9: execcmd (exec.c:3378)
==10406== by 0x428CA0: execpline2 (exec.c:1697)
==10406== by 0x427FD2: execpline (exec.c:1484)
==10406== by 0x42779A: execlist (exec.c:1275)
==10406== by 0x42717C: execode (exec.c:1073)
==10406== by 0x431299: runshfunc (exec.c:5040)
==10406== by 0x430E76: doshfunc (exec.c:4920)
==10406== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10406==
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10407-by-pythonnut-on-???
==10407== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10407-by-pythonnut-on-???
==10407== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10407-by-pythonnut-on-???
==10407==
==10407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10407== don't want to do, unless you know exactly what you're doing,
==10407== or are doing some strange experiment):
==10407== /usr/lib/valgrind/../../bin/vgdb --pid=10407 ...command...
==10407==
==10407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10407== /path/to/gdb ./zsh
==10407== and then give GDB the following command
==10407== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10407
==10407== --pid is optional if only one valgrind process is running
==10407==
--10407-- Caught __NR_exit; running __libc_freeres()
--10407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10407==
==10407== HEAP SUMMARY:
==10407== in use at exit: 3,124,746 bytes in 69,175 blocks
==10407== total heap usage: 1,601,289 allocs, 1,532,114 frees, 129,530,438 bytes allocated
==10407==
==10407== Searching for pointers to 69,175 not-freed blocks
--10407-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10407-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10407-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10407-- Scanning root segment: 0x4037000..0x403afff (16384)
--10407-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10407-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10407-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10407-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10407-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10407-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10407-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10407-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10407-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10407-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10407-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10407-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10407-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10407-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10407-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10407-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10407-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10407-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10407-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10407-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10407-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10407-- Scanning root segment: 0x701a000..0x701afff (4096)
--10407-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10407-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10407-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10407-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10407-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10407-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10407-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10407-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10407-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10407-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10407== Checked 4,800,528 bytes
==10407==
==10407== LEAK SUMMARY:
==10407== definitely lost: 2,205 bytes in 14 blocks
==10407== indirectly lost: 6,756 bytes in 7 blocks
==10407== possibly lost: 0 bytes in 0 blocks
==10407== still reachable: 3,115,785 bytes in 69,154 blocks
==10407== suppressed: 0 bytes in 0 blocks
==10407== Rerun with --leak-check=full to see details of leaked memory
==10407==
==10407== Use --track-origins=yes to see where uninitialised values come from
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407==
==10407== 1 errors in context 1 of 2:
==10407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10407== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10407== by 0x488CD0: stringsubst (subst.c:301)
==10407== by 0x48801B: prefork (subst.c:77)
==10407== by 0x42B318: execcmd (exec.c:2619)
==10407== by 0x428CA0: execpline2 (exec.c:1697)
==10407== by 0x427FD2: execpline (exec.c:1484)
==10407== by 0x427756: execlist (exec.c:1267)
==10407== by 0x42717C: execode (exec.c:1073)
==10407== by 0x431299: runshfunc (exec.c:5040)
==10407== by 0x430E76: doshfunc (exec.c:4920)
==10407== by 0x4302FB: execshfunc (exec.c:4557)
==10407== by 0x42D8C1: execcmd (exec.c:3373)
==10407==
==10407==
==10407== 2 errors in context 2 of 2:
==10407== Conditional jump or move depends on uninitialised value(s)
==10407== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10407== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10407== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10407== by 0x40EFC2: execbuiltin (builtin.c:450)
==10407== by 0x42D8E9: execcmd (exec.c:3378)
==10407== by 0x428CA0: execpline2 (exec.c:1697)
==10407== by 0x427FD2: execpline (exec.c:1484)
==10407== by 0x42779A: execlist (exec.c:1275)
==10407== by 0x42717C: execode (exec.c:1073)
==10407== by 0x431299: runshfunc (exec.c:5040)
==10407== by 0x430E76: doshfunc (exec.c:4920)
==10407== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10407==
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10408-- Caught __NR_exit; running __libc_freeres()
==10408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10408-by-pythonnut-on-???
==10408== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10408-by-pythonnut-on-???
==10408== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10408-by-pythonnut-on-???
==10408==
==10408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10408== don't want to do, unless you know exactly what you're doing,
==10408== or are doing some strange experiment):
==10408== /usr/lib/valgrind/../../bin/vgdb --pid=10408 ...command...
==10408==
==10408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10408== /path/to/gdb ./zsh
==10408== and then give GDB the following command
==10408== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10408
==10408== --pid is optional if only one valgrind process is running
==10408==
--10408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10408==
==10408== HEAP SUMMARY:
==10408== in use at exit: 3,123,940 bytes in 69,176 blocks
==10408== total heap usage: 1,602,617 allocs, 1,533,441 frees, 129,603,071 bytes allocated
==10408==
==10408== Searching for pointers to 69,176 not-freed blocks
--10408-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10408-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10408-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10408-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10408-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10408-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10408-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10408-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10408-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10408-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10408-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10408-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10408-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10408-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10408-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10408-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10408-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10408-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10408-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10408-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10408-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10408-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10408-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10408-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10408-- Scanning root segment: 0x701a000..0x701afff (4096)
--10408-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10408-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10408-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10408-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10408-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10408-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10408-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10408-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10408-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10408-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10408== Checked 4,786,024 bytes
==10408==
==10408== LEAK SUMMARY:
==10408== definitely lost: 2,205 bytes in 14 blocks
==10408== indirectly lost: 6,756 bytes in 7 blocks
==10408== possibly lost: 0 bytes in 0 blocks
==10408== still reachable: 3,114,979 bytes in 69,155 blocks
==10408== suppressed: 0 bytes in 0 blocks
==10408== Rerun with --leak-check=full to see details of leaked memory
==10408==
==10408== Use --track-origins=yes to see where uninitialised values come from
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10408==
==10408== 1 errors in context 1 of 2:
==10408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10408== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10408== by 0x488CD0: stringsubst (subst.c:301)
==10408== by 0x48801B: prefork (subst.c:77)
==10408== by 0x42B318: execcmd (exec.c:2619)
==10408== by 0x428CA0: execpline2 (exec.c:1697)
==10408== by 0x427FD2: execpline (exec.c:1484)
==10408== by 0x427756: execlist (exec.c:1267)
==10408== by 0x42717C: execode (exec.c:1073)
==10408== by 0x431299: runshfunc (exec.c:5040)
==10408== by 0x430E76: doshfunc (exec.c:4920)
==10408== by 0x4302FB: execshfunc (exec.c:4557)
==10408== by 0x42D8C1: execcmd (exec.c:3373)
==10408==
==10408==
==10408== 2 errors in context 2 of 2:
==10408== Conditional jump or move depends on uninitialised value(s)
==10408== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10408== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10408== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10408== by 0x40EFC2: execbuiltin (builtin.c:450)
==10408== by 0x42D8E9: execcmd (exec.c:3378)
==10408== by 0x428CA0: execpline2 (exec.c:1697)
==10408== by 0x427FD2: execpline (exec.c:1484)
==10408== by 0x42779A: execlist (exec.c:1275)
==10408== by 0x42717C: execode (exec.c:1073)
==10408== by 0x431299: runshfunc (exec.c:5040)
==10408== by 0x430E76: doshfunc (exec.c:4920)
==10408== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10408==
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10411-by-pythonnut-on-???
==10411== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10411-by-pythonnut-on-???
==10411== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10411-by-pythonnut-on-???
==10411==
==10411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10411== don't want to do, unless you know exactly what you're doing,
==10411== or are doing some strange experiment):
==10411== /usr/lib/valgrind/../../bin/vgdb --pid=10411 ...command...
==10411==
==10411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10411== /path/to/gdb ./zsh
==10411== and then give GDB the following command
==10411== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10411
==10411== --pid is optional if only one valgrind process is running
==10411==
==10412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10412-by-pythonnut-on-???
==10412== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10412-by-pythonnut-on-???
==10412== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10412-by-pythonnut-on-???
==10412==
==10412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10412== don't want to do, unless you know exactly what you're doing,
==10412== or are doing some strange experiment):
==10412== /usr/lib/valgrind/../../bin/vgdb --pid=10412 ...command...
==10412==
==10412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10412== /path/to/gdb ./zsh
==10412== and then give GDB the following command
==10412== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10412
==10412== --pid is optional if only one valgrind process is running
==10412==
==10414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10414-by-pythonnut-on-???
==10414== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10414-by-pythonnut-on-???
==10414== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10414-by-pythonnut-on-???
==10414==
==10414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10414== don't want to do, unless you know exactly what you're doing,
==10414== or are doing some strange experiment):
==10414== /usr/lib/valgrind/../../bin/vgdb --pid=10414 ...command...
==10414==
==10414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10414== /path/to/gdb ./zsh
==10414== and then give GDB the following command
==10414== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10414
==10414== --pid is optional if only one valgrind process is running
==10414==
--10413-- Caught __NR_exit; running __libc_freeres()
==10416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10416-by-pythonnut-on-???
==10416== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10416-by-pythonnut-on-???
==10416== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10416-by-pythonnut-on-???
==10416==
==10416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10416== don't want to do, unless you know exactly what you're doing,
==10416== or are doing some strange experiment):
==10416== /usr/lib/valgrind/../../bin/vgdb --pid=10416 ...command...
==10416==
==10416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10416== /path/to/gdb ./zsh
==10416== and then give GDB the following command
==10416== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10416
==10416== --pid is optional if only one valgrind process is running
==10416==
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==10415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10415-by-pythonnut-on-???
==10415== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10415-by-pythonnut-on-???
==10415== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10415-by-pythonnut-on-???
==10415==
==10415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10415== don't want to do, unless you know exactly what you're doing,
==10415== or are doing some strange experiment):
==10415== /usr/lib/valgrind/../../bin/vgdb --pid=10415 ...command...
==10415==
==10415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10415== /path/to/gdb ./zsh
==10415== and then give GDB the following command
==10415== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10415
==10415== --pid is optional if only one valgrind process is running
==10415==
==10413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10413-by-pythonnut-on-???
==10413== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10413-by-pythonnut-on-???
==10413== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10413-by-pythonnut-on-???
==10413==
==10413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10413== don't want to do, unless you know exactly what you're doing,
==10413== or are doing some strange experiment):
==10413== /usr/lib/valgrind/../../bin/vgdb --pid=10413 ...command...
==10413==
==10413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10413== /path/to/gdb ./zsh
==10413== and then give GDB the following command
==10413== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10413
==10413== --pid is optional if only one valgrind process is running
==10413==
==10417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10417-by-pythonnut-on-???
==10417== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10417-by-pythonnut-on-???
==10417== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10417-by-pythonnut-on-???
==10417==
==10417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10417== don't want to do, unless you know exactly what you're doing,
==10417== or are doing some strange experiment):
==10417== /usr/lib/valgrind/../../bin/vgdb --pid=10417 ...command...
==10417==
==10417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10417== /path/to/gdb ./zsh
==10417== and then give GDB the following command
==10417== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10417
==10417== --pid is optional if only one valgrind process is running
==10417==
--10413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10413==
client request: code 4d430005, addr 0xFFEFE66FC, len 4
==10413== HEAP SUMMARY:
==10413== in use at exit: 3,112,137 bytes in 68,933 blocks
==10413== total heap usage: 1,602,939 allocs, 1,534,006 frees, 129,625,346 bytes allocated
==10413==
--10417-- Caught __NR_exit; running __libc_freeres()
==10413== Searching for pointers to 68,933 not-freed blocks
--10413-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10413-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10413-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10413-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10413-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10413-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10413-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10413-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10413-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10413-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10413-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10413-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10413-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10413-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10413-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10413-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10413-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10413-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10413-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10413-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10413-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10413-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10413-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10413-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10413-- Scanning root segment: 0x701a000..0x701afff (4096)
--10413-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10413-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10413-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10413-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10413-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10413-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10413-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10413-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10413-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10413-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10417==
==10417== HEAP SUMMARY:
==10417== in use at exit: 3,137,594 bytes in 69,547 blocks
==10417== total heap usage: 1,597,403 allocs, 1,527,856 frees, 129,042,259 bytes allocated
==10417==
==10417== Searching for pointers to 69,547 not-freed blocks
--10417-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10417-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10417-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10417-- Scanning root segment: 0x4037000..0x403efff (32768)
--10417-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10417-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10417-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10417-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10417-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10417-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10417-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10417-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10417-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10417-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10417-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10417-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10417-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10417-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10417-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10417-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10417-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10417-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10417-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10417-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10417-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10417-- Scanning root segment: 0x701a000..0x701afff (4096)
--10417-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10417-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10417-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10417-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10417-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10417-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10417-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10417-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10417-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10417-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10413== Checked 4,768,320 bytes
==10413==
==10413== LEAK SUMMARY:
==10413== definitely lost: 2,205 bytes in 14 blocks
==10413== indirectly lost: 6,756 bytes in 7 blocks
==10413== possibly lost: 0 bytes in 0 blocks
==10413== still reachable: 3,103,176 bytes in 68,912 blocks
==10413== suppressed: 0 bytes in 0 blocks
==10413== Rerun with --leak-check=full to see details of leaked memory
==10413==
==10413== Use --track-origins=yes to see where uninitialised values come from
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10413==
==10413== 1 errors in context 1 of 2:
==10413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10413== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10413== by 0x488CD0: stringsubst (subst.c:301)
==10413== by 0x48801B: prefork (subst.c:77)
==10413== by 0x42B318: execcmd (exec.c:2619)
==10413== by 0x428CA0: execpline2 (exec.c:1697)
==10413== by 0x427FD2: execpline (exec.c:1484)
==10413== by 0x427756: execlist (exec.c:1267)
==10413== by 0x42717C: execode (exec.c:1073)
==10413== by 0x431299: runshfunc (exec.c:5040)
==10413== by 0x430E76: doshfunc (exec.c:4920)
==10413== by 0x4302FB: execshfunc (exec.c:4557)
==10413== by 0x42D8C1: execcmd (exec.c:3373)
==10413==
==10413==
==10413== 2 errors in context 2 of 2:
==10413== Conditional jump or move depends on uninitialised value(s)
==10413== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10413== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10413== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10413== by 0x40EFC2: execbuiltin (builtin.c:450)
==10413== by 0x42D8E9: execcmd (exec.c:3378)
==10413== by 0x428CA0: execpline2 (exec.c:1697)
==10413== by 0x427FD2: execpline (exec.c:1484)
==10413== by 0x42779A: execlist (exec.c:1275)
==10413== by 0x42717C: execode (exec.c:1073)
==10413== by 0x431299: runshfunc (exec.c:5040)
==10413== by 0x430E76: doshfunc (exec.c:4920)
==10413== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10413==
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10411-- Caught __NR_exit; running __libc_freeres()
==10417== Checked 4,841,504 bytes
==10417==
--10411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10411==
==10411== HEAP SUMMARY:
==10411== in use at exit: 3,111,782 bytes in 68,923 blocks
==10411== total heap usage: 1,602,942 allocs, 1,534,019 frees, 129,625,986 bytes allocated
==10411==
==10417== LEAK SUMMARY:
==10417== definitely lost: 2,221 bytes in 14 blocks
==10417== indirectly lost: 6,796 bytes in 9 blocks
==10417== possibly lost: 0 bytes in 0 blocks
==10417== still reachable: 3,128,577 bytes in 69,524 blocks
==10417== suppressed: 0 bytes in 0 blocks
==10417== Rerun with --leak-check=full to see details of leaked memory
==10417==
==10417== Use --track-origins=yes to see where uninitialised values come from
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10417==
==10417== 1 errors in context 1 of 2:
==10417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10417== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10417== by 0x488CD0: stringsubst (subst.c:301)
==10417== by 0x48801B: prefork (subst.c:77)
==10417== by 0x42B318: execcmd (exec.c:2619)
==10417== by 0x428CA0: execpline2 (exec.c:1697)
==10417== by 0x427FD2: execpline (exec.c:1484)
==10417== by 0x427756: execlist (exec.c:1267)
==10417== by 0x42717C: execode (exec.c:1073)
==10417== by 0x431299: runshfunc (exec.c:5040)
==10417== by 0x430E76: doshfunc (exec.c:4920)
==10417== by 0x4302FB: execshfunc (exec.c:4557)
==10417== by 0x42D8C1: execcmd (exec.c:3373)
==10417==
==10417==
==10417== 2 errors in context 2 of 2:
==10417== Conditional jump or move depends on uninitialised value(s)
==10417== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10417== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10417== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10417== by 0x40EFC2: execbuiltin (builtin.c:450)
==10417== by 0x42D8E9: execcmd (exec.c:3378)
==10417== by 0x428CA0: execpline2 (exec.c:1697)
==10417== by 0x427FD2: execpline (exec.c:1484)
==10417== by 0x42779A: execlist (exec.c:1275)
==10417== by 0x42717C: execode (exec.c:1073)
==10417== by 0x431299: runshfunc (exec.c:5040)
==10417== by 0x430E76: doshfunc (exec.c:4920)
==10417== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10417==
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== Searching for pointers to 68,923 not-freed blocks
--10411-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10411-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10411-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10411-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10411-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10411-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10411-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10411-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10411-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10411-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10411-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10411-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10411-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10411-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10411-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10411-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10411-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10411-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10411-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10411-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10411-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10411-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10411-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10411-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10411-- Scanning root segment: 0x701a000..0x701afff (4096)
--10411-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10411-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10411-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10411-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10411-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10411-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10411-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10411-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10411-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10411-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFE6BAC, len 4
==10411== Checked 4,766,008 bytes
==10411==
==10411== LEAK SUMMARY:
==10411== definitely lost: 2,205 bytes in 14 blocks
==10411== indirectly lost: 6,756 bytes in 7 blocks
==10411== possibly lost: 0 bytes in 0 blocks
==10411== still reachable: 3,102,821 bytes in 68,902 blocks
==10411== suppressed: 0 bytes in 0 blocks
==10411== Rerun with --leak-check=full to see details of leaked memory
==10411==
==10411== Use --track-origins=yes to see where uninitialised values come from
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411==
==10411== 1 errors in context 1 of 2:
==10411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10411== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10411== by 0x488CD0: stringsubst (subst.c:301)
==10411== by 0x48801B: prefork (subst.c:77)
==10411== by 0x42B318: execcmd (exec.c:2619)
==10411== by 0x428CA0: execpline2 (exec.c:1697)
==10411== by 0x427FD2: execpline (exec.c:1484)
==10411== by 0x427756: execlist (exec.c:1267)
==10411== by 0x42717C: execode (exec.c:1073)
==10411== by 0x431299: runshfunc (exec.c:5040)
==10411== by 0x430E76: doshfunc (exec.c:4920)
==10411== by 0x4302FB: execshfunc (exec.c:4557)
==10411== by 0x42D8C1: execcmd (exec.c:3373)
==10411==
==10411==
==10411== 2 errors in context 2 of 2:
==10411== Conditional jump or move depends on uninitialised value(s)
==10411== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10411== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10411== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10411== by 0x40EFC2: execbuiltin (builtin.c:450)
==10411== by 0x42D8E9: execcmd (exec.c:3378)
==10411== by 0x428CA0: execpline2 (exec.c:1697)
==10411== by 0x427FD2: execpline (exec.c:1484)
==10411== by 0x42779A: execlist (exec.c:1275)
==10411== by 0x42717C: execode (exec.c:1073)
==10411== by 0x431299: runshfunc (exec.c:5040)
==10411== by 0x430E76: doshfunc (exec.c:4920)
==10411== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10411==
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10419-- Caught __NR_exit; running __libc_freeres()
==10419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10419-by-pythonnut-on-???
==10419== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10419-by-pythonnut-on-???
==10419== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10419-by-pythonnut-on-???
==10419==
==10419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10419== don't want to do, unless you know exactly what you're doing,
==10419== or are doing some strange experiment):
==10419== /usr/lib/valgrind/../../bin/vgdb --pid=10419 ...command...
==10419==
==10419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10419== /path/to/gdb ./zsh
==10419== and then give GDB the following command
==10419== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10419
==10419== --pid is optional if only one valgrind process is running
==10419==
--10419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10419==
==10419== HEAP SUMMARY:
==10419== in use at exit: 3,137,839 bytes in 69,552 blocks
==10419== total heap usage: 1,597,415 allocs, 1,527,863 frees, 129,046,160 bytes allocated
==10419==
--10468-- Caught __NR_exit; running __libc_freeres()
==10469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10469-by-pythonnut-on-???
==10469== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10469-by-pythonnut-on-???
==10469== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10469-by-pythonnut-on-???
==10469==
==10469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10469== don't want to do, unless you know exactly what you're doing,
==10469== or are doing some strange experiment):
==10469== /usr/lib/valgrind/../../bin/vgdb --pid=10469 ...command...
==10469==
==10469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10469== /path/to/gdb ./zsh
==10469== and then give GDB the following command
==10469== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10469
==10469== --pid is optional if only one valgrind process is running
==10469==
==10468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10468-by-pythonnut-on-???
==10468== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10468-by-pythonnut-on-???
==10468== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10468-by-pythonnut-on-???
==10468==
==10468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10468== don't want to do, unless you know exactly what you're doing,
==10468== or are doing some strange experiment):
==10468== /usr/lib/valgrind/../../bin/vgdb --pid=10468 ...command...
==10468==
==10468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10468== /path/to/gdb ./zsh
==10468== and then give GDB the following command
==10468== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10468
==10468== --pid is optional if only one valgrind process is running
==10468==
client request: code 4d430005, addr 0xFFEFF268C, len 4
==10470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10470-by-pythonnut-on-???
==10470== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10470-by-pythonnut-on-???
==10470== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10470-by-pythonnut-on-???
==10470==
==10470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10470== don't want to do, unless you know exactly what you're doing,
==10470== or are doing some strange experiment):
==10470== /usr/lib/valgrind/../../bin/vgdb --pid=10470 ...command...
==10470==
==10470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10470== /path/to/gdb ./zsh
==10470== and then give GDB the following command
==10470== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10470
==10470== --pid is optional if only one valgrind process is running
==10470==
==10419== Searching for pointers to 69,552 not-freed blocks
--10419-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10419-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10419-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10419-- Scanning root segment: 0x4037000..0x403efff (32768)
--10419-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10419-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10419-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10419-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10419-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10419-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10419-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10419-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10419-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10419-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10419-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10419-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10419-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10419-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10419-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10419-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10419-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10419-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10419-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10419-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10419-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10419-- Scanning root segment: 0x701a000..0x701afff (4096)
--10419-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10419-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10419-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10419-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10419-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10419-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10419-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10419-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10419-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10419-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005, addr 0xFFEFF25EC, len 4
==10468==
==10467== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10467-by-pythonnut-on-???
==10467== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10467-by-pythonnut-on-???
==10467== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10467-by-pythonnut-on-???
==10467==
==10467== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10467== don't want to do, unless you know exactly what you're doing,
==10467== or are doing some strange experiment):
==10467== /usr/lib/valgrind/../../bin/vgdb --pid=10467 ...command...
==10467==
==10467== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10467== /path/to/gdb ./zsh
==10467== and then give GDB the following command
==10467== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10467
==10467== --pid is optional if only one valgrind process is running
==10467==
==10468== HEAP SUMMARY:
==10468== in use at exit: 3,112,224 bytes in 68,934 blocks
==10468== total heap usage: 1,602,972 allocs, 1,534,038 frees, 129,638,470 bytes allocated
==10468==
==10468== Searching for pointers to 68,934 not-freed blocks
--10468-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10468-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10468-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10468-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10468-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10468-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10468-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10468-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10468-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10468-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10468-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10468-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10468-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10468-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10468-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10468-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10468-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10468-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10468-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10468-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10468-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10468-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10468-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10468-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10468-- Scanning root segment: 0x701a000..0x701afff (4096)
--10468-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10468-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10468-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10468-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10468-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10468-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10468-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10468-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10468-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10468-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10419== Checked 4,841,472 bytes
==10419==
==10419== LEAK SUMMARY:
==10419== definitely lost: 2,221 bytes in 14 blocks
==10419== indirectly lost: 6,796 bytes in 9 blocks
==10419== possibly lost: 0 bytes in 0 blocks
==10419== still reachable: 3,128,822 bytes in 69,529 blocks
==10419== suppressed: 0 bytes in 0 blocks
==10419== Rerun with --leak-check=full to see details of leaked memory
==10419==
==10419== Use --track-origins=yes to see where uninitialised values come from
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10419==
==10419== 1 errors in context 1 of 2:
==10419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10419== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10419== by 0x488CD0: stringsubst (subst.c:301)
==10419== by 0x48801B: prefork (subst.c:77)
==10419== by 0x42B318: execcmd (exec.c:2619)
==10419== by 0x428CA0: execpline2 (exec.c:1697)
==10419== by 0x427FD2: execpline (exec.c:1484)
==10419== by 0x427756: execlist (exec.c:1267)
==10419== by 0x42717C: execode (exec.c:1073)
==10419== by 0x431299: runshfunc (exec.c:5040)
==10419== by 0x430E76: doshfunc (exec.c:4920)
==10419== by 0x4302FB: execshfunc (exec.c:4557)
==10419== by 0x42D8C1: execcmd (exec.c:3373)
==10419==
==10419==
==10419== 2 errors in context 2 of 2:
==10419== Conditional jump or move depends on uninitialised value(s)
==10419== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10419== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10419== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10419== by 0x40EFC2: execbuiltin (builtin.c:450)
==10419== by 0x42D8E9: execcmd (exec.c:3378)
==10419== by 0x428CA0: execpline2 (exec.c:1697)
==10419== by 0x427FD2: execpline (exec.c:1484)
==10419== by 0x42779A: execlist (exec.c:1275)
==10419== by 0x42717C: execode (exec.c:1073)
==10419== by 0x431299: runshfunc (exec.c:5040)
==10419== by 0x430E76: doshfunc (exec.c:4920)
==10419== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10419==
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10416-- Caught __NR_exit; running __libc_freeres()
==10468== Checked 4,770,376 bytes
==10468==
--10416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10468== LEAK SUMMARY:
==10468== definitely lost: 2,205 bytes in 14 blocks
==10468== indirectly lost: 6,756 bytes in 7 blocks
==10468== possibly lost: 0 bytes in 0 blocks
==10468== still reachable: 3,103,263 bytes in 68,913 blocks
==10468== suppressed: 0 bytes in 0 blocks
==10468== Rerun with --leak-check=full to see details of leaked memory
==10468==
==10468== Use --track-origins=yes to see where uninitialised values come from
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10468==
==10468== 1 errors in context 1 of 2:
==10468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10468== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10468== by 0x488CD0: stringsubst (subst.c:301)
==10468== by 0x48801B: prefork (subst.c:77)
==10468== by 0x42B318: execcmd (exec.c:2619)
==10468== by 0x428CA0: execpline2 (exec.c:1697)
==10468== by 0x427FD2: execpline (exec.c:1484)
==10468== by 0x427756: execlist (exec.c:1267)
==10468== by 0x42717C: execode (exec.c:1073)
==10468== by 0x431299: runshfunc (exec.c:5040)
==10468== by 0x430E76: doshfunc (exec.c:4920)
==10468== by 0x4302FB: execshfunc (exec.c:4557)
==10468== by 0x42D8C1: execcmd (exec.c:3373)
==10468==
==10468==
==10468== 2 errors in context 2 of 2:
==10468== Conditional jump or move depends on uninitialised value(s)
==10468== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10468== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10468== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10468== by 0x40EFC2: execbuiltin (builtin.c:450)
==10468== by 0x42D8E9: execcmd (exec.c:3378)
==10468== by 0x428CA0: execpline2 (exec.c:1697)
==10468== by 0x427FD2: execpline (exec.c:1484)
==10468== by 0x42779A: execlist (exec.c:1275)
==10468== by 0x42717C: execode (exec.c:1073)
==10468== by 0x431299: runshfunc (exec.c:5040)
==10468== by 0x430E76: doshfunc (exec.c:4920)
==10468== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10468==
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416==
==10416== HEAP SUMMARY:
==10416== in use at exit: 3,135,675 bytes in 69,477 blocks
==10416== total heap usage: 1,597,366 allocs, 1,527,889 frees, 129,046,771 bytes allocated
==10416==
--10467-- Caught __NR_exit; running __libc_freeres()
--10467-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10467==
==10416== Searching for pointers to 69,477 not-freed blocks
--10416-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10416-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10467== HEAP SUMMARY:
==10467== in use at exit: 3,112,192 bytes in 68,934 blocks
==10467== total heap usage: 1,602,976 allocs, 1,534,042 frees, 129,638,006 bytes allocated
==10467==
--10416-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10416-- Scanning root segment: 0x4037000..0x403afff (16384)
--10416-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10416-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10416-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10416-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10416-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10416-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10416-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10416-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10416-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10416-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10416-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10416-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10416-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10416-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10416-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10416-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10416-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10416-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10416-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10416-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10416-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10416-- Scanning root segment: 0x701a000..0x701afff (4096)
--10416-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10416-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10416-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10416-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10416-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10416-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10416-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10416-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10416-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10416-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10467== Searching for pointers to 68,934 not-freed blocks
--10467-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10467-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10467-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10467-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10467-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10467-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10467-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10467-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10467-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10467-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10467-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10467-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10467-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10467-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10467-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10467-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10467-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10467-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10467-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10467-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10467-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10467-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10467-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10467-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10467-- Scanning root segment: 0x701a000..0x701afff (4096)
--10467-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10467-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10467-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10467-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10467-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10467-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10467-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10467-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10467-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10467-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10416== Checked 4,821,400 bytes
==10416==
==10416== LEAK SUMMARY:
==10416== definitely lost: 2,221 bytes in 14 blocks
==10416== indirectly lost: 6,796 bytes in 9 blocks
==10416== possibly lost: 0 bytes in 0 blocks
==10416== still reachable: 3,126,658 bytes in 69,454 blocks
==10416== suppressed: 0 bytes in 0 blocks
==10416== Rerun with --leak-check=full to see details of leaked memory
==10416==
==10416== Use --track-origins=yes to see where uninitialised values come from
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416==
==10416== 1 errors in context 1 of 2:
==10416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10416== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10416== by 0x488CD0: stringsubst (subst.c:301)
==10416== by 0x48801B: prefork (subst.c:77)
==10416== by 0x42B318: execcmd (exec.c:2619)
==10416== by 0x428CA0: execpline2 (exec.c:1697)
==10416== by 0x427FD2: execpline (exec.c:1484)
==10416== by 0x427756: execlist (exec.c:1267)
==10416== by 0x42717C: execode (exec.c:1073)
==10416== by 0x431299: runshfunc (exec.c:5040)
==10416== by 0x430E76: doshfunc (exec.c:4920)
==10416== by 0x4302FB: execshfunc (exec.c:4557)
==10416== by 0x42D8C1: execcmd (exec.c:3373)
==10416==
==10416==
==10416== 2 errors in context 2 of 2:
==10416== Conditional jump or move depends on uninitialised value(s)
==10416== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10416== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10416== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10416== by 0x40EFC2: execbuiltin (builtin.c:450)
==10416== by 0x42D8E9: execcmd (exec.c:3378)
==10416== by 0x428CA0: execpline2 (exec.c:1697)
==10416== by 0x427FD2: execpline (exec.c:1484)
==10416== by 0x42779A: execlist (exec.c:1275)
==10416== by 0x42717C: execode (exec.c:1073)
==10416== by 0x431299: runshfunc (exec.c:5040)
==10416== by 0x430E76: doshfunc (exec.c:4920)
==10416== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10416==
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467== Checked 4,770,064 bytes
==10467==
==10472== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10472-by-pythonnut-on-???
==10472== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10472-by-pythonnut-on-???
==10472== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10472-by-pythonnut-on-???
==10472==
==10472== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10472== don't want to do, unless you know exactly what you're doing,
==10472== or are doing some strange experiment):
==10472== /usr/lib/valgrind/../../bin/vgdb --pid=10472 ...command...
==10472==
==10472== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10472== /path/to/gdb ./zsh
==10472== and then give GDB the following command
==10472== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10472
==10472== --pid is optional if only one valgrind process is running
==10472==
--10472-- Caught __NR_exit; running __libc_freeres()
==10473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10473-by-pythonnut-on-???
==10473== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10473-by-pythonnut-on-???
==10473== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10473-by-pythonnut-on-???
==10473==
==10473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10473== don't want to do, unless you know exactly what you're doing,
==10473== or are doing some strange experiment):
==10473== /usr/lib/valgrind/../../bin/vgdb --pid=10473 ...command...
==10473==
==10473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10473== /path/to/gdb ./zsh
==10473== and then give GDB the following command
==10473== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10473
==10473== --pid is optional if only one valgrind process is running
==10473==
==10467== LEAK SUMMARY:
==10467== definitely lost: 2,205 bytes in 14 blocks
==10467== indirectly lost: 6,756 bytes in 7 blocks
==10467== possibly lost: 0 bytes in 0 blocks
==10467== still reachable: 3,103,231 bytes in 68,913 blocks
==10467== suppressed: 0 bytes in 0 blocks
==10467== Rerun with --leak-check=full to see details of leaked memory
==10467==
==10467== Use --track-origins=yes to see where uninitialised values come from
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467==
==10467== 1 errors in context 1 of 2:
==10467== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10467== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10467== by 0x488CD0: stringsubst (subst.c:301)
==10467== by 0x48801B: prefork (subst.c:77)
==10467== by 0x42B318: execcmd (exec.c:2619)
==10467== by 0x428CA0: execpline2 (exec.c:1697)
==10467== by 0x427FD2: execpline (exec.c:1484)
==10467== by 0x427756: execlist (exec.c:1267)
==10467== by 0x42717C: execode (exec.c:1073)
==10467== by 0x431299: runshfunc (exec.c:5040)
==10467== by 0x430E76: doshfunc (exec.c:4920)
==10467== by 0x4302FB: execshfunc (exec.c:4557)
==10467== by 0x42D8C1: execcmd (exec.c:3373)
==10467==
==10467==
==10467== 2 errors in context 2 of 2:
==10467== Conditional jump or move depends on uninitialised value(s)
==10467== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10467== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10467== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10467== by 0x40EFC2: execbuiltin (builtin.c:450)
==10467== by 0x42D8E9: execcmd (exec.c:3378)
==10467== by 0x428CA0: execpline2 (exec.c:1697)
==10467== by 0x427FD2: execpline (exec.c:1484)
==10467== by 0x42779A: execlist (exec.c:1275)
==10467== by 0x42717C: execode (exec.c:1073)
==10467== by 0x431299: runshfunc (exec.c:5040)
==10467== by 0x430E76: doshfunc (exec.c:4920)
==10467== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10467==
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
--10472-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10472==
==10472== HEAP SUMMARY:
==10472== in use at exit: 3,137,448 bytes in 69,539 blocks
==10472== total heap usage: 1,597,435 allocs, 1,527,896 frees, 129,055,534 bytes allocated
==10472==
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--10474-- Caught __NR_exit; running __libc_freeres()
==10472== Searching for pointers to 69,539 not-freed blocks
==10474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10474-by-pythonnut-on-???
==10474== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10474-by-pythonnut-on-???
--10472-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10474== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10474-by-pythonnut-on-???
==10474==
==10474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10474== don't want to do, unless you know exactly what you're doing,
==10474== or are doing some strange experiment):
==10474== /usr/lib/valgrind/../../bin/vgdb --pid=10474 ...command...
==10474==
==10474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10474== /path/to/gdb ./zsh
==10474== and then give GDB the following command
==10474== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10474
==10474== --pid is optional if only one valgrind process is running
==10474==
--10472-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10472-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10472-- Scanning root segment: 0x4037000..0x403efff (32768)
--10472-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10472-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10472-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10472-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10472-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10472-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10472-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10472-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10472-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10472-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10472-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10472-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10472-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10472-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10472-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10472-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10472-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10472-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10472-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10472-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10472-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10472-- Scanning root segment: 0x701a000..0x701afff (4096)
--10472-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10472-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10472-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10472-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10472-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10472-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10472-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10472-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10472-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10472-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10474==
==10474== HEAP SUMMARY:
==10474== in use at exit: 3,112,423 bytes in 68,939 blocks
==10474== total heap usage: 1,602,987 allocs, 1,534,048 frees, 129,643,094 bytes allocated
==10474==
==10474== Searching for pointers to 68,939 not-freed blocks
--10474-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10474-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10474-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10474-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10474-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10474-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10474-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10474-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10474-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10474-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10474-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10474-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10474-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10474-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10474-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10474-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10474-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10474-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10474-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10474-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10474-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10474-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10474-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10474-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10474-- Scanning root segment: 0x701a000..0x701afff (4096)
--10474-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10474-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10474-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10474-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10474-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10474-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10474-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10474-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10474-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10474-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10472== Checked 4,840,040 bytes
==10472==
==10472== LEAK SUMMARY:
==10472== definitely lost: 2,221 bytes in 14 blocks
==10472== indirectly lost: 6,796 bytes in 9 blocks
==10472== possibly lost: 0 bytes in 0 blocks
==10472== still reachable: 3,128,431 bytes in 69,516 blocks
==10472== suppressed: 0 bytes in 0 blocks
==10472== Rerun with --leak-check=full to see details of leaked memory
==10472==
==10472== Use --track-origins=yes to see where uninitialised values come from
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10472==
==10472== 1 errors in context 1 of 2:
==10472== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10472== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10472== by 0x488CD0: stringsubst (subst.c:301)
==10472== by 0x48801B: prefork (subst.c:77)
==10472== by 0x42B318: execcmd (exec.c:2619)
==10472== by 0x428CA0: execpline2 (exec.c:1697)
==10472== by 0x427FD2: execpline (exec.c:1484)
==10472== by 0x427756: execlist (exec.c:1267)
==10472== by 0x42717C: execode (exec.c:1073)
==10472== by 0x431299: runshfunc (exec.c:5040)
==10472== by 0x430E76: doshfunc (exec.c:4920)
==10472== by 0x4302FB: execshfunc (exec.c:4557)
==10472== by 0x42D8C1: execcmd (exec.c:3373)
==10472==
==10472==
==10472== 2 errors in context 2 of 2:
==10472== Conditional jump or move depends on uninitialised value(s)
==10472== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10472== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10472== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10472== by 0x40EFC2: execbuiltin (builtin.c:450)
==10472== by 0x42D8E9: execcmd (exec.c:3378)
==10472== by 0x428CA0: execpline2 (exec.c:1697)
==10472== by 0x427FD2: execpline (exec.c:1484)
==10472== by 0x42779A: execlist (exec.c:1275)
==10472== by 0x42717C: execode (exec.c:1073)
==10472== by 0x431299: runshfunc (exec.c:5040)
==10472== by 0x430E76: doshfunc (exec.c:4920)
==10472== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10472==
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10471-by-pythonnut-on-???
==10471== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10471-by-pythonnut-on-???
==10471== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10471-by-pythonnut-on-???
==10471==
==10471== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10471== don't want to do, unless you know exactly what you're doing,
==10471== or are doing some strange experiment):
==10471== /usr/lib/valgrind/../../bin/vgdb --pid=10471 ...command...
==10471==
==10471== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10471== /path/to/gdb ./zsh
==10471== and then give GDB the following command
==10471== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10471
==10471== --pid is optional if only one valgrind process is running
==10471==
--10471-- Caught __NR_exit; running __libc_freeres()
==10474== Checked 4,770,016 bytes
==10474==
--10471-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10471==
==10471== HEAP SUMMARY:
==10471== in use at exit: 3,137,384 bytes in 69,536 blocks
==10471== total heap usage: 1,597,437 allocs, 1,527,901 frees, 129,056,078 bytes allocated
==10471==
==10474== LEAK SUMMARY:
==10474== definitely lost: 2,205 bytes in 14 blocks
==10474== indirectly lost: 6,756 bytes in 7 blocks
==10474== possibly lost: 0 bytes in 0 blocks
==10474== still reachable: 3,103,462 bytes in 68,918 blocks
==10474== suppressed: 0 bytes in 0 blocks
==10474== Rerun with --leak-check=full to see details of leaked memory
==10474==
==10474== Use --track-origins=yes to see where uninitialised values come from
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10474==
==10474== 1 errors in context 1 of 2:
==10474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10474== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10474== by 0x488CD0: stringsubst (subst.c:301)
==10474== by 0x48801B: prefork (subst.c:77)
==10474== by 0x42B318: execcmd (exec.c:2619)
==10474== by 0x428CA0: execpline2 (exec.c:1697)
==10474== by 0x427FD2: execpline (exec.c:1484)
==10474== by 0x427756: execlist (exec.c:1267)
==10474== by 0x42717C: execode (exec.c:1073)
==10474== by 0x431299: runshfunc (exec.c:5040)
==10474== by 0x430E76: doshfunc (exec.c:4920)
==10474== by 0x4302FB: execshfunc (exec.c:4557)
==10474== by 0x42D8C1: execcmd (exec.c:3373)
==10474==
==10474==
==10474== 2 errors in context 2 of 2:
==10474== Conditional jump or move depends on uninitialised value(s)
==10474== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10474== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10474== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10474== by 0x40EFC2: execbuiltin (builtin.c:450)
==10474== by 0x42D8E9: execcmd (exec.c:3378)
==10474== by 0x428CA0: execpline2 (exec.c:1697)
==10474== by 0x427FD2: execpline (exec.c:1484)
==10474== by 0x42779A: execlist (exec.c:1275)
==10474== by 0x42717C: execode (exec.c:1073)
==10474== by 0x431299: runshfunc (exec.c:5040)
==10474== by 0x430E76: doshfunc (exec.c:4920)
==10474== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10474==
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== Searching for pointers to 69,536 not-freed blocks
--10471-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10471-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10471-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10471-- Scanning root segment: 0x4037000..0x403efff (32768)
--10471-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10471-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10471-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10471-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10471-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10471-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10471-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10471-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10471-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10471-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10471-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10471-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10471-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10471-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10471-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10471-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10471-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10471-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10471-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10471-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10471-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10471-- Scanning root segment: 0x701a000..0x701afff (4096)
--10471-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10471-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10471-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10471-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10471-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10471-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10471-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10471-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10471-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10471-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF272C, len 4
==10479== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10479-by-pythonnut-on-???
==10479== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10479-by-pythonnut-on-???
==10479== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10479-by-pythonnut-on-???
==10479==
==10479== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10479== don't want to do, unless you know exactly what you're doing,
==10479== or are doing some strange experiment):
==10479== /usr/lib/valgrind/../../bin/vgdb --pid=10479 ...command...
==10479==
==10479== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10479== /path/to/gdb ./zsh
==10479== and then give GDB the following command
==10479== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10479
==10479== --pid is optional if only one valgrind process is running
==10479==
--10478-- Caught __NR_exit; running __libc_freeres()
==10478== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10478-by-pythonnut-on-???
==10478== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10478-by-pythonnut-on-???
==10478== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10478-by-pythonnut-on-???
==10478==
==10478== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10478== don't want to do, unless you know exactly what you're doing,
==10478== or are doing some strange experiment):
==10478== /usr/lib/valgrind/../../bin/vgdb --pid=10478 ...command...
==10478==
==10478== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10478== /path/to/gdb ./zsh
==10478== and then give GDB the following command
==10478== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10478
==10478== --pid is optional if only one valgrind process is running
==10478==
--10478-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10478==
==10478== HEAP SUMMARY:
==10478== in use at exit: 3,112,530 bytes in 68,943 blocks
==10478== total heap usage: 1,602,995 allocs, 1,534,052 frees, 129,645,313 bytes allocated
==10478==
==10478== Searching for pointers to 68,943 not-freed blocks
--10478-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10478-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10478-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10478-- Scanning root segment: 0x4037000..0x403afff (16384)
--10478-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10478-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10478-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10478-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10478-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10478-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10478-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10478-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10478-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10478-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10478-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10478-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10478-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10478-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10478-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10478-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10478-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10478-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10478-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10478-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10478-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10478-- Scanning root segment: 0x701a000..0x701afff (4096)
--10478-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10478-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10478-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10478-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10478-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10478-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10478-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10478-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10478-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10478-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10471== Checked 4,839,352 bytes
==10471==
==10471== LEAK SUMMARY:
==10471== definitely lost: 2,221 bytes in 14 blocks
==10471== indirectly lost: 6,796 bytes in 9 blocks
==10471== possibly lost: 0 bytes in 0 blocks
==10471== still reachable: 3,128,367 bytes in 69,513 blocks
==10471== suppressed: 0 bytes in 0 blocks
==10471== Rerun with --leak-check=full to see details of leaked memory
==10471==
==10471== Use --track-origins=yes to see where uninitialised values come from
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471==
==10471== 1 errors in context 1 of 2:
==10471== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10471== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10471== by 0x488CD0: stringsubst (subst.c:301)
==10471== by 0x48801B: prefork (subst.c:77)
==10471== by 0x42B318: execcmd (exec.c:2619)
==10471== by 0x428CA0: execpline2 (exec.c:1697)
==10471== by 0x427FD2: execpline (exec.c:1484)
==10471== by 0x427756: execlist (exec.c:1267)
==10471== by 0x42717C: execode (exec.c:1073)
==10471== by 0x431299: runshfunc (exec.c:5040)
==10471== by 0x430E76: doshfunc (exec.c:4920)
==10471== by 0x4302FB: execshfunc (exec.c:4557)
==10471== by 0x42D8C1: execcmd (exec.c:3373)
==10471==
==10471==
==10471== 2 errors in context 2 of 2:
==10471== Conditional jump or move depends on uninitialised value(s)
==10471== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10471== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10471== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10471== by 0x40EFC2: execbuiltin (builtin.c:450)
==10471== by 0x42D8E9: execcmd (exec.c:3378)
==10471== by 0x428CA0: execpline2 (exec.c:1697)
==10471== by 0x427FD2: execpline (exec.c:1484)
==10471== by 0x42779A: execlist (exec.c:1275)
==10471== by 0x42717C: execode (exec.c:1073)
==10471== by 0x431299: runshfunc (exec.c:5040)
==10471== by 0x430E76: doshfunc (exec.c:4920)
==10471== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10471==
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10480-by-pythonnut-on-???
==10480== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10480-by-pythonnut-on-???
==10480== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10480-by-pythonnut-on-???
==10480==
==10480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10480== don't want to do, unless you know exactly what you're doing,
==10480== or are doing some strange experiment):
==10480== /usr/lib/valgrind/../../bin/vgdb --pid=10480 ...command...
==10480==
==10480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10480== /path/to/gdb ./zsh
==10480== and then give GDB the following command
==10480== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10480
==10480== --pid is optional if only one valgrind process is running
==10480==
--10480-- Caught __NR_exit; running __libc_freeres()
--10480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10480==
==10480== HEAP SUMMARY:
==10480== in use at exit: 3,137,388 bytes in 69,536 blocks
==10480== total heap usage: 1,597,454 allocs, 1,527,918 frees, 129,061,098 bytes allocated
==10480==
==10478== Checked 4,786,768 bytes
==10478==
==10480== Searching for pointers to 69,536 not-freed blocks
--10480-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10480-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10480-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10480-- Scanning root segment: 0x4037000..0x403efff (32768)
--10480-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10480-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10480-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10480-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10480-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10480-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10480-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10480-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10480-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10480-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10480-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10480-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10480-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10480-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10480-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10480-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10480-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10480-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10480-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10480-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10480-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10480-- Scanning root segment: 0x701a000..0x701afff (4096)
--10480-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10480-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10480-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10480-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10480-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10480-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10480-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10480-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10480-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10480-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10478== LEAK SUMMARY:
==10478== definitely lost: 2,205 bytes in 14 blocks
==10478== indirectly lost: 6,756 bytes in 7 blocks
==10478== possibly lost: 0 bytes in 0 blocks
==10478== still reachable: 3,103,569 bytes in 68,922 blocks
==10478== suppressed: 0 bytes in 0 blocks
==10478== Rerun with --leak-check=full to see details of leaked memory
==10478==
==10478== Use --track-origins=yes to see where uninitialised values come from
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10478==
==10478== 1 errors in context 1 of 2:
==10478== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10478== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10478== by 0x488CD0: stringsubst (subst.c:301)
==10478== by 0x48801B: prefork (subst.c:77)
==10478== by 0x42B318: execcmd (exec.c:2619)
==10478== by 0x428CA0: execpline2 (exec.c:1697)
==10478== by 0x427FD2: execpline (exec.c:1484)
==10478== by 0x427756: execlist (exec.c:1267)
==10478== by 0x42717C: execode (exec.c:1073)
==10478== by 0x431299: runshfunc (exec.c:5040)
==10478== by 0x430E76: doshfunc (exec.c:4920)
==10478== by 0x4302FB: execshfunc (exec.c:4557)
==10478== by 0x42D8C1: execcmd (exec.c:3373)
==10478==
==10478==
==10478== 2 errors in context 2 of 2:
==10478== Conditional jump or move depends on uninitialised value(s)
==10478== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10478== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10478== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10478== by 0x40EFC2: execbuiltin (builtin.c:450)
==10478== by 0x42D8E9: execcmd (exec.c:3378)
==10478== by 0x428CA0: execpline2 (exec.c:1697)
==10478== by 0x427FD2: execpline (exec.c:1484)
==10478== by 0x42779A: execlist (exec.c:1275)
==10478== by 0x42717C: execode (exec.c:1073)
==10478== by 0x431299: runshfunc (exec.c:5040)
==10478== by 0x430E76: doshfunc (exec.c:4920)
==10478== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10478==
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
==10480== Checked 4,839,360 bytes
==10480==
--10483-- Caught __NR_exit; running __libc_freeres()
==10483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10483-by-pythonnut-on-???
==10483== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10483-by-pythonnut-on-???
==10483== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10483-by-pythonnut-on-???
==10483==
==10483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10483== don't want to do, unless you know exactly what you're doing,
==10483== or are doing some strange experiment):
==10483== /usr/lib/valgrind/../../bin/vgdb --pid=10483 ...command...
==10483==
==10483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10483== /path/to/gdb ./zsh
==10483== and then give GDB the following command
==10483== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10483
==10483== --pid is optional if only one valgrind process is running
==10483==
==10480== LEAK SUMMARY:
==10480== definitely lost: 2,221 bytes in 14 blocks
==10480== indirectly lost: 6,796 bytes in 9 blocks
==10480== possibly lost: 0 bytes in 0 blocks
==10480== still reachable: 3,128,371 bytes in 69,513 blocks
==10480== suppressed: 0 bytes in 0 blocks
==10480== Rerun with --leak-check=full to see details of leaked memory
==10480==
==10480== Use --track-origins=yes to see where uninitialised values come from
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480==
==10480== 1 errors in context 1 of 2:
==10480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10480== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10480== by 0x488CD0: stringsubst (subst.c:301)
==10480== by 0x48801B: prefork (subst.c:77)
==10480== by 0x42B318: execcmd (exec.c:2619)
==10480== by 0x428CA0: execpline2 (exec.c:1697)
==10480== by 0x427FD2: execpline (exec.c:1484)
==10480== by 0x427756: execlist (exec.c:1267)
==10480== by 0x42717C: execode (exec.c:1073)
==10480== by 0x431299: runshfunc (exec.c:5040)
==10480== by 0x430E76: doshfunc (exec.c:4920)
==10480== by 0x4302FB: execshfunc (exec.c:4557)
==10480== by 0x42D8C1: execcmd (exec.c:3373)
==10480==
==10480==
==10480== 2 errors in context 2 of 2:
==10480== Conditional jump or move depends on uninitialised value(s)
==10480== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10480== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10480== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10480== by 0x40EFC2: execbuiltin (builtin.c:450)
==10480== by 0x42D8E9: execcmd (exec.c:3378)
==10480== by 0x428CA0: execpline2 (exec.c:1697)
==10480== by 0x427FD2: execpline (exec.c:1484)
==10480== by 0x42779A: execlist (exec.c:1275)
==10480== by 0x42717C: execode (exec.c:1073)
==10480== by 0x431299: runshfunc (exec.c:5040)
==10480== by 0x430E76: doshfunc (exec.c:4920)
==10480== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10480==
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10484-by-pythonnut-on-???
==10484== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10484-by-pythonnut-on-???
==10484== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10484-by-pythonnut-on-???
==10484==
==10484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10484== don't want to do, unless you know exactly what you're doing,
==10484== or are doing some strange experiment):
==10484== /usr/lib/valgrind/../../bin/vgdb --pid=10484 ...command...
==10484==
==10484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10484== /path/to/gdb ./zsh
==10484== and then give GDB the following command
==10484== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10484
==10484== --pid is optional if only one valgrind process is running
==10484==
--10484-- Caught __NR_exit; running __libc_freeres()
==10483==
==10483== HEAP SUMMARY:
==10483== in use at exit: 3,111,864 bytes in 68,928 blocks
==10483== total heap usage: 1,603,045 allocs, 1,534,117 frees, 129,651,728 bytes allocated
==10483==
--10484-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10483== Searching for pointers to 68,928 not-freed blocks
--10483-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10483-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10483-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10483-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10483-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10483-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10483-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10483-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10483-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10483-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10483-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10483-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10483-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10483-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10483-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10483-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10483-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10483-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10483-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10483-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10483-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10483-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10483-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10483-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10483-- Scanning root segment: 0x701a000..0x701afff (4096)
--10483-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10483-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10483-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10483-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10483-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10483-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10483-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10483-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10483-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10483-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10484==
==10484== HEAP SUMMARY:
==10484== in use at exit: 3,137,387 bytes in 69,536 blocks
==10484== total heap usage: 1,597,459 allocs, 1,527,923 frees, 129,063,211 bytes allocated
==10484==
==10484== Searching for pointers to 69,536 not-freed blocks
--10484-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10484-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10484-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10484-- Scanning root segment: 0x4037000..0x403efff (32768)
--10484-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10484-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10484-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10484-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10484-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10484-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10484-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10484-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10484-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10484-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10484-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10484-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10484-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10484-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10484-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10484-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10484-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10484-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10484-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10484-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10484-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10484-- Scanning root segment: 0x701a000..0x701afff (4096)
--10484-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10484-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10484-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10484-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10484-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10484-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10484-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10484-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10484-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10484-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10483== Checked 4,786,960 bytes
==10483==
==10483== LEAK SUMMARY:
==10483== definitely lost: 2,205 bytes in 14 blocks
==10483== indirectly lost: 6,756 bytes in 7 blocks
==10483== possibly lost: 0 bytes in 0 blocks
==10483== still reachable: 3,102,903 bytes in 68,907 blocks
==10483== suppressed: 0 bytes in 0 blocks
==10483== Rerun with --leak-check=full to see details of leaked memory
==10483==
==10483== Use --track-origins=yes to see where uninitialised values come from
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10483==
==10483== 1 errors in context 1 of 2:
==10483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10483== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10483== by 0x488CD0: stringsubst (subst.c:301)
==10483== by 0x48801B: prefork (subst.c:77)
==10483== by 0x42B318: execcmd (exec.c:2619)
==10483== by 0x428CA0: execpline2 (exec.c:1697)
==10483== by 0x427FD2: execpline (exec.c:1484)
==10483== by 0x427756: execlist (exec.c:1267)
==10483== by 0x42717C: execode (exec.c:1073)
==10483== by 0x431299: runshfunc (exec.c:5040)
==10483== by 0x430E76: doshfunc (exec.c:4920)
==10483== by 0x4302FB: execshfunc (exec.c:4557)
==10483== by 0x42D8C1: execcmd (exec.c:3373)
==10483==
==10483==
==10483== 2 errors in context 2 of 2:
==10483== Conditional jump or move depends on uninitialised value(s)
==10483== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10483== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10483== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10483== by 0x40EFC2: execbuiltin (builtin.c:450)
==10483== by 0x42D8E9: execcmd (exec.c:3378)
==10483== by 0x428CA0: execpline2 (exec.c:1697)
==10483== by 0x427FD2: execpline (exec.c:1484)
==10483== by 0x42779A: execlist (exec.c:1275)
==10483== by 0x42717C: execode (exec.c:1073)
==10483== by 0x431299: runshfunc (exec.c:5040)
==10483== by 0x430E76: doshfunc (exec.c:4920)
==10483== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10483==
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484== Checked 4,839,360 bytes
==10484==
client request: code 4d430005, addr 0xFFEFF617C, len 4
==10484== LEAK SUMMARY:
==10484== definitely lost: 2,221 bytes in 14 blocks
==10484== indirectly lost: 6,796 bytes in 9 blocks
==10484== possibly lost: 0 bytes in 0 blocks
==10484== still reachable: 3,128,370 bytes in 69,513 blocks
==10484== suppressed: 0 bytes in 0 blocks
==10484== Rerun with --leak-check=full to see details of leaked memory
==10484==
==10484== Use --track-origins=yes to see where uninitialised values come from
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484==
==10484== 1 errors in context 1 of 2:
==10484== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10484== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10484== by 0x488CD0: stringsubst (subst.c:301)
==10484== by 0x48801B: prefork (subst.c:77)
==10484== by 0x42B318: execcmd (exec.c:2619)
==10484== by 0x428CA0: execpline2 (exec.c:1697)
==10484== by 0x427FD2: execpline (exec.c:1484)
==10484== by 0x427756: execlist (exec.c:1267)
==10484== by 0x42717C: execode (exec.c:1073)
==10484== by 0x431299: runshfunc (exec.c:5040)
==10484== by 0x430E76: doshfunc (exec.c:4920)
==10484== by 0x4302FB: execshfunc (exec.c:4557)
==10484== by 0x42D8C1: execcmd (exec.c:3373)
==10484==
==10484==
==10484== 2 errors in context 2 of 2:
==10484== Conditional jump or move depends on uninitialised value(s)
==10484== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10484== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10484== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10484== by 0x40EFC2: execbuiltin (builtin.c:450)
==10484== by 0x42D8E9: execcmd (exec.c:3378)
==10484== by 0x428CA0: execpline2 (exec.c:1697)
==10484== by 0x427FD2: execpline (exec.c:1484)
==10484== by 0x42779A: execlist (exec.c:1275)
==10484== by 0x42717C: execode (exec.c:1073)
==10484== by 0x431299: runshfunc (exec.c:5040)
==10484== by 0x430E76: doshfunc (exec.c:4920)
==10484== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10484==
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10486-by-pythonnut-on-???
==10486== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10486-by-pythonnut-on-???
==10486== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10486-by-pythonnut-on-???
==10486==
==10486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10486== don't want to do, unless you know exactly what you're doing,
==10486== or are doing some strange experiment):
==10486== /usr/lib/valgrind/../../bin/vgdb --pid=10486 ...command...
==10486==
==10486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10486== /path/to/gdb ./zsh
==10486== and then give GDB the following command
==10486== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10486
==10486== --pid is optional if only one valgrind process is running
==10486==
--10486-- Caught __NR_exit; running __libc_freeres()
==10487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10487-by-pythonnut-on-???
==10487== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10487-by-pythonnut-on-???
==10487== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10487-by-pythonnut-on-???
==10487==
==10487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10487== don't want to do, unless you know exactly what you're doing,
==10487== or are doing some strange experiment):
==10487== /usr/lib/valgrind/../../bin/vgdb --pid=10487 ...command...
==10487==
==10487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10487== /path/to/gdb ./zsh
==10487== and then give GDB the following command
==10487== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10487
==10487== --pid is optional if only one valgrind process is running
==10487==
--10486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10486==
==10489== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10489-by-pythonnut-on-???
==10489== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10489-by-pythonnut-on-???
==10489== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10489-by-pythonnut-on-???
==10489==
==10489== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10489== don't want to do, unless you know exactly what you're doing,
==10489== or are doing some strange experiment):
==10489== /usr/lib/valgrind/../../bin/vgdb --pid=10489 ...command...
==10489==
==10489== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10489== /path/to/gdb ./zsh
==10489== and then give GDB the following command
==10489== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10489
==10489== --pid is optional if only one valgrind process is running
==10489==
==10486== HEAP SUMMARY:
==10486== in use at exit: 3,137,386 bytes in 69,536 blocks
==10486== total heap usage: 1,597,464 allocs, 1,527,928 frees, 129,065,324 bytes allocated
==10486==
==10490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10490-by-pythonnut-on-???
==10490== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10490-by-pythonnut-on-???
==10490== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10490-by-pythonnut-on-???
==10490==
==10490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10490== don't want to do, unless you know exactly what you're doing,
==10490== or are doing some strange experiment):
==10490== /usr/lib/valgrind/../../bin/vgdb --pid=10490 ...command...
==10490==
==10490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10490== /path/to/gdb ./zsh
==10490== and then give GDB the following command
==10490== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10490
==10490== --pid is optional if only one valgrind process is running
==10490==
--10491-- Caught __NR_exit; running __libc_freeres()
==10486== Searching for pointers to 69,536 not-freed blocks
--10486-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10486-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10486-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10486-- Scanning root segment: 0x4037000..0x403efff (32768)
--10486-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10486-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10486-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10486-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10486-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10486-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10486-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10486-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10486-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10486-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10486-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10486-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10486-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10486-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10486-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10486-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10486-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10491== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10491-by-pythonnut-on-???
--10486-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
==10491== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10491-by-pythonnut-on-???
==10491== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10491-by-pythonnut-on-???
==10491==
==10491== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10491== don't want to do, unless you know exactly what you're doing,
==10491== or are doing some strange experiment):
==10491== /usr/lib/valgrind/../../bin/vgdb --pid=10491 ...command...
==10491==
==10491== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10491== /path/to/gdb ./zsh
==10491== and then give GDB the following command
==10491== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10491
--10486-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10491== --pid is optional if only one valgrind process is running
==10491==
--10486-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10486-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10486-- Scanning root segment: 0x701a000..0x701afff (4096)
--10486-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10486-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10486-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10486-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10486-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10486-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10486-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10486-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10486-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10486-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF493C, len 4
client request: code 4d430005, addr 0xFFEFF028C, len 4
--10491-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10493-- Caught __NR_exit; running __libc_freeres()
==10491==
==10491== HEAP SUMMARY:
==10491== in use at exit: 3,113,243 bytes in 68,982 blocks
==10491== total heap usage: 1,603,281 allocs, 1,534,299 frees, 129,674,131 bytes allocated
==10491==
==10493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10493-by-pythonnut-on-???
==10493== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10493-by-pythonnut-on-???
==10493== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10493-by-pythonnut-on-???
==10493==
==10493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10493== don't want to do, unless you know exactly what you're doing,
==10493== or are doing some strange experiment):
==10493== /usr/lib/valgrind/../../bin/vgdb --pid=10493 ...command...
==10493==
==10493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10493== /path/to/gdb ./zsh
==10493== and then give GDB the following command
==10493== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10493
==10493== --pid is optional if only one valgrind process is running
==10493==
--10493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10491== Searching for pointers to 68,982 not-freed blocks
--10491-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10491-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10491-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10491-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10491-- Scanning root segment: 0x4222000..0x4222fff (4096)
==10493==
--10491-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10491-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10491-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10491-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10491-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10491-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10491-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10491-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10491-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10491-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10491-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10491-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10491-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10491-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10491-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10491-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10491-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10491-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10491-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10491-- Scanning root segment: 0x701a000..0x701afff (4096)
--10491-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10491-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10491-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10491-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10491-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10491-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10491-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10491-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10491-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10491-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10493== HEAP SUMMARY:
==10493== in use at exit: 3,114,432 bytes in 68,971 blocks
==10493== total heap usage: 1,603,267 allocs, 1,534,296 frees, 129,785,031 bytes allocated
==10493==
==10493== Searching for pointers to 68,971 not-freed blocks
--10493-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10493-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10493-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10493-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10493-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10493-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10493-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10493-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10493-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10493-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10493-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10493-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10493-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10493-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10493-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10493-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10493-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10493-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10493-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10493-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10493-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10493-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10493-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10493-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10493-- Scanning root segment: 0x701a000..0x701afff (4096)
--10493-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10493-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10493-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10493-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10493-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10493-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10493-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10493-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10493-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10493-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10486== Checked 4,839,360 bytes
==10486==
==10486== LEAK SUMMARY:
==10486== definitely lost: 2,221 bytes in 14 blocks
==10486== indirectly lost: 6,796 bytes in 9 blocks
==10486== possibly lost: 0 bytes in 0 blocks
==10486== still reachable: 3,128,369 bytes in 69,513 blocks
==10486== suppressed: 0 bytes in 0 blocks
==10486== Rerun with --leak-check=full to see details of leaked memory
==10486==
==10486== Use --track-origins=yes to see where uninitialised values come from
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486==
==10486== 1 errors in context 1 of 2:
==10486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10486== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10486== by 0x488CD0: stringsubst (subst.c:301)
==10486== by 0x48801B: prefork (subst.c:77)
==10486== by 0x42B318: execcmd (exec.c:2619)
==10486== by 0x428CA0: execpline2 (exec.c:1697)
==10486== by 0x427FD2: execpline (exec.c:1484)
==10486== by 0x427756: execlist (exec.c:1267)
==10486== by 0x42717C: execode (exec.c:1073)
==10486== by 0x431299: runshfunc (exec.c:5040)
==10486== by 0x430E76: doshfunc (exec.c:4920)
==10486== by 0x4302FB: execshfunc (exec.c:4557)
==10486== by 0x42D8C1: execcmd (exec.c:3373)
==10486==
==10486==
==10486== 2 errors in context 2 of 2:
==10486== Conditional jump or move depends on uninitialised value(s)
==10486== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10486== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10486== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10486== by 0x40EFC2: execbuiltin (builtin.c:450)
==10486== by 0x42D8E9: execcmd (exec.c:3378)
==10486== by 0x428CA0: execpline2 (exec.c:1697)
==10486== by 0x427FD2: execpline (exec.c:1484)
==10486== by 0x42779A: execlist (exec.c:1275)
==10486== by 0x42717C: execode (exec.c:1073)
==10486== by 0x431299: runshfunc (exec.c:5040)
==10486== by 0x430E76: doshfunc (exec.c:4920)
==10486== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10486==
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10495-by-pythonnut-on-???
==10495== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10495-by-pythonnut-on-???
==10495== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10495-by-pythonnut-on-???
==10495==
==10495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10495== don't want to do, unless you know exactly what you're doing,
==10495== or are doing some strange experiment):
==10495== /usr/lib/valgrind/../../bin/vgdb --pid=10495 ...command...
==10495==
==10495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10495== /path/to/gdb ./zsh
==10495== and then give GDB the following command
==10495== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10495
==10495== --pid is optional if only one valgrind process is running
==10495==
--10495-- Caught __NR_exit; running __libc_freeres()
==10491== Checked 4,789,608 bytes
==10491==
==10491== LEAK SUMMARY:
==10491== definitely lost: 2,205 bytes in 14 blocks
==10491== indirectly lost: 6,756 bytes in 7 blocks
==10491== possibly lost: 0 bytes in 0 blocks
==10491== still reachable: 3,104,282 bytes in 68,961 blocks
==10491== suppressed: 0 bytes in 0 blocks
==10491== Rerun with --leak-check=full to see details of leaked memory
==10491==
==10491== Use --track-origins=yes to see where uninitialised values come from
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10491==
==10491== 1 errors in context 1 of 2:
==10491== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10491== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10491== by 0x488CD0: stringsubst (subst.c:301)
==10491== by 0x48801B: prefork (subst.c:77)
==10491== by 0x42B318: execcmd (exec.c:2619)
==10491== by 0x428CA0: execpline2 (exec.c:1697)
==10491== by 0x427FD2: execpline (exec.c:1484)
==10491== by 0x427756: execlist (exec.c:1267)
==10491== by 0x42717C: execode (exec.c:1073)
==10491== by 0x431299: runshfunc (exec.c:5040)
==10491== by 0x430E76: doshfunc (exec.c:4920)
==10491== by 0x4302FB: execshfunc (exec.c:4557)
==10491== by 0x42D8C1: execcmd (exec.c:3373)
==10491==
==10491==
==10491== 2 errors in context 2 of 2:
==10491== Conditional jump or move depends on uninitialised value(s)
==10491== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10491== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10491== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10491== by 0x40EFC2: execbuiltin (builtin.c:450)
==10491== by 0x42D8E9: execcmd (exec.c:3378)
==10491== by 0x428CA0: execpline2 (exec.c:1697)
==10491== by 0x427FD2: execpline (exec.c:1484)
==10491== by 0x42779A: execlist (exec.c:1275)
==10491== by 0x42717C: execode (exec.c:1073)
==10491== by 0x431299: runshfunc (exec.c:5040)
==10491== by 0x430E76: doshfunc (exec.c:4920)
==10491== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10491==
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10488-- Caught __NR_exit; running __libc_freeres()
==10495==
==10493== Checked 4,775,464 bytes
==10493==
==10495== HEAP SUMMARY:
==10495== in use at exit: 3,137,385 bytes in 69,536 blocks
==10495== total heap usage: 1,597,469 allocs, 1,527,933 frees, 129,067,437 bytes allocated
==10495==
==10488== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10488-by-pythonnut-on-???
==10488== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10488-by-pythonnut-on-???
==10488== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10488-by-pythonnut-on-???
==10488==
==10488== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10488== don't want to do, unless you know exactly what you're doing,
==10488== or are doing some strange experiment):
==10488== /usr/lib/valgrind/../../bin/vgdb --pid=10488 ...command...
==10488==
==10488== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10488== /path/to/gdb ./zsh
==10488== and then give GDB the following command
==10488== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10488
==10488== --pid is optional if only one valgrind process is running
==10488==
--10488-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10493== LEAK SUMMARY:
==10493== definitely lost: 2,205 bytes in 14 blocks
==10493== indirectly lost: 6,756 bytes in 7 blocks
==10493== possibly lost: 0 bytes in 0 blocks
==10493== still reachable: 3,105,471 bytes in 68,950 blocks
==10493== suppressed: 0 bytes in 0 blocks
==10493== Rerun with --leak-check=full to see details of leaked memory
==10493==
==10493== Use --track-origins=yes to see where uninitialised values come from
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10493==
==10493== 1 errors in context 1 of 2:
==10493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10493== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10493== by 0x488CD0: stringsubst (subst.c:301)
==10493== by 0x48801B: prefork (subst.c:77)
==10493== by 0x42B318: execcmd (exec.c:2619)
==10493== by 0x428CA0: execpline2 (exec.c:1697)
==10493== by 0x427FD2: execpline (exec.c:1484)
==10493== by 0x427756: execlist (exec.c:1267)
==10493== by 0x42717C: execode (exec.c:1073)
==10493== by 0x431299: runshfunc (exec.c:5040)
==10493== by 0x430E76: doshfunc (exec.c:4920)
==10493== by 0x4302FB: execshfunc (exec.c:4557)
==10493== by 0x42D8C1: execcmd (exec.c:3373)
==10493==
==10493==
==10493== 2 errors in context 2 of 2:
==10493== Conditional jump or move depends on uninitialised value(s)
==10493== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10493== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10493== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10493== by 0x40EFC2: execbuiltin (builtin.c:450)
==10493== by 0x42D8E9: execcmd (exec.c:3378)
==10493== by 0x428CA0: execpline2 (exec.c:1697)
==10493== by 0x427FD2: execpline (exec.c:1484)
==10493== by 0x42779A: execlist (exec.c:1275)
==10493== by 0x42717C: execode (exec.c:1073)
==10493== by 0x431299: runshfunc (exec.c:5040)
==10493== by 0x430E76: doshfunc (exec.c:4920)
==10493== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10493==
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488==
==10488== HEAP SUMMARY:
==10488== in use at exit: 3,113,179 bytes in 68,979 blocks
==10488== total heap usage: 1,603,279 allocs, 1,534,300 frees, 129,673,890 bytes allocated
==10488==
==10495== Searching for pointers to 69,536 not-freed blocks
--10495-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10495-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10495-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10495-- Scanning root segment: 0x4037000..0x403efff (32768)
--10495-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10495-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10495-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10495-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10495-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10495-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10495-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10495-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10495-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10495-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10495-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10495-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10495-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10495-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10495-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10495-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10495-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10495-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10495-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10495-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10495-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10495-- Scanning root segment: 0x701a000..0x701afff (4096)
--10495-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10495-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10495-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10495-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10495-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10495-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10495-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10495-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10495-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10495-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF073C, len 4
==10488== Searching for pointers to 68,979 not-freed blocks
--10488-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10488-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10488-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10488-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10488-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10488-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10488-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10488-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10488-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10488-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10488-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10488-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10488-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10488-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10488-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10488-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10488-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10488-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10488-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10488-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10488-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10488-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10488-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10488-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10488-- Scanning root segment: 0x701a000..0x701afff (4096)
--10488-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10488-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10488-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10488-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10488-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10488-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10488-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10488-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10488-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10488-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10495== Checked 4,839,360 bytes
==10495==
==10488== Checked 4,788,920 bytes
==10488==
==10495== LEAK SUMMARY:
==10495== definitely lost: 2,221 bytes in 14 blocks
==10495== indirectly lost: 6,796 bytes in 9 blocks
==10495== possibly lost: 0 bytes in 0 blocks
==10495== still reachable: 3,128,368 bytes in 69,513 blocks
==10495== suppressed: 0 bytes in 0 blocks
==10495== Rerun with --leak-check=full to see details of leaked memory
==10495==
==10495== Use --track-origins=yes to see where uninitialised values come from
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495==
==10495== 1 errors in context 1 of 2:
==10495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10495== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10495== by 0x488CD0: stringsubst (subst.c:301)
==10495== by 0x48801B: prefork (subst.c:77)
==10495== by 0x42B318: execcmd (exec.c:2619)
==10495== by 0x428CA0: execpline2 (exec.c:1697)
==10495== by 0x427FD2: execpline (exec.c:1484)
==10495== by 0x427756: execlist (exec.c:1267)
==10495== by 0x42717C: execode (exec.c:1073)
==10495== by 0x431299: runshfunc (exec.c:5040)
==10495== by 0x430E76: doshfunc (exec.c:4920)
==10495== by 0x4302FB: execshfunc (exec.c:4557)
==10495== by 0x42D8C1: execcmd (exec.c:3373)
==10495==
==10495==
==10495== 2 errors in context 2 of 2:
==10495== Conditional jump or move depends on uninitialised value(s)
==10495== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10495== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10495== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10495== by 0x40EFC2: execbuiltin (builtin.c:450)
==10495== by 0x42D8E9: execcmd (exec.c:3378)
==10495== by 0x428CA0: execpline2 (exec.c:1697)
==10495== by 0x427FD2: execpline (exec.c:1484)
==10495== by 0x42779A: execlist (exec.c:1275)
==10495== by 0x42717C: execode (exec.c:1073)
==10495== by 0x431299: runshfunc (exec.c:5040)
==10495== by 0x430E76: doshfunc (exec.c:4920)
==10495== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10495==
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10536-by-pythonnut-on-???
==10536== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10536-by-pythonnut-on-???
==10536== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10536-by-pythonnut-on-???
==10536==
==10536== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10536== don't want to do, unless you know exactly what you're doing,
==10536== or are doing some strange experiment):
==10536== /usr/lib/valgrind/../../bin/vgdb --pid=10536 ...command...
==10536==
==10536== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10536== /path/to/gdb ./zsh
==10536== and then give GDB the following command
==10536== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10536
==10536== --pid is optional if only one valgrind process is running
==10536==
--10536-- Caught __NR_exit; running __libc_freeres()
==10488== LEAK SUMMARY:
==10488== definitely lost: 2,205 bytes in 14 blocks
==10488== indirectly lost: 6,756 bytes in 7 blocks
==10488== possibly lost: 0 bytes in 0 blocks
==10488== still reachable: 3,104,218 bytes in 68,958 blocks
==10488== suppressed: 0 bytes in 0 blocks
==10488== Rerun with --leak-check=full to see details of leaked memory
==10488==
==10488== Use --track-origins=yes to see where uninitialised values come from
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488==
==10488== 1 errors in context 1 of 2:
==10488== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10488== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10488== by 0x488CD0: stringsubst (subst.c:301)
==10488== by 0x48801B: prefork (subst.c:77)
==10488== by 0x42B318: execcmd (exec.c:2619)
==10488== by 0x428CA0: execpline2 (exec.c:1697)
==10488== by 0x427FD2: execpline (exec.c:1484)
==10488== by 0x427756: execlist (exec.c:1267)
==10488== by 0x42717C: execode (exec.c:1073)
==10488== by 0x431299: runshfunc (exec.c:5040)
==10488== by 0x430E76: doshfunc (exec.c:4920)
==10488== by 0x4302FB: execshfunc (exec.c:4557)
==10488== by 0x42D8C1: execcmd (exec.c:3373)
==10488==
==10488==
==10488== 2 errors in context 2 of 2:
==10488== Conditional jump or move depends on uninitialised value(s)
==10488== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10488== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10488== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10488== by 0x40EFC2: execbuiltin (builtin.c:450)
==10488== by 0x42D8E9: execcmd (exec.c:3378)
==10488== by 0x428CA0: execpline2 (exec.c:1697)
==10488== by 0x427FD2: execpline (exec.c:1484)
==10488== by 0x42779A: execlist (exec.c:1275)
==10488== by 0x42717C: execode (exec.c:1073)
==10488== by 0x431299: runshfunc (exec.c:5040)
==10488== by 0x430E76: doshfunc (exec.c:4920)
==10488== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10488==
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10547-by-pythonnut-on-???
==10547== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10547-by-pythonnut-on-???
==10547== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10547-by-pythonnut-on-???
==10547==
==10547== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10547== don't want to do, unless you know exactly what you're doing,
==10547== or are doing some strange experiment):
==10547== /usr/lib/valgrind/../../bin/vgdb --pid=10547 ...command...
==10547==
==10547== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10547== /path/to/gdb ./zsh
==10547== and then give GDB the following command
==10547== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10547
==10547== --pid is optional if only one valgrind process is running
==10547==
--10547-- Caught __NR_exit; running __libc_freeres()
--10496-- Caught __NR_exit; running __libc_freeres()
--10536-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10536==
==10536== HEAP SUMMARY:
==10536== in use at exit: 3,137,384 bytes in 69,536 blocks
==10536== total heap usage: 1,597,474 allocs, 1,527,938 frees, 129,069,550 bytes allocated
==10536==
==10496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10496-by-pythonnut-on-???
==10496== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10496-by-pythonnut-on-???
==10496== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10496-by-pythonnut-on-???
==10496==
==10496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10496== don't want to do, unless you know exactly what you're doing,
==10496== or are doing some strange experiment):
==10496== /usr/lib/valgrind/../../bin/vgdb --pid=10496 ...command...
==10496==
==10496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10496== /path/to/gdb ./zsh
==10496== and then give GDB the following command
==10496== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10496
==10496== --pid is optional if only one valgrind process is running
==10496==
--10547-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10547==
==10496==
==10547== HEAP SUMMARY:
==10547== in use at exit: 3,113,186 bytes in 68,979 blocks
==10547== total heap usage: 1,603,294 allocs, 1,534,315 frees, 129,678,888 bytes allocated
==10547==
==10496== HEAP SUMMARY:
==10496== in use at exit: 3,114,823 bytes in 68,979 blocks
==10496== total heap usage: 1,603,283 allocs, 1,534,304 frees, 129,789,142 bytes allocated
==10496==
==10536== Searching for pointers to 69,536 not-freed blocks
--10536-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10536-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10536-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10536-- Scanning root segment: 0x4037000..0x403efff (32768)
--10536-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10536-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10536-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10536-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10536-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10536-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10536-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10536-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10536-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10536-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10536-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10536-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10536-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10536-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10536-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10536-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10536-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10536-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10536-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10536-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10536-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10536-- Scanning root segment: 0x701a000..0x701afff (4096)
--10536-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10536-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10536-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10536-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10536-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10536-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10536-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10536-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10536-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10536-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10496== Searching for pointers to 68,979 not-freed blocks
==10547== Searching for pointers to 68,979 not-freed blocks
--10496-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10547-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10496-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10547-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10496-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10547-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10547-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10496-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10547-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10496-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10547-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10496-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10547-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10496-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10547-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10496-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10547-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10496-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10496-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10547-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10496-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10547-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10547-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10496-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10496-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10547-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10547-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10496-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10547-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10547-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10496-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547-- Scanning root segment: 0x701a000..0x701afff (4096)
--10496-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10496-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10547-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10496-- Scanning root segment: 0x701a000..0x701afff (4096)
--10496-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10496-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10547-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10496-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10547-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10496-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10547-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10547-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10496-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10547-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10547-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10496-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10496-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10536== Checked 4,839,360 bytes
==10536==
==10496== Checked 4,775,568 bytes
==10547== Checked 4,789,056 bytes
==10496==
==10547==
==10536== LEAK SUMMARY:
==10536== definitely lost: 2,221 bytes in 14 blocks
==10536== indirectly lost: 6,796 bytes in 9 blocks
==10536== possibly lost: 0 bytes in 0 blocks
==10536== still reachable: 3,128,367 bytes in 69,513 blocks
==10536== suppressed: 0 bytes in 0 blocks
==10536== Rerun with --leak-check=full to see details of leaked memory
==10536==
==10536== Use --track-origins=yes to see where uninitialised values come from
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536==
==10536== 1 errors in context 1 of 2:
==10536== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10536== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10536== by 0x488CD0: stringsubst (subst.c:301)
==10536== by 0x48801B: prefork (subst.c:77)
==10536== by 0x42B318: execcmd (exec.c:2619)
==10536== by 0x428CA0: execpline2 (exec.c:1697)
==10536== by 0x427FD2: execpline (exec.c:1484)
==10536== by 0x427756: execlist (exec.c:1267)
==10536== by 0x42717C: execode (exec.c:1073)
==10536== by 0x431299: runshfunc (exec.c:5040)
==10536== by 0x430E76: doshfunc (exec.c:4920)
==10536== by 0x4302FB: execshfunc (exec.c:4557)
==10536== by 0x42D8C1: execcmd (exec.c:3373)
==10536==
==10536==
==10536== 2 errors in context 2 of 2:
==10536== Conditional jump or move depends on uninitialised value(s)
==10536== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10536== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10536== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10536== by 0x40EFC2: execbuiltin (builtin.c:450)
==10536== by 0x42D8E9: execcmd (exec.c:3378)
==10536== by 0x428CA0: execpline2 (exec.c:1697)
==10536== by 0x427FD2: execpline (exec.c:1484)
==10536== by 0x42779A: execlist (exec.c:1275)
==10536== by 0x42717C: execode (exec.c:1073)
==10536== by 0x431299: runshfunc (exec.c:5040)
==10536== by 0x430E76: doshfunc (exec.c:4920)
==10536== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10536==
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10548-by-pythonnut-on-???
==10548== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10548-by-pythonnut-on-???
==10548== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10548-by-pythonnut-on-???
==10548==
==10548== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10548== don't want to do, unless you know exactly what you're doing,
==10548== or are doing some strange experiment):
==10548== /usr/lib/valgrind/../../bin/vgdb --pid=10548 ...command...
==10548==
==10548== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10548== /path/to/gdb ./zsh
==10548== and then give GDB the following command
==10548== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10548
==10548== --pid is optional if only one valgrind process is running
==10548==
==10496== LEAK SUMMARY:
==10547== LEAK SUMMARY:
==10496== definitely lost: 2,205 bytes in 14 blocks
==10547== definitely lost: 2,205 bytes in 14 blocks
==10496== indirectly lost: 6,756 bytes in 7 blocks
==10547== indirectly lost: 6,756 bytes in 7 blocks
==10496== possibly lost: 0 bytes in 0 blocks
==10547== possibly lost: 0 bytes in 0 blocks
==10496== still reachable: 3,105,862 bytes in 68,958 blocks
==10547== still reachable: 3,104,225 bytes in 68,958 blocks
==10496== suppressed: 0 bytes in 0 blocks
==10547== suppressed: 0 bytes in 0 blocks
==10496== Rerun with --leak-check=full to see details of leaked memory
==10547== Rerun with --leak-check=full to see details of leaked memory
==10496==
==10547==
==10496== Use --track-origins=yes to see where uninitialised values come from
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496==
==10496== 1 errors in context 1 of 2:
==10496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10547== Use --track-origins=yes to see where uninitialised values come from
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547==
==10547== 1 errors in context 1 of 2:
==10547== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10496== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10547== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10496== by 0x488CD0: stringsubst (subst.c:301)
==10547== by 0x488CD0: stringsubst (subst.c:301)
==10496== by 0x48801B: prefork (subst.c:77)
==10547== by 0x48801B: prefork (subst.c:77)
==10547== by 0x42B318: execcmd (exec.c:2619)
==10496== by 0x42B318: execcmd (exec.c:2619)
==10547== by 0x428CA0: execpline2 (exec.c:1697)
==10496== by 0x428CA0: execpline2 (exec.c:1697)
==10547== by 0x427FD2: execpline (exec.c:1484)
==10496== by 0x427FD2: execpline (exec.c:1484)
==10547== by 0x427756: execlist (exec.c:1267)
==10496== by 0x427756: execlist (exec.c:1267)
==10547== by 0x42717C: execode (exec.c:1073)
==10496== by 0x42717C: execode (exec.c:1073)
==10547== by 0x431299: runshfunc (exec.c:5040)
==10496== by 0x431299: runshfunc (exec.c:5040)
==10547== by 0x430E76: doshfunc (exec.c:4920)
==10496== by 0x430E76: doshfunc (exec.c:4920)
==10547== by 0x4302FB: execshfunc (exec.c:4557)
==10496== by 0x4302FB: execshfunc (exec.c:4557)
==10547== by 0x42D8C1: execcmd (exec.c:3373)
==10496== by 0x42D8C1: execcmd (exec.c:3373)
==10547==
==10496==
==10547==
==10496==
==10547== 2 errors in context 2 of 2:
==10496== 2 errors in context 2 of 2:
==10547== Conditional jump or move depends on uninitialised value(s)
==10496== Conditional jump or move depends on uninitialised value(s)
==10547== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10496== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10547== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10496== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10547== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10496== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10547== by 0x40EFC2: execbuiltin (builtin.c:450)
==10496== by 0x40EFC2: execbuiltin (builtin.c:450)
==10547== by 0x42D8E9: execcmd (exec.c:3378)
==10496== by 0x42D8E9: execcmd (exec.c:3378)
==10547== by 0x428CA0: execpline2 (exec.c:1697)
==10496== by 0x428CA0: execpline2 (exec.c:1697)
==10547== by 0x427FD2: execpline (exec.c:1484)
==10496== by 0x427FD2: execpline (exec.c:1484)
==10547== by 0x42779A: execlist (exec.c:1275)
==10496== by 0x42779A: execlist (exec.c:1275)
==10547== by 0x42717C: execode (exec.c:1073)
==10496== by 0x42717C: execode (exec.c:1073)
==10547== by 0x431299: runshfunc (exec.c:5040)
==10496== by 0x431299: runshfunc (exec.c:5040)
==10547== by 0x430E76: doshfunc (exec.c:4920)
==10496== by 0x430E76: doshfunc (exec.c:4920)
==10547== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10496== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10547==
==10496==
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10548-- Caught __NR_exit; running __libc_freeres()
--10490-- Caught __NR_exit; running __libc_freeres()
--10549-- Caught __NR_exit; running __libc_freeres()
--10548-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10549-by-pythonnut-on-???
==10549== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10549-by-pythonnut-on-???
==10549== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10549-by-pythonnut-on-???
==10549==
==10549== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10549== don't want to do, unless you know exactly what you're doing,
==10549== or are doing some strange experiment):
==10549== /usr/lib/valgrind/../../bin/vgdb --pid=10549 ...command...
==10549==
==10549== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10549== /path/to/gdb ./zsh
==10549== and then give GDB the following command
==10549== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10549
==10549== --pid is optional if only one valgrind process is running
==10549==
==10548==
==10548== HEAP SUMMARY:
==10548== in use at exit: 3,137,383 bytes in 69,536 blocks
==10548== total heap usage: 1,597,482 allocs, 1,527,946 frees, 129,073,203 bytes allocated
==10548==
==10490==
==10490== HEAP SUMMARY:
==10490== in use at exit: 3,113,961 bytes in 68,960 blocks
==10490== total heap usage: 1,603,292 allocs, 1,534,332 frees, 129,791,145 bytes allocated
==10490==
--10549-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549==
==10549== HEAP SUMMARY:
==10549== in use at exit: 3,113,346 bytes in 68,980 blocks
==10549== total heap usage: 1,603,311 allocs, 1,534,331 frees, 129,683,739 bytes allocated
==10549==
==10548== Searching for pointers to 69,536 not-freed blocks
--10548-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10548-- Scanning root segment: 0x4037000..0x403efff (32768)
--10548-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10548-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10548-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10548-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10548-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10548-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10548-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10548-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10548-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10548-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10548-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10548-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10548-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10548-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10548-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10548-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10548-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10548-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10548-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10548-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10548-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10548-- Scanning root segment: 0x701a000..0x701afff (4096)
--10548-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10548-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10548-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10548-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10548-- Scanning root segment: 0xb268000..0xb268fff (4096)
==10490== Searching for pointers to 68,960 not-freed blocks
--10490-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10548-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10548-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10548-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10490-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10490-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10490-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10490-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10490-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10490-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10490-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10490-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10490-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10490-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10490-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10490-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10490-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10490-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10490-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10490-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10490-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10490-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10490-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10490-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10490-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10490-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10490-- Scanning root segment: 0x701a000..0x701afff (4096)
--10490-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10490-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10490-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10490-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10490-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10490-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10490-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10490-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10490-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10549== Searching for pointers to 68,980 not-freed blocks
--10549-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10549-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10549-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10549-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10549-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10549-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10549-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10549-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10549-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10549-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10549-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10549-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10549-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10549-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10549-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10549-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10549-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10549-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10549-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10549-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10549-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10549-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10549-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10549-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10549-- Scanning root segment: 0x701a000..0x701afff (4096)
--10549-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10549-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10549-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10549-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10549-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10549-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10549-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10549-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10549-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10549-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10490== Checked 4,772,952 bytes
==10490==
==10548== Checked 4,839,360 bytes
==10548==
==10549== Checked 4,788,400 bytes
==10549==
==10490== LEAK SUMMARY:
==10490== definitely lost: 2,205 bytes in 14 blocks
==10490== indirectly lost: 6,756 bytes in 7 blocks
==10490== possibly lost: 0 bytes in 0 blocks
==10490== still reachable: 3,105,000 bytes in 68,939 blocks
==10490== suppressed: 0 bytes in 0 blocks
==10490== Rerun with --leak-check=full to see details of leaked memory
==10490==
==10490== Use --track-origins=yes to see where uninitialised values come from
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10490==
==10490== 1 errors in context 1 of 2:
==10490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10490== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10490== by 0x488CD0: stringsubst (subst.c:301)
==10490== by 0x48801B: prefork (subst.c:77)
==10490== by 0x42B318: execcmd (exec.c:2619)
==10490== by 0x428CA0: execpline2 (exec.c:1697)
==10490== by 0x427FD2: execpline (exec.c:1484)
==10490== by 0x427756: execlist (exec.c:1267)
==10490== by 0x42717C: execode (exec.c:1073)
==10490== by 0x431299: runshfunc (exec.c:5040)
==10490== by 0x430E76: doshfunc (exec.c:4920)
==10490== by 0x4302FB: execshfunc (exec.c:4557)
==10490== by 0x42D8C1: execcmd (exec.c:3373)
==10490==
==10490==
==10490== 2 errors in context 2 of 2:
==10490== Conditional jump or move depends on uninitialised value(s)
==10490== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10490== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10490== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10490== by 0x40EFC2: execbuiltin (builtin.c:450)
==10490== by 0x42D8E9: execcmd (exec.c:3378)
==10490== by 0x428CA0: execpline2 (exec.c:1697)
==10490== by 0x427FD2: execpline (exec.c:1484)
==10490== by 0x42779A: execlist (exec.c:1275)
==10490== by 0x42717C: execode (exec.c:1073)
==10490== by 0x431299: runshfunc (exec.c:5040)
==10490== by 0x430E76: doshfunc (exec.c:4920)
==10490== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10490==
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== LEAK SUMMARY:
==10548== definitely lost: 2,221 bytes in 14 blocks
==10548== indirectly lost: 6,796 bytes in 9 blocks
==10548== possibly lost: 0 bytes in 0 blocks
==10548== still reachable: 3,128,366 bytes in 69,513 blocks
==10548== suppressed: 0 bytes in 0 blocks
==10548== Rerun with --leak-check=full to see details of leaked memory
==10548==
==10548== Use --track-origins=yes to see where uninitialised values come from
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548==
==10548== 1 errors in context 1 of 2:
==10548== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10548== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10548== by 0x488CD0: stringsubst (subst.c:301)
==10548== by 0x48801B: prefork (subst.c:77)
==10548== by 0x42B318: execcmd (exec.c:2619)
==10548== by 0x428CA0: execpline2 (exec.c:1697)
==10548== by 0x427FD2: execpline (exec.c:1484)
==10548== by 0x427756: execlist (exec.c:1267)
==10548== by 0x42717C: execode (exec.c:1073)
==10548== by 0x431299: runshfunc (exec.c:5040)
==10548== by 0x430E76: doshfunc (exec.c:4920)
==10548== by 0x4302FB: execshfunc (exec.c:4557)
==10548== by 0x42D8C1: execcmd (exec.c:3373)
==10548==
==10548==
==10548== 2 errors in context 2 of 2:
==10548== Conditional jump or move depends on uninitialised value(s)
==10548== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10548== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10548== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10548== by 0x40EFC2: execbuiltin (builtin.c:450)
==10548== by 0x42D8E9: execcmd (exec.c:3378)
==10548== by 0x428CA0: execpline2 (exec.c:1697)
==10548== by 0x427FD2: execpline (exec.c:1484)
==10548== by 0x42779A: execlist (exec.c:1275)
==10548== by 0x42717C: execode (exec.c:1073)
==10548== by 0x431299: runshfunc (exec.c:5040)
==10548== by 0x430E76: doshfunc (exec.c:4920)
==10548== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10548==
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549== LEAK SUMMARY:
==10549== definitely lost: 2,205 bytes in 14 blocks
==10549== indirectly lost: 6,756 bytes in 7 blocks
==10549== possibly lost: 0 bytes in 0 blocks
==10549== still reachable: 3,104,385 bytes in 68,959 blocks
==10549== suppressed: 0 bytes in 0 blocks
==10549== Rerun with --leak-check=full to see details of leaked memory
==10549==
==10549== Use --track-origins=yes to see where uninitialised values come from
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549==
==10549== 1 errors in context 1 of 2:
==10549== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10549== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10549== by 0x488CD0: stringsubst (subst.c:301)
==10549== by 0x48801B: prefork (subst.c:77)
==10549== by 0x42B318: execcmd (exec.c:2619)
==10549== by 0x428CA0: execpline2 (exec.c:1697)
==10549== by 0x427FD2: execpline (exec.c:1484)
==10549== by 0x427756: execlist (exec.c:1267)
==10549== by 0x42717C: execode (exec.c:1073)
==10549== by 0x431299: runshfunc (exec.c:5040)
==10549== by 0x430E76: doshfunc (exec.c:4920)
==10549== by 0x4302FB: execshfunc (exec.c:4557)
==10549== by 0x42D8C1: execcmd (exec.c:3373)
==10549==
==10549==
==10549== 2 errors in context 2 of 2:
==10549== Conditional jump or move depends on uninitialised value(s)
==10549== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10549== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10549== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10549== by 0x40EFC2: execbuiltin (builtin.c:450)
==10549== by 0x42D8E9: execcmd (exec.c:3378)
==10549== by 0x428CA0: execpline2 (exec.c:1697)
==10549== by 0x427FD2: execpline (exec.c:1484)
==10549== by 0x42779A: execlist (exec.c:1275)
==10549== by 0x42717C: execode (exec.c:1073)
==10549== by 0x431299: runshfunc (exec.c:5040)
==10549== by 0x430E76: doshfunc (exec.c:4920)
==10549== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10549==
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10551-by-pythonnut-on-???
==10551== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10551-by-pythonnut-on-???
==10551== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10551-by-pythonnut-on-???
==10551==
==10551== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10551== don't want to do, unless you know exactly what you're doing,
==10551== or are doing some strange experiment):
==10551== /usr/lib/valgrind/../../bin/vgdb --pid=10551 ...command...
==10551==
==10551== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10551== /path/to/gdb ./zsh
==10551== and then give GDB the following command
==10551== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10551
==10551== --pid is optional if only one valgrind process is running
==10551==
--10551-- Caught __NR_exit; running __libc_freeres()
--10552-- Caught __NR_exit; running __libc_freeres()
==10552== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10552-by-pythonnut-on-???
==10553== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10553-by-pythonnut-on-???
==10552== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10552-by-pythonnut-on-???
==10553== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10553-by-pythonnut-on-???
==10552== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10552-by-pythonnut-on-???
==10553== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10553-by-pythonnut-on-???
==10552==
==10553==
==10552== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10552== don't want to do, unless you know exactly what you're doing,
==10552== or are doing some strange experiment):
==10552== /usr/lib/valgrind/../../bin/vgdb --pid=10552 ...command...
==10553== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10553== don't want to do, unless you know exactly what you're doing,
==10553== or are doing some strange experiment):
==10553== /usr/lib/valgrind/../../bin/vgdb --pid=10553 ...command...
==10552==
==10553==
==10552== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10552== /path/to/gdb ./zsh
==10552== and then give GDB the following command
==10552== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10552
==10553== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10553== /path/to/gdb ./zsh
==10553== and then give GDB the following command
==10553== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10553
==10552== --pid is optional if only one valgrind process is running
==10553== --pid is optional if only one valgrind process is running
==10552==
==10553==
==10554== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10554-by-pythonnut-on-???
--10553-- Caught __NR_exit; running __libc_freeres()
==10554== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10554-by-pythonnut-on-???
==10554== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10554-by-pythonnut-on-???
==10554==
==10554== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10554== don't want to do, unless you know exactly what you're doing,
==10554== or are doing some strange experiment):
==10554== /usr/lib/valgrind/../../bin/vgdb --pid=10554 ...command...
==10554==
==10554== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10554== /path/to/gdb ./zsh
==10554== and then give GDB the following command
==10554== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10554
==10554== --pid is optional if only one valgrind process is running
==10554==
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
--10552-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10551-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10552==
--10553-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10551==
==10552== HEAP SUMMARY:
==10552== in use at exit: 3,115,702 bytes in 69,022 blocks
==10552== total heap usage: 1,603,358 allocs, 1,534,336 frees, 129,799,722 bytes allocated
==10552==
==10551== HEAP SUMMARY:
==10551== in use at exit: 3,137,386 bytes in 69,536 blocks
==10551== total heap usage: 1,597,484 allocs, 1,527,948 frees, 129,073,780 bytes allocated
==10551==
==10553==
==10553== HEAP SUMMARY:
==10553== in use at exit: 3,113,552 bytes in 68,985 blocks
==10553== total heap usage: 1,603,358 allocs, 1,534,373 frees, 129,692,691 bytes allocated
==10553==
==10551== Searching for pointers to 69,536 not-freed blocks
==10552== Searching for pointers to 69,022 not-freed blocks
--10551-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10552-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10551-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10551-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10552-- Scanning root segment: 0x4037000..0x403afff (16384)
--10551-- Scanning root segment: 0x4037000..0x403efff (32768)
--10552-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10552-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10552-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10552-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10551-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10552-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10551-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10552-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10551-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10552-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10552-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10552-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10552-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10551-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10551-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10552-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10552-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10552-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10551-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10551-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10552-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10551-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10552-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10551-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10552-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10551-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10552-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10551-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10552-- Scanning root segment: 0x701a000..0x701afff (4096)
--10551-- Scanning root segment: 0x701a000..0x701afff (4096)
--10551-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10552-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10551-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10551-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10552-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10551-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10551-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10552-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10551-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10552-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10551-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10552-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10551-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10552-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10551-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10551-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10552-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10552-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10553== Searching for pointers to 68,985 not-freed blocks
--10553-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10553-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10553-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10553-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10553-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10553-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10553-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10553-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10553-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10553-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10553-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10553-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10553-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10553-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10553-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10553-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10553-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10553-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10553-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10553-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10553-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10553-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10553-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10553-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10553-- Scanning root segment: 0x701a000..0x701afff (4096)
--10553-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10553-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10553-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10553-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10553-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10553-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10553-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10553-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10553-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10553-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10552== Checked 4,791,560 bytes
==10552==
==10551== Checked 4,839,360 bytes
==10551==
==10553== Checked 4,767,560 bytes
==10553==
==10552== LEAK SUMMARY:
==10551== LEAK SUMMARY:
==10552== definitely lost: 2,205 bytes in 14 blocks
==10551== definitely lost: 2,221 bytes in 14 blocks
==10552== indirectly lost: 6,756 bytes in 7 blocks
==10551== indirectly lost: 6,796 bytes in 9 blocks
==10552== possibly lost: 0 bytes in 0 blocks
==10551== possibly lost: 0 bytes in 0 blocks
==10552== still reachable: 3,106,741 bytes in 69,001 blocks
==10551== still reachable: 3,128,369 bytes in 69,513 blocks
==10552== suppressed: 0 bytes in 0 blocks
==10551== suppressed: 0 bytes in 0 blocks
==10552== Rerun with --leak-check=full to see details of leaked memory
==10551== Rerun with --leak-check=full to see details of leaked memory
==10552==
==10551==
==10552== Use --track-origins=yes to see where uninitialised values come from
==10551== Use --track-origins=yes to see where uninitialised values come from
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10552==
==10551==
==10552== 1 errors in context 1 of 2:
==10551== 1 errors in context 1 of 2:
==10552== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10551== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10552== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10551== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10552== by 0x488CD0: stringsubst (subst.c:301)
==10551== by 0x488CD0: stringsubst (subst.c:301)
==10552== by 0x48801B: prefork (subst.c:77)
==10551== by 0x48801B: prefork (subst.c:77)
==10552== by 0x42B318: execcmd (exec.c:2619)
==10551== by 0x42B318: execcmd (exec.c:2619)
==10552== by 0x428CA0: execpline2 (exec.c:1697)
==10551== by 0x428CA0: execpline2 (exec.c:1697)
==10552== by 0x427FD2: execpline (exec.c:1484)
==10551== by 0x427FD2: execpline (exec.c:1484)
==10552== by 0x427756: execlist (exec.c:1267)
==10551== by 0x427756: execlist (exec.c:1267)
==10552== by 0x42717C: execode (exec.c:1073)
==10551== by 0x42717C: execode (exec.c:1073)
==10552== by 0x431299: runshfunc (exec.c:5040)
==10551== by 0x431299: runshfunc (exec.c:5040)
==10552== by 0x430E76: doshfunc (exec.c:4920)
==10551== by 0x430E76: doshfunc (exec.c:4920)
==10552== by 0x4302FB: execshfunc (exec.c:4557)
==10551== by 0x4302FB: execshfunc (exec.c:4557)
==10552== by 0x42D8C1: execcmd (exec.c:3373)
==10551== by 0x42D8C1: execcmd (exec.c:3373)
==10552==
==10551==
==10552==
==10551==
==10552== 2 errors in context 2 of 2:
==10551== 2 errors in context 2 of 2:
==10552== Conditional jump or move depends on uninitialised value(s)
==10551== Conditional jump or move depends on uninitialised value(s)
==10552== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10551== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10552== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10551== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10552== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10551== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10552== by 0x40EFC2: execbuiltin (builtin.c:450)
==10551== by 0x40EFC2: execbuiltin (builtin.c:450)
==10552== by 0x42D8E9: execcmd (exec.c:3378)
==10551== by 0x42D8E9: execcmd (exec.c:3378)
==10552== by 0x428CA0: execpline2 (exec.c:1697)
==10551== by 0x428CA0: execpline2 (exec.c:1697)
==10552== by 0x427FD2: execpline (exec.c:1484)
==10551== by 0x427FD2: execpline (exec.c:1484)
==10552== by 0x42779A: execlist (exec.c:1275)
==10551== by 0x42779A: execlist (exec.c:1275)
==10552== by 0x42717C: execode (exec.c:1073)
==10551== by 0x42717C: execode (exec.c:1073)
==10552== by 0x431299: runshfunc (exec.c:5040)
==10551== by 0x431299: runshfunc (exec.c:5040)
==10552== by 0x430E76: doshfunc (exec.c:4920)
==10551== by 0x430E76: doshfunc (exec.c:4920)
==10552== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10551== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10552==
==10551==
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553== LEAK SUMMARY:
==10553== definitely lost: 2,205 bytes in 14 blocks
==10553== indirectly lost: 6,756 bytes in 7 blocks
==10553== possibly lost: 0 bytes in 0 blocks
==10553== still reachable: 3,104,591 bytes in 68,964 blocks
==10553== suppressed: 0 bytes in 0 blocks
==10553== Rerun with --leak-check=full to see details of leaked memory
==10553==
==10553== Use --track-origins=yes to see where uninitialised values come from
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553==
==10553== 1 errors in context 1 of 2:
==10553== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10553== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10553== by 0x488CD0: stringsubst (subst.c:301)
==10553== by 0x48801B: prefork (subst.c:77)
==10553== by 0x42B318: execcmd (exec.c:2619)
==10553== by 0x428CA0: execpline2 (exec.c:1697)
==10553== by 0x427FD2: execpline (exec.c:1484)
==10553== by 0x427756: execlist (exec.c:1267)
==10553== by 0x42717C: execode (exec.c:1073)
==10553== by 0x431299: runshfunc (exec.c:5040)
==10553== by 0x430E76: doshfunc (exec.c:4920)
==10553== by 0x4302FB: execshfunc (exec.c:4557)
==10553== by 0x42D8C1: execcmd (exec.c:3373)
==10553==
==10553==
==10553== 2 errors in context 2 of 2:
==10553== Conditional jump or move depends on uninitialised value(s)
==10553== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10553== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10553== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10553== by 0x40EFC2: execbuiltin (builtin.c:450)
==10553== by 0x42D8E9: execcmd (exec.c:3378)
==10553== by 0x428CA0: execpline2 (exec.c:1697)
==10553== by 0x427FD2: execpline (exec.c:1484)
==10553== by 0x42779A: execlist (exec.c:1275)
==10553== by 0x42717C: execode (exec.c:1073)
==10553== by 0x431299: runshfunc (exec.c:5040)
==10553== by 0x430E76: doshfunc (exec.c:4920)
==10553== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10553==
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10550-by-pythonnut-on-???
==10550== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10550-by-pythonnut-on-???
==10550== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10550-by-pythonnut-on-???
==10550==
==10550== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10550== don't want to do, unless you know exactly what you're doing,
==10550== or are doing some strange experiment):
==10550== /usr/lib/valgrind/../../bin/vgdb --pid=10550 ...command...
==10550==
==10550== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10550== /path/to/gdb ./zsh
==10550== and then give GDB the following command
==10550== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10550
==10550== --pid is optional if only one valgrind process is running
==10550==
--10550-- Caught __NR_exit; running __libc_freeres()
==10556== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10556-by-pythonnut-on-???
==10556== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10556-by-pythonnut-on-???
==10556== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10556-by-pythonnut-on-???
==10556==
==10556== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10556== don't want to do, unless you know exactly what you're doing,
==10556== or are doing some strange experiment):
==10556== /usr/lib/valgrind/../../bin/vgdb --pid=10556 ...command...
==10556==
==10556== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10556== /path/to/gdb ./zsh
==10556== and then give GDB the following command
==10556== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10556
==10556== --pid is optional if only one valgrind process is running
==10556==
--10557-- Caught __NR_exit; running __libc_freeres()
--10555-- Caught __NR_exit; running __libc_freeres()
--10550-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10555-by-pythonnut-on-???
==10555== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10555-by-pythonnut-on-???
==10555== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10555-by-pythonnut-on-???
==10555==
==10555== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10555== don't want to do, unless you know exactly what you're doing,
==10555== or are doing some strange experiment):
==10555== /usr/lib/valgrind/../../bin/vgdb --pid=10555 ...command...
==10555==
==10555== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10555== /path/to/gdb ./zsh
==10555== and then give GDB the following command
==10555== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10555
==10555== --pid is optional if only one valgrind process is running
==10555==
==10557== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10557-by-pythonnut-on-???
==10557== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10557-by-pythonnut-on-???
==10557== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10557-by-pythonnut-on-???
==10557==
==10557== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10557== don't want to do, unless you know exactly what you're doing,
==10557== or are doing some strange experiment):
==10557== /usr/lib/valgrind/../../bin/vgdb --pid=10557 ...command...
==10557==
==10557== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10557== /path/to/gdb ./zsh
==10557== and then give GDB the following command
==10557== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10557
==10557== --pid is optional if only one valgrind process is running
==10557==
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
==10550==
==10550== HEAP SUMMARY:
==10550== in use at exit: 3,115,638 bytes in 69,019 blocks
==10550== total heap usage: 1,603,360 allocs, 1,534,341 frees, 129,800,266 bytes allocated
==10550==
--10555-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10557-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555==
==10555== HEAP SUMMARY:
==10555== in use at exit: 3,113,456 bytes in 68,985 blocks
==10555== total heap usage: 1,603,338 allocs, 1,534,353 frees, 129,690,461 bytes allocated
==10555==
==10557==
==10557== HEAP SUMMARY:
==10557== in use at exit: 3,137,636 bytes in 69,541 blocks
==10557== total heap usage: 1,597,489 allocs, 1,527,948 frees, 129,077,370 bytes allocated
==10557==
==10550== Searching for pointers to 69,019 not-freed blocks
--10550-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10550-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10550-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10550-- Scanning root segment: 0x4037000..0x403afff (16384)
--10550-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10550-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10550-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10550-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10550-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10550-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10550-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10550-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10550-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10550-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10550-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10550-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10550-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10550-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10550-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10550-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10550-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10550-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10550-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10550-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10550-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10550-- Scanning root segment: 0x701a000..0x701afff (4096)
--10550-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10550-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10550-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10550-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10550-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10550-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10550-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10550-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10550-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10550-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10555== Searching for pointers to 68,985 not-freed blocks
--10555-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10555-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10555-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10555-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10555-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10555-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10555-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10555-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10555-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10555-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10555-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10555-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10555-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10555-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10555-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10555-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10555-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10555-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10555-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10555-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10555-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10555-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10555-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10555-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10555-- Scanning root segment: 0x701a000..0x701afff (4096)
--10555-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10555-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10555-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10555-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10555-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10555-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10555-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10555-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10555-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10555-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10557== Searching for pointers to 69,541 not-freed blocks
--10557-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10557-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10557-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10557-- Scanning root segment: 0x4037000..0x403efff (32768)
--10557-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10557-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10557-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10557-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10557-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10557-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10557-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10557-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10557-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10557-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10557-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10557-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10557-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10557-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10557-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10557-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10557-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10557-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10557-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10557-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10557-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10557-- Scanning root segment: 0x701a000..0x701afff (4096)
--10557-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10557-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10557-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10557-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10557-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10557-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10557-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10557-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10557-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10557-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10550== Checked 4,790,872 bytes
==10550==
==10555== Checked 4,788,432 bytes
==10555==
==10550== LEAK SUMMARY:
==10550== definitely lost: 2,205 bytes in 14 blocks
==10550== indirectly lost: 6,756 bytes in 7 blocks
==10550== possibly lost: 0 bytes in 0 blocks
==10550== still reachable: 3,106,677 bytes in 68,998 blocks
==10550== suppressed: 0 bytes in 0 blocks
==10550== Rerun with --leak-check=full to see details of leaked memory
==10550==
==10550== Use --track-origins=yes to see where uninitialised values come from
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550==
==10550== 1 errors in context 1 of 2:
==10550== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10550== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10550== by 0x488CD0: stringsubst (subst.c:301)
==10550== by 0x48801B: prefork (subst.c:77)
==10550== by 0x42B318: execcmd (exec.c:2619)
==10550== by 0x428CA0: execpline2 (exec.c:1697)
==10550== by 0x427FD2: execpline (exec.c:1484)
==10550== by 0x427756: execlist (exec.c:1267)
==10550== by 0x42717C: execode (exec.c:1073)
==10550== by 0x431299: runshfunc (exec.c:5040)
==10550== by 0x430E76: doshfunc (exec.c:4920)
==10550== by 0x4302FB: execshfunc (exec.c:4557)
==10550== by 0x42D8C1: execcmd (exec.c:3373)
==10550==
==10550==
==10550== 2 errors in context 2 of 2:
==10550== Conditional jump or move depends on uninitialised value(s)
==10550== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10550== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10550== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10550== by 0x40EFC2: execbuiltin (builtin.c:450)
==10550== by 0x42D8E9: execcmd (exec.c:3378)
==10550== by 0x428CA0: execpline2 (exec.c:1697)
==10550== by 0x427FD2: execpline (exec.c:1484)
==10550== by 0x42779A: execlist (exec.c:1275)
==10550== by 0x42717C: execode (exec.c:1073)
==10550== by 0x431299: runshfunc (exec.c:5040)
==10550== by 0x430E76: doshfunc (exec.c:4920)
==10550== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10550==
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557== Checked 4,840,240 bytes
==10557==
==10555== LEAK SUMMARY:
==10555== definitely lost: 2,205 bytes in 14 blocks
==10555== indirectly lost: 6,756 bytes in 7 blocks
==10555== possibly lost: 0 bytes in 0 blocks
==10555== still reachable: 3,104,495 bytes in 68,964 blocks
==10555== suppressed: 0 bytes in 0 blocks
==10555== Rerun with --leak-check=full to see details of leaked memory
==10555==
==10555== Use --track-origins=yes to see where uninitialised values come from
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10555==
==10555== 1 errors in context 1 of 2:
==10555== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10555== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10555== by 0x488CD0: stringsubst (subst.c:301)
==10555== by 0x48801B: prefork (subst.c:77)
==10555== by 0x42B318: execcmd (exec.c:2619)
==10555== by 0x428CA0: execpline2 (exec.c:1697)
==10555== by 0x427FD2: execpline (exec.c:1484)
==10555== by 0x427756: execlist (exec.c:1267)
==10555== by 0x42717C: execode (exec.c:1073)
==10555== by 0x431299: runshfunc (exec.c:5040)
==10555== by 0x430E76: doshfunc (exec.c:4920)
==10555== by 0x4302FB: execshfunc (exec.c:4557)
==10555== by 0x42D8C1: execcmd (exec.c:3373)
==10555==
==10555==
==10555== 2 errors in context 2 of 2:
==10555== Conditional jump or move depends on uninitialised value(s)
==10555== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10555== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10555== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10555== by 0x40EFC2: execbuiltin (builtin.c:450)
==10555== by 0x42D8E9: execcmd (exec.c:3378)
==10555== by 0x428CA0: execpline2 (exec.c:1697)
==10555== by 0x427FD2: execpline (exec.c:1484)
==10555== by 0x42779A: execlist (exec.c:1275)
==10555== by 0x42717C: execode (exec.c:1073)
==10555== by 0x431299: runshfunc (exec.c:5040)
==10555== by 0x430E76: doshfunc (exec.c:4920)
==10555== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10555==
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10559-by-pythonnut-on-???
==10559== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10559-by-pythonnut-on-???
==10559== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10559-by-pythonnut-on-???
==10559==
==10559== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10559== don't want to do, unless you know exactly what you're doing,
==10559== or are doing some strange experiment):
==10559== /usr/lib/valgrind/../../bin/vgdb --pid=10559 ...command...
==10559==
==10559== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10559== /path/to/gdb ./zsh
==10559== and then give GDB the following command
==10559== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10559
==10559== --pid is optional if only one valgrind process is running
==10559==
--10559-- Caught __NR_exit; running __libc_freeres()
==10557== LEAK SUMMARY:
==10557== definitely lost: 2,221 bytes in 14 blocks
==10557== indirectly lost: 6,796 bytes in 9 blocks
==10557== possibly lost: 0 bytes in 0 blocks
==10557== still reachable: 3,128,619 bytes in 69,518 blocks
==10557== suppressed: 0 bytes in 0 blocks
==10557== Rerun with --leak-check=full to see details of leaked memory
==10557==
==10557== Use --track-origins=yes to see where uninitialised values come from
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557==
==10557== 1 errors in context 1 of 2:
==10557== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10557== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10557== by 0x488CD0: stringsubst (subst.c:301)
==10557== by 0x48801B: prefork (subst.c:77)
==10557== by 0x42B318: execcmd (exec.c:2619)
==10557== by 0x428CA0: execpline2 (exec.c:1697)
==10557== by 0x427FD2: execpline (exec.c:1484)
==10557== by 0x427756: execlist (exec.c:1267)
==10557== by 0x42717C: execode (exec.c:1073)
==10557== by 0x431299: runshfunc (exec.c:5040)
==10557== by 0x430E76: doshfunc (exec.c:4920)
==10557== by 0x4302FB: execshfunc (exec.c:4557)
==10557== by 0x42D8C1: execcmd (exec.c:3373)
==10557==
==10557==
==10557== 2 errors in context 2 of 2:
==10557== Conditional jump or move depends on uninitialised value(s)
==10557== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10557== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10557== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10557== by 0x40EFC2: execbuiltin (builtin.c:450)
==10557== by 0x42D8E9: execcmd (exec.c:3378)
==10557== by 0x428CA0: execpline2 (exec.c:1697)
==10557== by 0x427FD2: execpline (exec.c:1484)
==10557== by 0x42779A: execlist (exec.c:1275)
==10557== by 0x42717C: execode (exec.c:1073)
==10557== by 0x431299: runshfunc (exec.c:5040)
==10557== by 0x430E76: doshfunc (exec.c:4920)
==10557== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10557==
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10556-- Caught __NR_exit; running __libc_freeres()
==10560== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10560-by-pythonnut-on-???
==10560== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10560-by-pythonnut-on-???
==10560== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10560-by-pythonnut-on-???
==10560==
==10560== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10560== don't want to do, unless you know exactly what you're doing,
==10560== or are doing some strange experiment):
==10560== /usr/lib/valgrind/../../bin/vgdb --pid=10560 ...command...
==10560==
==10560== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10560== /path/to/gdb ./zsh
==10560== and then give GDB the following command
==10560== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10560
==10560== --pid is optional if only one valgrind process is running
==10560==
--10559-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559==
--10560-- Caught __NR_exit; running __libc_freeres()
==10559== HEAP SUMMARY:
==10559== in use at exit: 3,115,642 bytes in 69,019 blocks
==10559== total heap usage: 1,603,376 allocs, 1,534,357 frees, 129,805,262 bytes allocated
==10559==
--10556-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10556==
==10556== HEAP SUMMARY:
==10556== in use at exit: 3,137,412 bytes in 69,538 blocks
==10556== total heap usage: 1,597,492 allocs, 1,527,954 frees, 129,077,946 bytes allocated
==10556==
--10560-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559== Searching for pointers to 69,019 not-freed blocks
--10559-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10559-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10559-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10559-- Scanning root segment: 0x4037000..0x403afff (16384)
--10559-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10559-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10559-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10559-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10559-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10559-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10559-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10559-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10559-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10559-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10559-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10559-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10559-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10559-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10559-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10559-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10559-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10559-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10559-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10559-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10559-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10559-- Scanning root segment: 0x701a000..0x701afff (4096)
--10559-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10559-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10559-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10559-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10559-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10559-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10559-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10559-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10559-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10559-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560==
==10560== HEAP SUMMARY:
==10560== in use at exit: 3,113,484 bytes in 68,986 blocks
==10560== total heap usage: 1,603,351 allocs, 1,534,365 frees, 129,693,148 bytes allocated
==10560==
==10556== Searching for pointers to 69,538 not-freed blocks
--10556-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10556-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10556-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10556-- Scanning root segment: 0x4037000..0x403efff (32768)
--10556-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10556-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10556-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10556-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10556-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10556-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10556-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10556-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10556-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10556-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10556-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10556-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10556-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10556-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10556-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10556-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10556-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10556-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10556-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10556-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10556-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10556-- Scanning root segment: 0x701a000..0x701afff (4096)
--10556-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10556-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10556-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10556-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10556-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10556-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10556-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10556-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10556-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10556-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560== Searching for pointers to 68,986 not-freed blocks
--10560-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10560-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10560-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10560-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10560-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10560-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10560-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10560-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10560-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10560-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10560-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10560-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10560-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10560-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10560-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10560-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10560-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10560-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10560-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10560-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10560-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10560-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10560-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10560-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10560-- Scanning root segment: 0x701a000..0x701afff (4096)
--10560-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10560-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10560-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10560-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10560-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10560-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10560-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10560-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10560-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10560-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10559== Checked 4,790,880 bytes
==10559==
==10556== Checked 4,839,384 bytes
==10556==
==10559== LEAK SUMMARY:
==10559== definitely lost: 2,205 bytes in 14 blocks
==10559== indirectly lost: 6,756 bytes in 7 blocks
==10559== possibly lost: 0 bytes in 0 blocks
==10559== still reachable: 3,106,681 bytes in 68,998 blocks
==10559== suppressed: 0 bytes in 0 blocks
==10559== Rerun with --leak-check=full to see details of leaked memory
==10559==
==10559== Use --track-origins=yes to see where uninitialised values come from
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559==
==10559== 1 errors in context 1 of 2:
==10559== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10559== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10559== by 0x488CD0: stringsubst (subst.c:301)
==10559== by 0x48801B: prefork (subst.c:77)
==10559== by 0x42B318: execcmd (exec.c:2619)
==10559== by 0x428CA0: execpline2 (exec.c:1697)
==10559== by 0x427FD2: execpline (exec.c:1484)
==10559== by 0x427756: execlist (exec.c:1267)
==10559== by 0x42717C: execode (exec.c:1073)
==10559== by 0x431299: runshfunc (exec.c:5040)
==10559== by 0x430E76: doshfunc (exec.c:4920)
==10559== by 0x4302FB: execshfunc (exec.c:4557)
==10559== by 0x42D8C1: execcmd (exec.c:3373)
==10559==
==10559==
==10559== 2 errors in context 2 of 2:
==10559== Conditional jump or move depends on uninitialised value(s)
==10559== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10559== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10559== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10559== by 0x40EFC2: execbuiltin (builtin.c:450)
==10559== by 0x42D8E9: execcmd (exec.c:3378)
==10559== by 0x428CA0: execpline2 (exec.c:1697)
==10559== by 0x427FD2: execpline (exec.c:1484)
==10559== by 0x42779A: execlist (exec.c:1275)
==10559== by 0x42717C: execode (exec.c:1073)
==10559== by 0x431299: runshfunc (exec.c:5040)
==10559== by 0x430E76: doshfunc (exec.c:4920)
==10559== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10559==
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10563-by-pythonnut-on-???
==10563== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10563-by-pythonnut-on-???
==10563== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10563-by-pythonnut-on-???
==10563==
==10563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10563== don't want to do, unless you know exactly what you're doing,
==10563== or are doing some strange experiment):
==10563== /usr/lib/valgrind/../../bin/vgdb --pid=10563 ...command...
==10563==
==10563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10563== /path/to/gdb ./zsh
==10563== and then give GDB the following command
==10563== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10563
==10563== --pid is optional if only one valgrind process is running
==10563==
==10560== Checked 4,787,944 bytes
==10560==
==10556== LEAK SUMMARY:
==10556== definitely lost: 2,221 bytes in 14 blocks
==10556== indirectly lost: 6,796 bytes in 9 blocks
==10556== possibly lost: 0 bytes in 0 blocks
==10556== still reachable: 3,128,395 bytes in 69,515 blocks
==10556== suppressed: 0 bytes in 0 blocks
==10556== Rerun with --leak-check=full to see details of leaked memory
==10556==
==10556== Use --track-origins=yes to see where uninitialised values come from
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10556==
==10556== 1 errors in context 1 of 2:
==10556== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10556== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10556== by 0x488CD0: stringsubst (subst.c:301)
==10556== by 0x48801B: prefork (subst.c:77)
==10556== by 0x42B318: execcmd (exec.c:2619)
==10556== by 0x428CA0: execpline2 (exec.c:1697)
==10556== by 0x427FD2: execpline (exec.c:1484)
==10556== by 0x427756: execlist (exec.c:1267)
==10556== by 0x42717C: execode (exec.c:1073)
==10556== by 0x431299: runshfunc (exec.c:5040)
==10556== by 0x430E76: doshfunc (exec.c:4920)
==10556== by 0x4302FB: execshfunc (exec.c:4557)
==10556== by 0x42D8C1: execcmd (exec.c:3373)
==10556==
==10556==
==10556== 2 errors in context 2 of 2:
==10556== Conditional jump or move depends on uninitialised value(s)
==10556== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10556== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10556== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10556== by 0x40EFC2: execbuiltin (builtin.c:450)
==10556== by 0x42D8E9: execcmd (exec.c:3378)
==10556== by 0x428CA0: execpline2 (exec.c:1697)
==10556== by 0x427FD2: execpline (exec.c:1484)
==10556== by 0x42779A: execlist (exec.c:1275)
==10556== by 0x42717C: execode (exec.c:1073)
==10556== by 0x431299: runshfunc (exec.c:5040)
==10556== by 0x430E76: doshfunc (exec.c:4920)
==10556== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10556==
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Caught __NR_exit; running __libc_freeres()
--10414-- Caught __NR_exit; running __libc_freeres()
==10560== LEAK SUMMARY:
==10560== definitely lost: 2,205 bytes in 14 blocks
==10560== indirectly lost: 6,756 bytes in 7 blocks
==10560== possibly lost: 0 bytes in 0 blocks
==10560== still reachable: 3,104,523 bytes in 68,965 blocks
==10560== suppressed: 0 bytes in 0 blocks
==10560== Rerun with --leak-check=full to see details of leaked memory
==10560==
==10560== Use --track-origins=yes to see where uninitialised values come from
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10560==
==10560== 1 errors in context 1 of 2:
==10560== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10560== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10560== by 0x488CD0: stringsubst (subst.c:301)
==10560== by 0x48801B: prefork (subst.c:77)
==10560== by 0x42B318: execcmd (exec.c:2619)
==10560== by 0x428CA0: execpline2 (exec.c:1697)
==10560== by 0x427FD2: execpline (exec.c:1484)
==10560== by 0x427756: execlist (exec.c:1267)
==10560== by 0x42717C: execode (exec.c:1073)
==10560== by 0x431299: runshfunc (exec.c:5040)
==10560== by 0x430E76: doshfunc (exec.c:4920)
==10560== by 0x4302FB: execshfunc (exec.c:4557)
==10560== by 0x42D8C1: execcmd (exec.c:3373)
==10560==
==10560==
==10560== 2 errors in context 2 of 2:
==10560== Conditional jump or move depends on uninitialised value(s)
==10560== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10560== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10560== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10560== by 0x40EFC2: execbuiltin (builtin.c:450)
==10560== by 0x42D8E9: execcmd (exec.c:3378)
==10560== by 0x428CA0: execpline2 (exec.c:1697)
==10560== by 0x427FD2: execpline (exec.c:1484)
==10560== by 0x42779A: execlist (exec.c:1275)
==10560== by 0x42717C: execode (exec.c:1073)
==10560== by 0x431299: runshfunc (exec.c:5040)
==10560== by 0x430E76: doshfunc (exec.c:4920)
==10560== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10560==
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10563==
==10563== HEAP SUMMARY:
==10563== in use at exit: 3,115,641 bytes in 69,019 blocks
==10563== total heap usage: 1,603,381 allocs, 1,534,362 frees, 129,807,375 bytes allocated
==10563==
--10414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10564-by-pythonnut-on-???
==10564== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10564-by-pythonnut-on-???
==10564== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10564-by-pythonnut-on-???
==10564==
==10564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10564== don't want to do, unless you know exactly what you're doing,
==10564== or are doing some strange experiment):
==10564== /usr/lib/valgrind/../../bin/vgdb --pid=10564 ...command...
==10564==
==10564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10564== /path/to/gdb ./zsh
==10564== and then give GDB the following command
==10564== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10564
==10564== --pid is optional if only one valgrind process is running
==10564==
--10564-- Caught __NR_exit; running __libc_freeres()
==10414==
==10563== Searching for pointers to 69,019 not-freed blocks
--10563-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10414== HEAP SUMMARY:
==10414== in use at exit: 3,133,478 bytes in 69,401 blocks
==10414== total heap usage: 1,597,433 allocs, 1,528,032 frees, 129,078,344 bytes allocated
==10414==
--10563-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10563-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10563-- Scanning root segment: 0x4037000..0x403afff (16384)
--10563-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10563-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10563-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10563-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10563-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10563-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10563-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10563-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10563-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10563-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10563-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10563-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10563-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10563-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10563-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10563-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10563-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10563-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10563-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10563-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10563-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10563-- Scanning root segment: 0x701a000..0x701afff (4096)
--10563-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10563-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10563-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10563-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10563-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10563-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10563-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10563-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10563-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10563-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564==
==10564== HEAP SUMMARY:
==10564== in use at exit: 3,112,005 bytes in 68,926 blocks
==10564== total heap usage: 1,603,321 allocs, 1,534,395 frees, 129,696,134 bytes allocated
==10564==
==10414== Searching for pointers to 69,401 not-freed blocks
--10414-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10414-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10414-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10414-- Scanning root segment: 0x4037000..0x403afff (16384)
--10414-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10414-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10414-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10414-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10414-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10414-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10414-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10414-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10414-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10414-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10414-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10414-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10414-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10414-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10414-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10414-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10414-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10414-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10414-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10414-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10414-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10414-- Scanning root segment: 0x701a000..0x701afff (4096)
--10414-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10414-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10414-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10414-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10414-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10414-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10414-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10414-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10414-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10414-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10564== Searching for pointers to 68,926 not-freed blocks
--10564-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10564-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10564-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10564-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10564-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10564-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10564-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10564-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10564-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10564-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10564-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10564-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10564-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10564-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10564-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10564-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10564-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10564-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10564-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10564-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10564-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10564-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10564-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10564-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10564-- Scanning root segment: 0x701a000..0x701afff (4096)
--10564-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10564-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10564-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10564-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10564-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10564-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10564-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10564-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10564-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10564-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10563== Checked 4,790,880 bytes
==10563==
==10563== LEAK SUMMARY:
==10563== definitely lost: 2,205 bytes in 14 blocks
==10563== indirectly lost: 6,756 bytes in 7 blocks
==10563== possibly lost: 0 bytes in 0 blocks
==10563== still reachable: 3,106,680 bytes in 68,998 blocks
==10563== suppressed: 0 bytes in 0 blocks
==10563== Rerun with --leak-check=full to see details of leaked memory
==10563==
==10563== Use --track-origins=yes to see where uninitialised values come from
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563==
==10563== 1 errors in context 1 of 2:
==10563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10563== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10563== by 0x488CD0: stringsubst (subst.c:301)
==10563== by 0x48801B: prefork (subst.c:77)
==10563== by 0x42B318: execcmd (exec.c:2619)
==10563== by 0x428CA0: execpline2 (exec.c:1697)
==10563== by 0x427FD2: execpline (exec.c:1484)
==10563== by 0x427756: execlist (exec.c:1267)
==10563== by 0x42717C: execode (exec.c:1073)
==10563== by 0x431299: runshfunc (exec.c:5040)
==10563== by 0x430E76: doshfunc (exec.c:4920)
==10563== by 0x4302FB: execshfunc (exec.c:4557)
==10563== by 0x42D8C1: execcmd (exec.c:3373)
==10563==
==10563==
==10563== 2 errors in context 2 of 2:
==10563== Conditional jump or move depends on uninitialised value(s)
==10563== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10563== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10563== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10563== by 0x40EFC2: execbuiltin (builtin.c:450)
==10563== by 0x42D8E9: execcmd (exec.c:3378)
==10563== by 0x428CA0: execpline2 (exec.c:1697)
==10563== by 0x427FD2: execpline (exec.c:1484)
==10563== by 0x42779A: execlist (exec.c:1275)
==10563== by 0x42717C: execode (exec.c:1073)
==10563== by 0x431299: runshfunc (exec.c:5040)
==10563== by 0x430E76: doshfunc (exec.c:4920)
==10563== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414== Checked 4,816,336 bytes
==10563==
==10414==
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10565-by-pythonnut-on-???
==10565== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10565-by-pythonnut-on-???
==10565== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10565-by-pythonnut-on-???
==10565==
==10565== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10565== don't want to do, unless you know exactly what you're doing,
==10565== or are doing some strange experiment):
==10565== /usr/lib/valgrind/../../bin/vgdb --pid=10565 ...command...
==10565==
==10565== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10565== /path/to/gdb ./zsh
==10565== and then give GDB the following command
==10565== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10565
==10565== --pid is optional if only one valgrind process is running
==10565==
--10565-- Caught __NR_exit; running __libc_freeres()
==10414== LEAK SUMMARY:
==10414== definitely lost: 2,221 bytes in 14 blocks
==10414== indirectly lost: 6,796 bytes in 9 blocks
==10414== possibly lost: 0 bytes in 0 blocks
==10414== still reachable: 3,124,461 bytes in 69,378 blocks
==10414== suppressed: 0 bytes in 0 blocks
==10414== Rerun with --leak-check=full to see details of leaked memory
==10414==
==10414== Use --track-origins=yes to see where uninitialised values come from
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10414==
==10414== 1 errors in context 1 of 2:
==10414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10414== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10414== by 0x488CD0: stringsubst (subst.c:301)
==10414== by 0x48801B: prefork (subst.c:77)
==10414== by 0x42B318: execcmd (exec.c:2619)
==10414== by 0x428CA0: execpline2 (exec.c:1697)
==10414== by 0x427FD2: execpline (exec.c:1484)
==10414== by 0x427756: execlist (exec.c:1267)
==10414== by 0x42717C: execode (exec.c:1073)
==10414== by 0x431299: runshfunc (exec.c:5040)
==10414== by 0x430E76: doshfunc (exec.c:4920)
==10414== by 0x4302FB: execshfunc (exec.c:4557)
==10414== by 0x42D8C1: execcmd (exec.c:3373)
==10414==
==10414==
==10414== 2 errors in context 2 of 2:
==10414== Conditional jump or move depends on uninitialised value(s)
==10414== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10414== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10414== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10414== by 0x40EFC2: execbuiltin (builtin.c:450)
==10414== by 0x42D8E9: execcmd (exec.c:3378)
==10414== by 0x428CA0: execpline2 (exec.c:1697)
==10414== by 0x427FD2: execpline (exec.c:1484)
==10414== by 0x42779A: execlist (exec.c:1275)
==10414== by 0x42717C: execode (exec.c:1073)
==10414== by 0x431299: runshfunc (exec.c:5040)
==10414== by 0x430E76: doshfunc (exec.c:4920)
==10414== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414==
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564== Checked 4,787,408 bytes
==10564==
==10566== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10566-by-pythonnut-on-???
==10566== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10566-by-pythonnut-on-???
==10566== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10566-by-pythonnut-on-???
==10566==
==10566== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10566== don't want to do, unless you know exactly what you're doing,
==10566== or are doing some strange experiment):
==10566== /usr/lib/valgrind/../../bin/vgdb --pid=10566 ...command...
==10566==
==10566== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10566== /path/to/gdb ./zsh
==10566== and then give GDB the following command
==10566== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10566
==10566== --pid is optional if only one valgrind process is running
==10566==
--10565-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== LEAK SUMMARY:
==10564== definitely lost: 2,205 bytes in 14 blocks
==10564== indirectly lost: 6,756 bytes in 7 blocks
==10564== possibly lost: 0 bytes in 0 blocks
==10564== still reachable: 3,103,044 bytes in 68,905 blocks
==10564== suppressed: 0 bytes in 0 blocks
==10564== Rerun with --leak-check=full to see details of leaked memory
==10564==
==10564== Use --track-origins=yes to see where uninitialised values come from
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564==
==10564== 1 errors in context 1 of 2:
==10564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10564== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10564== by 0x488CD0: stringsubst (subst.c:301)
==10564== by 0x48801B: prefork (subst.c:77)
==10564== by 0x42B318: execcmd (exec.c:2619)
==10564== by 0x428CA0: execpline2 (exec.c:1697)
==10564== by 0x427FD2: execpline (exec.c:1484)
==10564== by 0x427756: execlist (exec.c:1267)
==10564== by 0x42717C: execode (exec.c:1073)
==10564== by 0x431299: runshfunc (exec.c:5040)
==10564== by 0x430E76: doshfunc (exec.c:4920)
==10564== by 0x4302FB: execshfunc (exec.c:4557)
==10564== by 0x42D8C1: execcmd (exec.c:3373)
==10564==
==10564==
==10564== 2 errors in context 2 of 2:
==10564== Conditional jump or move depends on uninitialised value(s)
==10564== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10564== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10564== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10564== by 0x40EFC2: execbuiltin (builtin.c:450)
==10564== by 0x42D8E9: execcmd (exec.c:3378)
==10564== by 0x428CA0: execpline2 (exec.c:1697)
==10564== by 0x427FD2: execpline (exec.c:1484)
==10564== by 0x42779A: execlist (exec.c:1275)
==10564== by 0x42717C: execode (exec.c:1073)
==10564== by 0x431299: runshfunc (exec.c:5040)
==10564== by 0x430E76: doshfunc (exec.c:4920)
==10564== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10564==
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565==
==10565== HEAP SUMMARY:
==10565== in use at exit: 3,115,640 bytes in 69,019 blocks
==10565== total heap usage: 1,603,386 allocs, 1,534,367 frees, 129,809,488 bytes allocated
==10565==
client request: code 4d430005, addr 0xFFEFE8AAC, len 4
==10568== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10568-by-pythonnut-on-???
==10568== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10568-by-pythonnut-on-???
==10568== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10568-by-pythonnut-on-???
==10568==
==10568== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10568== don't want to do, unless you know exactly what you're doing,
==10568== or are doing some strange experiment):
==10568== /usr/lib/valgrind/../../bin/vgdb --pid=10568 ...command...
==10568==
==10568== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10568== /path/to/gdb ./zsh
==10568== and then give GDB the following command
==10568== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10568
==10568== --pid is optional if only one valgrind process is running
==10568==
==10565== Searching for pointers to 69,019 not-freed blocks
--10565-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10565-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10565-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10565-- Scanning root segment: 0x4037000..0x403afff (16384)
--10565-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10565-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10565-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10565-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10565-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10565-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10565-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10565-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10565-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10565-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10565-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10565-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10565-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10565-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567-- Caught __NR_exit; running __libc_freeres()
--10565-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10565-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10565-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10565-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10565-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10565-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10565-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10565-- Scanning root segment: 0x701a000..0x701afff (4096)
--10565-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10565-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10565-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10565-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10565-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10565-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10565-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10565-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10565-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10565-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10567== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10567-by-pythonnut-on-???
==10567== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10567-by-pythonnut-on-???
==10567== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10567-by-pythonnut-on-???
==10567==
==10567== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10567== don't want to do, unless you know exactly what you're doing,
==10567== or are doing some strange experiment):
==10567== /usr/lib/valgrind/../../bin/vgdb --pid=10567 ...command...
==10567==
==10567== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10567== /path/to/gdb ./zsh
==10567== and then give GDB the following command
==10567== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10567
==10567== --pid is optional if only one valgrind process is running
==10567==
--10570-- Caught __NR_exit; running __libc_freeres()
--10567-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10570-by-pythonnut-on-???
==10570== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10570-by-pythonnut-on-???
==10570== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10570-by-pythonnut-on-???
==10570==
==10570== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10570== don't want to do, unless you know exactly what you're doing,
==10570== or are doing some strange experiment):
==10570== /usr/lib/valgrind/../../bin/vgdb --pid=10570 ...command...
==10570==
==10570== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10570== /path/to/gdb ./zsh
==10570== and then give GDB the following command
==10570== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10570
==10570== --pid is optional if only one valgrind process is running
==10570==
==10567==
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
==10567== HEAP SUMMARY:
==10567== in use at exit: 3,135,462 bytes in 69,472 blocks
==10567== total heap usage: 1,597,317 allocs, 1,527,845 frees, 129,034,519 bytes allocated
==10567==
--10570-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570==
==10570== HEAP SUMMARY:
==10570== in use at exit: 3,124,237 bytes in 69,166 blocks
==10570== total heap usage: 1,603,713 allocs, 1,534,547 frees, 129,728,569 bytes allocated
==10570==
==10567== Searching for pointers to 69,472 not-freed blocks
--10567-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10567-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10567-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10567-- Scanning root segment: 0x4037000..0x403afff (16384)
--10567-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10567-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10567-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10567-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10567-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10567-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10567-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10567-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10567-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10567-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10567-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10567-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10567-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10567-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10567-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10567-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10567-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10567-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10567-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10567-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10567-- Scanning root segment: 0x701a000..0x701afff (4096)
--10567-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10567-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10567-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10567-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10567-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10567-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10567-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10567-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10567-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10567-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10570== Searching for pointers to 69,166 not-freed blocks
--10570-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10570-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10570-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10570-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10570-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10570-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10570-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10570-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10570-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10570-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10570-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10570-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10570-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10570-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10570-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10570-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10570-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10570-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10570-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10570-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10570-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10570-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10570-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10570-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10570-- Scanning root segment: 0x701a000..0x701afff (4096)
--10570-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10570-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10570-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10570-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10570-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10570-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10570-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10570-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10570-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10570-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10565== Checked 4,790,880 bytes
==10565==
==10565== LEAK SUMMARY:
==10565== definitely lost: 2,205 bytes in 14 blocks
==10565== indirectly lost: 6,756 bytes in 7 blocks
==10565== possibly lost: 0 bytes in 0 blocks
==10565== still reachable: 3,106,679 bytes in 68,998 blocks
==10565== suppressed: 0 bytes in 0 blocks
==10565== Rerun with --leak-check=full to see details of leaked memory
==10565==
==10565== Use --track-origins=yes to see where uninitialised values come from
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565==
==10565== 1 errors in context 1 of 2:
==10565== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10565== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10565== by 0x488CD0: stringsubst (subst.c:301)
==10565== by 0x48801B: prefork (subst.c:77)
==10565== by 0x42B318: execcmd (exec.c:2619)
==10565== by 0x428CA0: execpline2 (exec.c:1697)
==10565== by 0x427FD2: execpline (exec.c:1484)
==10565== by 0x427756: execlist (exec.c:1267)
==10565== by 0x42717C: execode (exec.c:1073)
==10565== by 0x431299: runshfunc (exec.c:5040)
==10565== by 0x430E76: doshfunc (exec.c:4920)
==10565== by 0x4302FB: execshfunc (exec.c:4557)
==10565== by 0x42D8C1: execcmd (exec.c:3373)
==10565==
==10565==
==10565== 2 errors in context 2 of 2:
==10565== Conditional jump or move depends on uninitialised value(s)
==10565== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10565== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10565== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10565== by 0x40EFC2: execbuiltin (builtin.c:450)
==10565== by 0x42D8E9: execcmd (exec.c:3378)
==10565== by 0x428CA0: execpline2 (exec.c:1697)
==10565== by 0x427FD2: execpline (exec.c:1484)
==10565== by 0x42779A: execlist (exec.c:1275)
==10565== by 0x42717C: execode (exec.c:1073)
==10565== by 0x431299: runshfunc (exec.c:5040)
==10565== by 0x430E76: doshfunc (exec.c:4920)
==10565== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10565==
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10572-by-pythonnut-on-???
==10572== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10572-by-pythonnut-on-???
==10572== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10572-by-pythonnut-on-???
==10572==
==10572== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10572== don't want to do, unless you know exactly what you're doing,
==10572== or are doing some strange experiment):
==10572== /usr/lib/valgrind/../../bin/vgdb --pid=10572 ...command...
==10572==
==10572== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10572== /path/to/gdb ./zsh
==10572== and then give GDB the following command
==10572== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10572
==10572== --pid is optional if only one valgrind process is running
==10572==
--10572-- Caught __NR_exit; running __libc_freeres()
--10572-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10567== Checked 4,820,120 bytes
==10567==
==10572==
==10572== HEAP SUMMARY:
==10572== in use at exit: 3,115,639 bytes in 69,019 blocks
==10572== total heap usage: 1,603,391 allocs, 1,534,372 frees, 129,811,601 bytes allocated
==10572==
==10570== Checked 4,785,672 bytes
==10570==
==10567== LEAK SUMMARY:
==10567== definitely lost: 2,221 bytes in 14 blocks
==10567== indirectly lost: 6,796 bytes in 9 blocks
==10567== possibly lost: 0 bytes in 0 blocks
==10567== still reachable: 3,126,445 bytes in 69,449 blocks
==10567== suppressed: 0 bytes in 0 blocks
==10567== Rerun with --leak-check=full to see details of leaked memory
==10567==
==10567== Use --track-origins=yes to see where uninitialised values come from
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10567==
==10567== 1 errors in context 1 of 2:
==10567== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10567== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10567== by 0x488CD0: stringsubst (subst.c:301)
==10567== by 0x48801B: prefork (subst.c:77)
==10567== by 0x42B318: execcmd (exec.c:2619)
==10567== by 0x428CA0: execpline2 (exec.c:1697)
==10567== by 0x427FD2: execpline (exec.c:1484)
==10567== by 0x427756: execlist (exec.c:1267)
==10567== by 0x42717C: execode (exec.c:1073)
==10567== by 0x431299: runshfunc (exec.c:5040)
==10567== by 0x430E76: doshfunc (exec.c:4920)
==10567== by 0x4302FB: execshfunc (exec.c:4557)
==10567== by 0x42D8C1: execcmd (exec.c:3373)
==10567==
==10567==
==10567== 2 errors in context 2 of 2:
==10567== Conditional jump or move depends on uninitialised value(s)
==10567== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10567== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10567== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10567== by 0x40EFC2: execbuiltin (builtin.c:450)
==10567== by 0x42D8E9: execcmd (exec.c:3378)
==10567== by 0x428CA0: execpline2 (exec.c:1697)
==10567== by 0x427FD2: execpline (exec.c:1484)
==10567== by 0x42779A: execlist (exec.c:1275)
==10567== by 0x42717C: execode (exec.c:1073)
==10567== by 0x431299: runshfunc (exec.c:5040)
==10567== by 0x430E76: doshfunc (exec.c:4920)
==10567== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10567==
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== Searching for pointers to 69,019 not-freed blocks
--10572-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10572-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10572-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10572-- Scanning root segment: 0x4037000..0x403afff (16384)
--10572-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10572-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10572-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10572-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10572-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10572-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10572-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10572-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10572-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10572-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10572-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10572-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10572-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10572-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10572-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10572-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10572-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10572-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10572-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10572-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10572-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10572-- Scanning root segment: 0x701a000..0x701afff (4096)
--10572-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==10570== LEAK SUMMARY:
--10572-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
==10570== definitely lost: 2,205 bytes in 14 blocks
==10570== indirectly lost: 6,756 bytes in 7 blocks
==10570== possibly lost: 0 bytes in 0 blocks
==10570== still reachable: 3,115,276 bytes in 69,145 blocks
--10572-- Scanning root segment: 0xae51000..0xae52fff (8192)
==10570== suppressed: 0 bytes in 0 blocks
==10570== Rerun with --leak-check=full to see details of leaked memory
==10570==
==10570== Use --track-origins=yes to see where uninitialised values come from
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10570==
==10570== 1 errors in context 1 of 2:
==10570== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--10572-- Scanning root segment: 0xb054000..0xb054fff (4096)
==10570== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10570== by 0x488CD0: stringsubst (subst.c:301)
==10570== by 0x48801B: prefork (subst.c:77)
==10570== by 0x42B318: execcmd (exec.c:2619)
--10572-- Scanning root segment: 0xb268000..0xb268fff (4096)
==10570== by 0x428CA0: execpline2 (exec.c:1697)
==10570== by 0x427FD2: execpline (exec.c:1484)
==10570== by 0x427756: execlist (exec.c:1267)
==10570== by 0x42717C: execode (exec.c:1073)
==10570== by 0x431299: runshfunc (exec.c:5040)
==10570== by 0x430E76: doshfunc (exec.c:4920)
==10570== by 0x4302FB: execshfunc (exec.c:4557)
--10572-- Scanning root segment: 0xb46a000..0xb46afff (4096)
==10570== by 0x42D8C1: execcmd (exec.c:3373)
==10570==
==10570==
==10570== 2 errors in context 2 of 2:
==10570== Conditional jump or move depends on uninitialised value(s)
==10570== at 0x65A79E7: execzlefunc (zle_main.c:1360)
--10572-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
==10570== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10570== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10570== by 0x40EFC2: execbuiltin (builtin.c:450)
==10570== by 0x42D8E9: execcmd (exec.c:3378)
==10570== by 0x428CA0: execpline2 (exec.c:1697)
==10570== by 0x427FD2: execpline (exec.c:1484)
--10572-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
==10570== by 0x42779A: execlist (exec.c:1275)
==10570== by 0x42717C: execode (exec.c:1073)
==10570== by 0x431299: runshfunc (exec.c:5040)
==10570== by 0x430E76: doshfunc (exec.c:4920)
==10570== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10570==
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10572-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10572-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10569-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFE8F5C, len 4
==10569== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10569-by-pythonnut-on-???
==10569== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10569-by-pythonnut-on-???
==10569== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10569-by-pythonnut-on-???
==10569==
==10569== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10569== don't want to do, unless you know exactly what you're doing,
==10569== or are doing some strange experiment):
==10569== /usr/lib/valgrind/../../bin/vgdb --pid=10569 ...command...
==10569==
==10569== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10569== /path/to/gdb ./zsh
==10569== and then give GDB the following command
==10569== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10569
==10569== --pid is optional if only one valgrind process is running
==10569==
--10569-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10569==
==10569== HEAP SUMMARY:
==10569== in use at exit: 3,124,173 bytes in 69,163 blocks
==10569== total heap usage: 1,603,711 allocs, 1,534,548 frees, 129,728,328 bytes allocated
==10569==
==10569== Searching for pointers to 69,163 not-freed blocks
--10569-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10569-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10569-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10569-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10569-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10569-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10569-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10569-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10569-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10569-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10569-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10569-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10569-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10569-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10569-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10569-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10569-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10569-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10569-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10569-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10569-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10569-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10569-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10569-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10569-- Scanning root segment: 0x701a000..0x701afff (4096)
--10569-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10569-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10569-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10569-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10569-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10569-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10569-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10569-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10569-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10569-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10572== Checked 4,790,880 bytes
==10572==
==10572== LEAK SUMMARY:
==10572== definitely lost: 2,205 bytes in 14 blocks
==10572== indirectly lost: 6,756 bytes in 7 blocks
==10572== possibly lost: 0 bytes in 0 blocks
==10572== still reachable: 3,106,678 bytes in 68,998 blocks
==10572== suppressed: 0 bytes in 0 blocks
==10572== Rerun with --leak-check=full to see details of leaked memory
==10572==
==10572== Use --track-origins=yes to see where uninitialised values come from
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572==
==10572== 1 errors in context 1 of 2:
==10572== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10572== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10572== by 0x488CD0: stringsubst (subst.c:301)
==10572== by 0x48801B: prefork (subst.c:77)
==10572== by 0x42B318: execcmd (exec.c:2619)
==10572== by 0x428CA0: execpline2 (exec.c:1697)
==10572== by 0x427FD2: execpline (exec.c:1484)
==10572== by 0x427756: execlist (exec.c:1267)
==10572== by 0x42717C: execode (exec.c:1073)
==10572== by 0x431299: runshfunc (exec.c:5040)
==10572== by 0x430E76: doshfunc (exec.c:4920)
==10572== by 0x4302FB: execshfunc (exec.c:4557)
==10572== by 0x42D8C1: execcmd (exec.c:3373)
==10572==
==10572==
==10572== 2 errors in context 2 of 2:
==10572== Conditional jump or move depends on uninitialised value(s)
==10572== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10572== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10572== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10572== by 0x40EFC2: execbuiltin (builtin.c:450)
==10572== by 0x42D8E9: execcmd (exec.c:3378)
==10572== by 0x428CA0: execpline2 (exec.c:1697)
==10572== by 0x427FD2: execpline (exec.c:1484)
==10572== by 0x42779A: execlist (exec.c:1275)
==10572== by 0x42717C: execode (exec.c:1073)
==10572== by 0x431299: runshfunc (exec.c:5040)
==10572== by 0x430E76: doshfunc (exec.c:4920)
==10572== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10572==
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10621-by-pythonnut-on-???
==10621== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10621-by-pythonnut-on-???
==10621== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10621-by-pythonnut-on-???
==10621==
==10621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10621== don't want to do, unless you know exactly what you're doing,
==10621== or are doing some strange experiment):
==10621== /usr/lib/valgrind/../../bin/vgdb --pid=10621 ...command...
==10621==
==10621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10621== /path/to/gdb ./zsh
==10621== and then give GDB the following command
==10621== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10621
==10621== --pid is optional if only one valgrind process is running
==10621==
--10621-- Caught __NR_exit; running __libc_freeres()
--10573-- Caught __NR_exit; running __libc_freeres()
==10573== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10573-by-pythonnut-on-???
==10573== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10573-by-pythonnut-on-???
==10573== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10573-by-pythonnut-on-???
==10573==
==10573== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10573== don't want to do, unless you know exactly what you're doing,
==10573== or are doing some strange experiment):
==10573== /usr/lib/valgrind/../../bin/vgdb --pid=10573 ...command...
==10573==
==10573== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10573== /path/to/gdb ./zsh
==10573== and then give GDB the following command
==10573== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10573
==10573== --pid is optional if only one valgrind process is running
==10573==
==10569== Checked 4,784,992 bytes
==10569==
--10621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621==
--10573-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621== HEAP SUMMARY:
==10621== in use at exit: 3,115,638 bytes in 69,019 blocks
==10621== total heap usage: 1,603,396 allocs, 1,534,377 frees, 129,813,714 bytes allocated
==10621==
==10573==
==10573== HEAP SUMMARY:
==10573== in use at exit: 3,135,707 bytes in 69,477 blocks
==10573== total heap usage: 1,597,329 allocs, 1,527,852 frees, 129,038,420 bytes allocated
==10573==
==10569== LEAK SUMMARY:
==10569== definitely lost: 2,205 bytes in 14 blocks
==10569== indirectly lost: 6,756 bytes in 7 blocks
==10569== possibly lost: 0 bytes in 0 blocks
==10569== still reachable: 3,115,212 bytes in 69,142 blocks
==10569== suppressed: 0 bytes in 0 blocks
==10569== Rerun with --leak-check=full to see details of leaked memory
==10569==
==10569== Use --track-origins=yes to see where uninitialised values come from
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10569==
==10569== 1 errors in context 1 of 2:
==10569== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10569== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10569== by 0x488CD0: stringsubst (subst.c:301)
==10569== by 0x48801B: prefork (subst.c:77)
==10569== by 0x42B318: execcmd (exec.c:2619)
==10569== by 0x428CA0: execpline2 (exec.c:1697)
==10569== by 0x427FD2: execpline (exec.c:1484)
==10569== by 0x427756: execlist (exec.c:1267)
==10569== by 0x42717C: execode (exec.c:1073)
==10569== by 0x431299: runshfunc (exec.c:5040)
==10569== by 0x430E76: doshfunc (exec.c:4920)
==10569== by 0x4302FB: execshfunc (exec.c:4557)
==10569== by 0x42D8C1: execcmd (exec.c:3373)
==10569==
==10569==
==10569== 2 errors in context 2 of 2:
==10569== Conditional jump or move depends on uninitialised value(s)
==10569== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10569== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10569== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10569== by 0x40EFC2: execbuiltin (builtin.c:450)
==10569== by 0x42D8E9: execcmd (exec.c:3378)
==10569== by 0x428CA0: execpline2 (exec.c:1697)
==10569== by 0x427FD2: execpline (exec.c:1484)
==10569== by 0x42779A: execlist (exec.c:1275)
==10569== by 0x42717C: execode (exec.c:1073)
==10569== by 0x431299: runshfunc (exec.c:5040)
==10569== by 0x430E76: doshfunc (exec.c:4920)
==10569== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10569==
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== Searching for pointers to 69,019 not-freed blocks
--10621-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10621-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10621-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10621-- Scanning root segment: 0x4037000..0x403afff (16384)
--10621-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10621-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10621-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10621-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10621-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10621-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10621-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10621-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10621-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10621-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10621-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10621-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10621-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10621-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10621-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10621-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10621-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10621-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10621-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10621-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10621-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10621-- Scanning root segment: 0x701a000..0x701afff (4096)
--10621-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10621-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10621-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10621-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10621-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10621-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10621-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10621-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10621-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10621-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10622-- Caught __NR_exit; running __libc_freeres()
==10573== Searching for pointers to 69,477 not-freed blocks
--10573-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10573-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10573-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10573-- Scanning root segment: 0x4037000..0x403efff (32768)
--10573-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10573-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10573-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10573-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10573-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10573-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10573-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10573-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10573-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10573-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10573-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10573-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10573-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10573-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10573-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10573-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10573-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10573-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10573-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10573-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10573-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10573-- Scanning root segment: 0x701a000..0x701afff (4096)
--10573-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10573-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10573-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10573-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10573-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10573-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10573-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10573-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10573-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10573-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10622== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10622-by-pythonnut-on-???
==10622== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10622-by-pythonnut-on-???
==10622== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10622-by-pythonnut-on-???
==10622==
==10622== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10622== don't want to do, unless you know exactly what you're doing,
==10622== or are doing some strange experiment):
==10622== /usr/lib/valgrind/../../bin/vgdb --pid=10622 ...command...
==10622==
==10622== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10622== /path/to/gdb ./zsh
==10622== and then give GDB the following command
==10622== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10622
==10622== --pid is optional if only one valgrind process is running
==10622==
--10622-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622==
==10622== HEAP SUMMARY:
==10622== in use at exit: 3,124,180 bytes in 69,163 blocks
==10622== total heap usage: 1,603,726 allocs, 1,534,563 frees, 129,733,326 bytes allocated
==10622==
==10622== Searching for pointers to 69,163 not-freed blocks
--10622-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10622-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10622-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10622-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10622-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10622-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10622-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10622-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10622-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10622-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10622-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10622-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10622-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10622-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10622-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10622-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10622-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10622-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10622-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10622-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10622-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10622-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10622-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10622-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10622-- Scanning root segment: 0x701a000..0x701afff (4096)
--10622-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10622-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10622-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10622-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10622-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10622-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10622-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10622-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10622-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10622-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10621== Checked 4,790,880 bytes
==10621==
==10573== Checked 4,836,472 bytes
==10573==
==10621== LEAK SUMMARY:
==10621== definitely lost: 2,205 bytes in 14 blocks
==10621== indirectly lost: 6,756 bytes in 7 blocks
==10621== possibly lost: 0 bytes in 0 blocks
==10621== still reachable: 3,106,677 bytes in 68,998 blocks
==10621== suppressed: 0 bytes in 0 blocks
==10621== Rerun with --leak-check=full to see details of leaked memory
==10621==
==10621== Use --track-origins=yes to see where uninitialised values come from
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621==
==10621== 1 errors in context 1 of 2:
==10621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10621== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10621== by 0x488CD0: stringsubst (subst.c:301)
==10621== by 0x48801B: prefork (subst.c:77)
==10621== by 0x42B318: execcmd (exec.c:2619)
==10621== by 0x428CA0: execpline2 (exec.c:1697)
==10621== by 0x427FD2: execpline (exec.c:1484)
==10621== by 0x427756: execlist (exec.c:1267)
==10621== by 0x42717C: execode (exec.c:1073)
==10621== by 0x431299: runshfunc (exec.c:5040)
==10621== by 0x430E76: doshfunc (exec.c:4920)
==10621== by 0x4302FB: execshfunc (exec.c:4557)
==10621== by 0x42D8C1: execcmd (exec.c:3373)
==10621==
==10621==
==10621== 2 errors in context 2 of 2:
==10621== Conditional jump or move depends on uninitialised value(s)
==10621== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10621== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10621== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10621== by 0x40EFC2: execbuiltin (builtin.c:450)
==10621== by 0x42D8E9: execcmd (exec.c:3378)
==10621== by 0x428CA0: execpline2 (exec.c:1697)
==10621== by 0x427FD2: execpline (exec.c:1484)
==10621== by 0x42779A: execlist (exec.c:1275)
==10621== by 0x42717C: execode (exec.c:1073)
==10621== by 0x431299: runshfunc (exec.c:5040)
==10621== by 0x430E76: doshfunc (exec.c:4920)
==10621== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10621==
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573== LEAK SUMMARY:
==10573== definitely lost: 2,221 bytes in 14 blocks
==10573== indirectly lost: 6,796 bytes in 9 blocks
==10573== possibly lost: 0 bytes in 0 blocks
==10573== still reachable: 3,126,690 bytes in 69,454 blocks
==10573== suppressed: 0 bytes in 0 blocks
==10573== Rerun with --leak-check=full to see details of leaked memory
==10573==
==10573== Use --track-origins=yes to see where uninitialised values come from
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573==
==10573== 1 errors in context 1 of 2:
==10573== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10573== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10573== by 0x488CD0: stringsubst (subst.c:301)
==10573== by 0x48801B: prefork (subst.c:77)
==10573== by 0x42B318: execcmd (exec.c:2619)
==10573== by 0x428CA0: execpline2 (exec.c:1697)
==10573== by 0x427FD2: execpline (exec.c:1484)
==10573== by 0x427756: execlist (exec.c:1267)
==10573== by 0x42717C: execode (exec.c:1073)
==10573== by 0x431299: runshfunc (exec.c:5040)
==10573== by 0x430E76: doshfunc (exec.c:4920)
==10573== by 0x4302FB: execshfunc (exec.c:4557)
==10573== by 0x42D8C1: execcmd (exec.c:3373)
==10573==
==10573==
==10573== 2 errors in context 2 of 2:
==10573== Conditional jump or move depends on uninitialised value(s)
==10573== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10573== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10573== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10573== by 0x40EFC2: execbuiltin (builtin.c:450)
==10573== by 0x42D8E9: execcmd (exec.c:3378)
==10573== by 0x428CA0: execpline2 (exec.c:1697)
==10573== by 0x427FD2: execpline (exec.c:1484)
==10573== by 0x42779A: execlist (exec.c:1275)
==10573== by 0x42717C: execode (exec.c:1073)
==10573== by 0x431299: runshfunc (exec.c:5040)
==10573== by 0x430E76: doshfunc (exec.c:4920)
==10573== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10573==
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10623-by-pythonnut-on-???
==10623== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10623-by-pythonnut-on-???
==10623== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10623-by-pythonnut-on-???
==10623==
==10623== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10623== don't want to do, unless you know exactly what you're doing,
==10623== or are doing some strange experiment):
==10623== /usr/lib/valgrind/../../bin/vgdb --pid=10623 ...command...
==10623==
==10623== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10623== /path/to/gdb ./zsh
==10623== and then give GDB the following command
==10623== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10623
==10623== --pid is optional if only one valgrind process is running
==10623==
--10623-- Caught __NR_exit; running __libc_freeres()
--10566-- Caught __NR_exit; running __libc_freeres()
--10623-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10566-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622== Checked 4,785,128 bytes
==10622==
==10623==
==10566==
==10623== HEAP SUMMARY:
==10623== in use at exit: 3,115,637 bytes in 69,019 blocks
==10623== total heap usage: 1,603,404 allocs, 1,534,385 frees, 129,817,367 bytes allocated
==10623==
==10566== HEAP SUMMARY:
==10566== in use at exit: 3,133,543 bytes in 69,402 blocks
==10566== total heap usage: 1,597,280 allocs, 1,527,878 frees, 129,039,031 bytes allocated
==10566==
==10622== LEAK SUMMARY:
==10622== definitely lost: 2,205 bytes in 14 blocks
==10622== indirectly lost: 6,756 bytes in 7 blocks
==10622== possibly lost: 0 bytes in 0 blocks
==10622== still reachable: 3,115,219 bytes in 69,142 blocks
==10622== suppressed: 0 bytes in 0 blocks
==10622== Rerun with --leak-check=full to see details of leaked memory
==10622==
==10622== Use --track-origins=yes to see where uninitialised values come from
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10622==
==10622== 1 errors in context 1 of 2:
==10622== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10622== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10622== by 0x488CD0: stringsubst (subst.c:301)
==10622== by 0x48801B: prefork (subst.c:77)
==10622== by 0x42B318: execcmd (exec.c:2619)
==10622== by 0x428CA0: execpline2 (exec.c:1697)
==10622== by 0x427FD2: execpline (exec.c:1484)
==10622== by 0x427756: execlist (exec.c:1267)
==10622== by 0x42717C: execode (exec.c:1073)
==10622== by 0x431299: runshfunc (exec.c:5040)
==10622== by 0x430E76: doshfunc (exec.c:4920)
==10622== by 0x4302FB: execshfunc (exec.c:4557)
==10622== by 0x42D8C1: execcmd (exec.c:3373)
==10622==
==10622==
==10622== 2 errors in context 2 of 2:
==10622== Conditional jump or move depends on uninitialised value(s)
==10622== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10622== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10622== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10622== by 0x40EFC2: execbuiltin (builtin.c:450)
==10622== by 0x42D8E9: execcmd (exec.c:3378)
==10622== by 0x428CA0: execpline2 (exec.c:1697)
==10622== by 0x427FD2: execpline (exec.c:1484)
==10622== by 0x42779A: execlist (exec.c:1275)
==10622== by 0x42717C: execode (exec.c:1073)
==10622== by 0x431299: runshfunc (exec.c:5040)
==10622== by 0x430E76: doshfunc (exec.c:4920)
==10622== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10622==
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== Searching for pointers to 69,019 not-freed blocks
--10623-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10623-- Scanning root segment: 0x4037000..0x403afff (16384)
--10623-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10623-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10623-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10623-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10623-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10623-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10623-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10623-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10623-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10623-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10623-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10623-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10623-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10623-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10566== Searching for pointers to 69,402 not-freed blocks
--10566-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10623-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10623-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10623-- Scanning root segment: 0x701a000..0x701afff (4096)
--10566-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10623-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10623-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566-- Scanning root segment: 0x4037000..0x403afff (16384)
--10623-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10566-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10623-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10566-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10623-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10566-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10623-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10566-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10566-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10566-- Scanning root segment: 0x54ac000..0x54acfff (4096)
==10624== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10624-by-pythonnut-on-???
--10566-- Scanning root segment: 0x54ad000..0x54adfff (4096)
==10624== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10624-by-pythonnut-on-???
--10623-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
==10624== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10624-by-pythonnut-on-???
==10624==
==10624== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10624== don't want to do, unless you know exactly what you're doing,
==10624== or are doing some strange experiment):
==10624== /usr/lib/valgrind/../../bin/vgdb --pid=10624 ...command...
==10624==
--10566-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
==10624== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10624== /path/to/gdb ./zsh
==10624== and then give GDB the following command
==10624== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10624
==10624== --pid is optional if only one valgrind process is running
==10624==
--10566-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10566-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10566-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10566-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10566-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10566-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10566-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10566-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10566-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10566-- Scanning root segment: 0x701a000..0x701afff (4096)
--10566-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10566-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10566-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10566-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10566-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10566-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10624-- Caught __NR_exit; running __libc_freeres()
--10624-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10624==
==10624== HEAP SUMMARY:
==10624== in use at exit: 3,124,276 bytes in 69,163 blocks
==10624== total heap usage: 1,603,742 allocs, 1,534,579 frees, 129,738,113 bytes allocated
==10624==
==10624== Searching for pointers to 69,163 not-freed blocks
--10624-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10624-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10624-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10624-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10624-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10624-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10624-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10624-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10624-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10624-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10624-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10624-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10624-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10624-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10624-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10624-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10624-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10624-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10624-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10624-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10624-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10624-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10624-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10624-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10624-- Scanning root segment: 0x701a000..0x701afff (4096)
--10624-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10624-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10624-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10624-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10624-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10624-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10624-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10624-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10624-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10624-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10623== Checked 4,790,880 bytes
==10623==
==10566== Checked 4,816,400 bytes
==10566==
==10623== LEAK SUMMARY:
==10623== definitely lost: 2,205 bytes in 14 blocks
==10623== indirectly lost: 6,756 bytes in 7 blocks
==10623== possibly lost: 0 bytes in 0 blocks
==10623== still reachable: 3,106,676 bytes in 68,998 blocks
==10623== suppressed: 0 bytes in 0 blocks
==10623== Rerun with --leak-check=full to see details of leaked memory
==10623==
==10623== Use --track-origins=yes to see where uninitialised values come from
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623==
==10623== 1 errors in context 1 of 2:
==10623== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10623== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10623== by 0x488CD0: stringsubst (subst.c:301)
==10623== by 0x48801B: prefork (subst.c:77)
==10623== by 0x42B318: execcmd (exec.c:2619)
==10623== by 0x428CA0: execpline2 (exec.c:1697)
==10623== by 0x427FD2: execpline (exec.c:1484)
==10623== by 0x427756: execlist (exec.c:1267)
==10623== by 0x42717C: execode (exec.c:1073)
==10623== by 0x431299: runshfunc (exec.c:5040)
==10623== by 0x430E76: doshfunc (exec.c:4920)
==10623== by 0x4302FB: execshfunc (exec.c:4557)
==10623== by 0x42D8C1: execcmd (exec.c:3373)
==10623==
==10623==
==10623== 2 errors in context 2 of 2:
==10623== Conditional jump or move depends on uninitialised value(s)
==10623== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10623== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10623== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10623== by 0x40EFC2: execbuiltin (builtin.c:450)
==10623== by 0x42D8E9: execcmd (exec.c:3378)
==10623== by 0x428CA0: execpline2 (exec.c:1697)
==10623== by 0x427FD2: execpline (exec.c:1484)
==10623== by 0x42779A: execlist (exec.c:1275)
==10623== by 0x42717C: execode (exec.c:1073)
==10623== by 0x431299: runshfunc (exec.c:5040)
==10623== by 0x430E76: doshfunc (exec.c:4920)
==10623== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10623==
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566== LEAK SUMMARY:
==10566== definitely lost: 2,221 bytes in 14 blocks
==10566== indirectly lost: 6,796 bytes in 9 blocks
==10566== possibly lost: 0 bytes in 0 blocks
==10566== still reachable: 3,124,526 bytes in 69,379 blocks
==10566== suppressed: 0 bytes in 0 blocks
==10566== Rerun with --leak-check=full to see details of leaked memory
==10566==
==10566== Use --track-origins=yes to see where uninitialised values come from
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566==
==10566== 1 errors in context 1 of 2:
==10566== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10566== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10566== by 0x488CD0: stringsubst (subst.c:301)
==10566== by 0x48801B: prefork (subst.c:77)
==10566== by 0x42B318: execcmd (exec.c:2619)
==10566== by 0x428CA0: execpline2 (exec.c:1697)
==10566== by 0x427FD2: execpline (exec.c:1484)
==10566== by 0x427756: execlist (exec.c:1267)
==10566== by 0x42717C: execode (exec.c:1073)
==10566== by 0x431299: runshfunc (exec.c:5040)
==10566== by 0x430E76: doshfunc (exec.c:4920)
==10566== by 0x4302FB: execshfunc (exec.c:4557)
==10566== by 0x42D8C1: execcmd (exec.c:3373)
==10566==
==10566==
==10566== 2 errors in context 2 of 2:
==10566== Conditional jump or move depends on uninitialised value(s)
==10566== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10566== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10566== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10566== by 0x40EFC2: execbuiltin (builtin.c:450)
==10566== by 0x42D8E9: execcmd (exec.c:3378)
==10566== by 0x428CA0: execpline2 (exec.c:1697)
==10566== by 0x427FD2: execpline (exec.c:1484)
==10566== by 0x42779A: execlist (exec.c:1275)
==10566== by 0x42717C: execode (exec.c:1073)
==10566== by 0x431299: runshfunc (exec.c:5040)
==10566== by 0x430E76: doshfunc (exec.c:4920)
==10566== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10566==
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10627-by-pythonnut-on-???
==10627== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10627-by-pythonnut-on-???
==10627== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10627-by-pythonnut-on-???
==10627==
==10627== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10627== don't want to do, unless you know exactly what you're doing,
==10627== or are doing some strange experiment):
==10627== /usr/lib/valgrind/../../bin/vgdb --pid=10627 ...command...
==10627==
==10627== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10627== /path/to/gdb ./zsh
==10627== and then give GDB the following command
==10627== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10627
==10627== --pid is optional if only one valgrind process is running
==10627==
--10627-- Caught __NR_exit; running __libc_freeres()
--10412-- Caught __NR_exit; running __libc_freeres()
--10627-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627==
--10412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== HEAP SUMMARY:
==10627== in use at exit: 3,115,640 bytes in 69,019 blocks
==10627== total heap usage: 1,603,406 allocs, 1,534,387 frees, 129,817,944 bytes allocated
==10627==
==10624== Checked 4,784,408 bytes
==10624==
==10412==
==10412== HEAP SUMMARY:
==10412== in use at exit: 3,131,300 bytes in 69,329 blocks
==10412== total heap usage: 1,597,264 allocs, 1,527,935 frees, 129,035,320 bytes allocated
==10412==
==10624== LEAK SUMMARY:
==10624== definitely lost: 2,205 bytes in 14 blocks
==10624== indirectly lost: 6,756 bytes in 7 blocks
==10624== possibly lost: 0 bytes in 0 blocks
==10624== still reachable: 3,115,315 bytes in 69,142 blocks
==10624== suppressed: 0 bytes in 0 blocks
==10624== Rerun with --leak-check=full to see details of leaked memory
==10624==
==10624== Use --track-origins=yes to see where uninitialised values come from
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10624==
==10624== 1 errors in context 1 of 2:
==10624== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10624== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10624== by 0x488CD0: stringsubst (subst.c:301)
==10624== by 0x48801B: prefork (subst.c:77)
==10624== by 0x42B318: execcmd (exec.c:2619)
==10624== by 0x428CA0: execpline2 (exec.c:1697)
==10624== by 0x427FD2: execpline (exec.c:1484)
==10624== by 0x427756: execlist (exec.c:1267)
==10624== by 0x42717C: execode (exec.c:1073)
==10624== by 0x431299: runshfunc (exec.c:5040)
==10624== by 0x430E76: doshfunc (exec.c:4920)
==10624== by 0x4302FB: execshfunc (exec.c:4557)
==10624== by 0x42D8C1: execcmd (exec.c:3373)
==10624==
==10624==
==10624== 2 errors in context 2 of 2:
==10624== Conditional jump or move depends on uninitialised value(s)
==10624== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10624== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10624== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10624== by 0x40EFC2: execbuiltin (builtin.c:450)
==10624== by 0x42D8E9: execcmd (exec.c:3378)
==10624== by 0x428CA0: execpline2 (exec.c:1697)
==10624== by 0x427FD2: execpline (exec.c:1484)
==10624== by 0x42779A: execlist (exec.c:1275)
==10624== by 0x42717C: execode (exec.c:1073)
==10624== by 0x431299: runshfunc (exec.c:5040)
==10624== by 0x430E76: doshfunc (exec.c:4920)
==10624== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10624==
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== Searching for pointers to 69,019 not-freed blocks
--10627-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10627-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10627-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10627-- Scanning root segment: 0x4037000..0x403afff (16384)
--10627-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10627-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10627-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10627-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10627-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10627-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10627-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10627-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10627-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10627-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10627-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10627-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10627-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10627-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10627-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10627-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10627-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10627-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10627-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10627-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10627-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10627-- Scanning root segment: 0x701a000..0x701afff (4096)
--10627-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10627-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10627-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10627-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10627-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10627-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10627-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10627-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10627-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10627-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10412== Searching for pointers to 69,329 not-freed blocks
--10412-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10412-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10412-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10412-- Scanning root segment: 0x4037000..0x403afff (16384)
--10412-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10412-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10412-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10412-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10412-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10412-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10412-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10412-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10412-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10412-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10412-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10412-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10412-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10412-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10412-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10412-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10412-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10412-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10412-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10412-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10412-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10412-- Scanning root segment: 0x701a000..0x701afff (4096)
--10412-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10412-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10412-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10412-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10412-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10412-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10412-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10412-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10412-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10412-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFEC7DC, len 4
==10629== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10629-by-pythonnut-on-???
==10629== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10629-by-pythonnut-on-???
==10629== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10629-by-pythonnut-on-???
==10629==
==10629== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10629== don't want to do, unless you know exactly what you're doing,
==10629== or are doing some strange experiment):
==10629== /usr/lib/valgrind/../../bin/vgdb --pid=10629 ...command...
==10629==
==10629== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10629== /path/to/gdb ./zsh
==10629== and then give GDB the following command
==10629== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10629
==10629== --pid is optional if only one valgrind process is running
==10629==
--10629-- Caught __NR_exit; running __libc_freeres()
==10627== Checked 4,790,880 bytes
==10627==
==10412== Checked 4,813,760 bytes
==10412==
--10629-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== LEAK SUMMARY:
==10627== definitely lost: 2,205 bytes in 14 blocks
==10627== indirectly lost: 6,756 bytes in 7 blocks
==10627== possibly lost: 0 bytes in 0 blocks
==10627== still reachable: 3,106,679 bytes in 68,998 blocks
==10627== suppressed: 0 bytes in 0 blocks
==10627== Rerun with --leak-check=full to see details of leaked memory
==10627==
==10627== Use --track-origins=yes to see where uninitialised values come from
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627==
==10627== 1 errors in context 1 of 2:
==10627== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10627== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10627== by 0x488CD0: stringsubst (subst.c:301)
==10627== by 0x48801B: prefork (subst.c:77)
==10627== by 0x42B318: execcmd (exec.c:2619)
==10627== by 0x428CA0: execpline2 (exec.c:1697)
==10627== by 0x427FD2: execpline (exec.c:1484)
==10627== by 0x427756: execlist (exec.c:1267)
==10627== by 0x42717C: execode (exec.c:1073)
==10627== by 0x431299: runshfunc (exec.c:5040)
==10627== by 0x430E76: doshfunc (exec.c:4920)
==10627== by 0x4302FB: execshfunc (exec.c:4557)
==10627== by 0x42D8C1: execcmd (exec.c:3373)
==10627==
==10627==
==10627== 2 errors in context 2 of 2:
==10627== Conditional jump or move depends on uninitialised value(s)
==10627== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10627== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10627== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10627== by 0x40EFC2: execbuiltin (builtin.c:450)
==10627== by 0x42D8E9: execcmd (exec.c:3378)
==10627== by 0x428CA0: execpline2 (exec.c:1697)
==10627== by 0x427FD2: execpline (exec.c:1484)
==10627== by 0x42779A: execlist (exec.c:1275)
==10627== by 0x42717C: execode (exec.c:1073)
==10627== by 0x431299: runshfunc (exec.c:5040)
==10627== by 0x430E76: doshfunc (exec.c:4920)
==10627== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10627==
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629==
==10629== HEAP SUMMARY:
==10629== in use at exit: 3,124,550 bytes in 69,169 blocks
==10629== total heap usage: 1,604,267 allocs, 1,535,098 frees, 129,890,142 bytes allocated
==10629==
==10412== LEAK SUMMARY:
==10412== definitely lost: 2,221 bytes in 14 blocks
==10412== indirectly lost: 6,796 bytes in 9 blocks
==10412== possibly lost: 0 bytes in 0 blocks
==10412== still reachable: 3,122,283 bytes in 69,306 blocks
==10412== suppressed: 0 bytes in 0 blocks
==10412== Rerun with --leak-check=full to see details of leaked memory
==10412==
==10412== Use --track-origins=yes to see where uninitialised values come from
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10412==
==10412== 1 errors in context 1 of 2:
==10412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10412== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10412== by 0x488CD0: stringsubst (subst.c:301)
==10412== by 0x48801B: prefork (subst.c:77)
==10412== by 0x42B318: execcmd (exec.c:2619)
==10412== by 0x428CA0: execpline2 (exec.c:1697)
==10412== by 0x427FD2: execpline (exec.c:1484)
==10412== by 0x427756: execlist (exec.c:1267)
==10412== by 0x42717C: execode (exec.c:1073)
==10412== by 0x431299: runshfunc (exec.c:5040)
==10412== by 0x430E76: doshfunc (exec.c:4920)
==10412== by 0x4302FB: execshfunc (exec.c:4557)
==10412== by 0x42D8C1: execcmd (exec.c:3373)
==10412==
==10412==
==10412== 2 errors in context 2 of 2:
==10412== Conditional jump or move depends on uninitialised value(s)
==10412== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10412== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10412== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10412== by 0x40EFC2: execbuiltin (builtin.c:450)
==10412== by 0x42D8E9: execcmd (exec.c:3378)
==10412== by 0x428CA0: execpline2 (exec.c:1697)
==10412== by 0x427FD2: execpline (exec.c:1484)
==10412== by 0x42779A: execlist (exec.c:1275)
==10412== by 0x42717C: execode (exec.c:1073)
==10412== by 0x431299: runshfunc (exec.c:5040)
==10412== by 0x430E76: doshfunc (exec.c:4920)
==10412== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10412==
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10630-by-pythonnut-on-???
==10630== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10630-by-pythonnut-on-???
==10630== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10630-by-pythonnut-on-???
==10630==
==10630== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10630== don't want to do, unless you know exactly what you're doing,
==10630== or are doing some strange experiment):
==10630== /usr/lib/valgrind/../../bin/vgdb --pid=10630 ...command...
==10630==
==10630== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10630== /path/to/gdb ./zsh
==10630== and then give GDB the following command
==10630== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10630
==10630== --pid is optional if only one valgrind process is running
==10630==
==10629== Searching for pointers to 69,169 not-freed blocks
--10631-- Caught __NR_exit; running __libc_freeres()
--10629-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10629-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10629-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10629-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10629-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10629-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10629-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10629-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10629-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10629-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10629-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10629-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10629-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10629-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10629-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10629-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10629-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10629-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10629-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10629-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10629-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10629-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10629-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10629-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10629-- Scanning root segment: 0x701a000..0x701afff (4096)
--10629-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10629-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10629-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10629-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10629-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10629-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10629-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10629-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10629-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10629-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF1ADC, len 4
==10631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10631-by-pythonnut-on-???
==10631== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10631-by-pythonnut-on-???
==10631== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10631-by-pythonnut-on-???
==10631==
==10631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10631== don't want to do, unless you know exactly what you're doing,
==10631== or are doing some strange experiment):
==10631== /usr/lib/valgrind/../../bin/vgdb --pid=10631 ...command...
==10631==
==10631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10631== /path/to/gdb ./zsh
==10631== and then give GDB the following command
==10631== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10631
==10631== --pid is optional if only one valgrind process is running
==10631==
--10631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10631==
==10631== HEAP SUMMARY:
==10631== in use at exit: 3,115,922 bytes in 69,024 blocks
==10631== total heap usage: 1,603,412 allocs, 1,534,388 frees, 129,821,558 bytes allocated
==10631==
==10631== Searching for pointers to 69,024 not-freed blocks
--10631-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10631-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10631-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10631-- Scanning root segment: 0x4037000..0x403afff (16384)
--10631-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10631-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10631-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10631-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10631-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10631-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10631-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10631-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10631-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10631-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10631-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10631-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10631-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10631-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10631-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10631-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10631-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10631-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10631-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10631-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10631-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10631-- Scanning root segment: 0x701a000..0x701afff (4096)
--10631-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10631-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10631-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10631-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10631-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10631-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10631-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10631-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10631-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10631-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10629== Checked 4,784,616 bytes
==10629==
==10629== LEAK SUMMARY:
==10629== definitely lost: 2,205 bytes in 14 blocks
==10629== indirectly lost: 6,756 bytes in 7 blocks
==10629== possibly lost: 0 bytes in 0 blocks
==10629== still reachable: 3,115,589 bytes in 69,148 blocks
==10629== suppressed: 0 bytes in 0 blocks
==10629== Rerun with --leak-check=full to see details of leaked memory
==10629==
==10629== Use --track-origins=yes to see where uninitialised values come from
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629==
==10629== 1 errors in context 1 of 2:
==10629== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10629== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10629== by 0x488CD0: stringsubst (subst.c:301)
==10629== by 0x48801B: prefork (subst.c:77)
==10629== by 0x42B318: execcmd (exec.c:2619)
==10629== by 0x428CA0: execpline2 (exec.c:1697)
==10629== by 0x427FD2: execpline (exec.c:1484)
==10629== by 0x427756: execlist (exec.c:1267)
==10629== by 0x42717C: execode (exec.c:1073)
==10629== by 0x431299: runshfunc (exec.c:5040)
==10629== by 0x430E76: doshfunc (exec.c:4920)
==10629== by 0x4302FB: execshfunc (exec.c:4557)
==10629== by 0x42D8C1: execcmd (exec.c:3373)
==10629==
==10629==
==10629== 2 errors in context 2 of 2:
==10629== Conditional jump or move depends on uninitialised value(s)
==10629== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10629== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10629== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10629== by 0x40EFC2: execbuiltin (builtin.c:450)
==10629== by 0x42D8E9: execcmd (exec.c:3378)
==10629== by 0x428CA0: execpline2 (exec.c:1697)
==10629== by 0x427FD2: execpline (exec.c:1484)
==10629== by 0x42779A: execlist (exec.c:1275)
==10629== by 0x42717C: execode (exec.c:1073)
==10629== by 0x431299: runshfunc (exec.c:5040)
==10629== by 0x430E76: doshfunc (exec.c:4920)
==10629== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10629==
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10633-- Caught __NR_exit; running __libc_freeres()
==10633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10633-by-pythonnut-on-???
==10633== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10633-by-pythonnut-on-???
==10633== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10633-by-pythonnut-on-???
==10633==
==10633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10633== don't want to do, unless you know exactly what you're doing,
==10633== or are doing some strange experiment):
==10633== /usr/lib/valgrind/../../bin/vgdb --pid=10633 ...command...
==10633==
==10633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10633== /path/to/gdb ./zsh
==10633== and then give GDB the following command
==10633== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10633
==10633== --pid is optional if only one valgrind process is running
==10633==
==10631== Checked 4,791,792 bytes
==10631==
--10633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10633==
==10633== HEAP SUMMARY:
==10633== in use at exit: 3,124,454 bytes in 69,169 blocks
==10633== total heap usage: 1,604,247 allocs, 1,535,078 frees, 129,887,912 bytes allocated
==10633==
==10631== LEAK SUMMARY:
==10631== definitely lost: 2,205 bytes in 14 blocks
==10631== indirectly lost: 6,756 bytes in 7 blocks
==10631== possibly lost: 0 bytes in 0 blocks
==10631== still reachable: 3,106,961 bytes in 69,003 blocks
==10631== suppressed: 0 bytes in 0 blocks
==10631== Rerun with --leak-check=full to see details of leaked memory
==10631==
==10631== Use --track-origins=yes to see where uninitialised values come from
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10631==
==10631== 1 errors in context 1 of 2:
==10631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10631== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10631== by 0x488CD0: stringsubst (subst.c:301)
==10631== by 0x48801B: prefork (subst.c:77)
==10631== by 0x42B318: execcmd (exec.c:2619)
==10631== by 0x428CA0: execpline2 (exec.c:1697)
==10631== by 0x427FD2: execpline (exec.c:1484)
==10631== by 0x427756: execlist (exec.c:1267)
==10631== by 0x42717C: execode (exec.c:1073)
==10631== by 0x431299: runshfunc (exec.c:5040)
==10631== by 0x430E76: doshfunc (exec.c:4920)
==10631== by 0x4302FB: execshfunc (exec.c:4557)
==10631== by 0x42D8C1: execcmd (exec.c:3373)
==10631==
==10631==
==10631== 2 errors in context 2 of 2:
==10631== Conditional jump or move depends on uninitialised value(s)
==10631== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10631== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10631== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10631== by 0x40EFC2: execbuiltin (builtin.c:450)
==10631== by 0x42D8E9: execcmd (exec.c:3378)
==10631== by 0x428CA0: execpline2 (exec.c:1697)
==10631== by 0x427FD2: execpline (exec.c:1484)
==10631== by 0x42779A: execlist (exec.c:1275)
==10631== by 0x42717C: execode (exec.c:1073)
==10631== by 0x431299: runshfunc (exec.c:5040)
==10631== by 0x430E76: doshfunc (exec.c:4920)
==10631== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10631==
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10630-- Caught __NR_exit; running __libc_freeres()
==10633== Searching for pointers to 69,169 not-freed blocks
--10633-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10633-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10633-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10633-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10633-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10633-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10633-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10633-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10633-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10633-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10633-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10633-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10633-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10633-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10633-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10633-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10633-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10633-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10633-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10633-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10633-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10633-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10633-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10633-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10633-- Scanning root segment: 0x701a000..0x701afff (4096)
--10633-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10633-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10633-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10633-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10633-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10633-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10633-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10633-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10633-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10633-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10630-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10630==
==10630== HEAP SUMMARY:
==10630== in use at exit: 3,115,698 bytes in 69,021 blocks
==10630== total heap usage: 1,603,415 allocs, 1,534,394 frees, 129,822,134 bytes allocated
==10630==
==10630== Searching for pointers to 69,021 not-freed blocks
--10630-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10630-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10630-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10630-- Scanning root segment: 0x4037000..0x403afff (16384)
--10630-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10630-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10630-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10630-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10630-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10630-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10630-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10630-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10630-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10630-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10630-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10630-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10630-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10630-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10630-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10630-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10630-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10630-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10630-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10630-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10630-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10630-- Scanning root segment: 0x701a000..0x701afff (4096)
--10630-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10630-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10630-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10630-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10630-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10630-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10630-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10630-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10630-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10630-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10633== Checked 4,784,520 bytes
==10633==
==10633== LEAK SUMMARY:
==10633== definitely lost: 2,205 bytes in 14 blocks
==10633== indirectly lost: 6,756 bytes in 7 blocks
==10633== possibly lost: 0 bytes in 0 blocks
==10633== still reachable: 3,115,493 bytes in 69,148 blocks
==10633== suppressed: 0 bytes in 0 blocks
==10633== Rerun with --leak-check=full to see details of leaked memory
==10633==
==10633== Use --track-origins=yes to see where uninitialised values come from
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10633==
==10633== 1 errors in context 1 of 2:
==10633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10633== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10633== by 0x488CD0: stringsubst (subst.c:301)
==10633== by 0x48801B: prefork (subst.c:77)
==10633== by 0x42B318: execcmd (exec.c:2619)
==10633== by 0x428CA0: execpline2 (exec.c:1697)
==10633== by 0x427FD2: execpline (exec.c:1484)
==10633== by 0x427756: execlist (exec.c:1267)
==10633== by 0x42717C: execode (exec.c:1073)
==10633== by 0x431299: runshfunc (exec.c:5040)
==10633== by 0x430E76: doshfunc (exec.c:4920)
==10633== by 0x4302FB: execshfunc (exec.c:4557)
==10633== by 0x42D8C1: execcmd (exec.c:3373)
==10633==
==10633==
==10633== 2 errors in context 2 of 2:
==10633== Conditional jump or move depends on uninitialised value(s)
==10633== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10633== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10633== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10633== by 0x40EFC2: execbuiltin (builtin.c:450)
==10633== by 0x42D8E9: execcmd (exec.c:3378)
==10633== by 0x428CA0: execpline2 (exec.c:1697)
==10633== by 0x427FD2: execpline (exec.c:1484)
==10633== by 0x42779A: execlist (exec.c:1275)
==10633== by 0x42717C: execode (exec.c:1073)
==10633== by 0x431299: runshfunc (exec.c:5040)
==10633== by 0x430E76: doshfunc (exec.c:4920)
==10633== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10633==
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10634-by-pythonnut-on-???
==10634== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10634-by-pythonnut-on-???
==10634== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10634-by-pythonnut-on-???
==10634==
==10634== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10634== don't want to do, unless you know exactly what you're doing,
==10634== or are doing some strange experiment):
==10634== /usr/lib/valgrind/../../bin/vgdb --pid=10634 ...command...
==10634==
==10634== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10634== /path/to/gdb ./zsh
==10634== and then give GDB the following command
==10634== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10634
==10634== --pid is optional if only one valgrind process is running
==10634==
==10630== Checked 4,790,936 bytes
==10630==
--10634-- Caught __NR_exit; running __libc_freeres()
==10630== LEAK SUMMARY:
==10630== definitely lost: 2,205 bytes in 14 blocks
==10630== indirectly lost: 6,756 bytes in 7 blocks
==10630== possibly lost: 0 bytes in 0 blocks
==10630== still reachable: 3,106,737 bytes in 69,000 blocks
==10630== suppressed: 0 bytes in 0 blocks
==10630== Rerun with --leak-check=full to see details of leaked memory
==10630==
==10630== Use --track-origins=yes to see where uninitialised values come from
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630==
==10630== 1 errors in context 1 of 2:
==10630== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10630== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10630== by 0x488CD0: stringsubst (subst.c:301)
==10630== by 0x48801B: prefork (subst.c:77)
==10630== by 0x42B318: execcmd (exec.c:2619)
==10630== by 0x428CA0: execpline2 (exec.c:1697)
==10630== by 0x427FD2: execpline (exec.c:1484)
==10630== by 0x427756: execlist (exec.c:1267)
==10630== by 0x42717C: execode (exec.c:1073)
==10630== by 0x431299: runshfunc (exec.c:5040)
==10630== by 0x430E76: doshfunc (exec.c:4920)
==10630== by 0x4302FB: execshfunc (exec.c:4557)
==10630== by 0x42D8C1: execcmd (exec.c:3373)
==10630==
==10630==
==10630== 2 errors in context 2 of 2:
==10630== Conditional jump or move depends on uninitialised value(s)
==10630== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10630== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10630== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10630== by 0x40EFC2: execbuiltin (builtin.c:450)
==10630== by 0x42D8E9: execcmd (exec.c:3378)
==10630== by 0x428CA0: execpline2 (exec.c:1697)
==10630== by 0x427FD2: execpline (exec.c:1484)
==10630== by 0x42779A: execlist (exec.c:1275)
==10630== by 0x42717C: execode (exec.c:1073)
==10630== by 0x431299: runshfunc (exec.c:5040)
==10630== by 0x430E76: doshfunc (exec.c:4920)
==10630== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10630==
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10489-- Caught __NR_exit; running __libc_freeres()
--10634-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10634==
==10634== HEAP SUMMARY:
==10634== in use at exit: 3,124,482 bytes in 69,170 blocks
==10634== total heap usage: 1,604,260 allocs, 1,535,090 frees, 129,890,599 bytes allocated
==10634==
--10489-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10489==
==10489== HEAP SUMMARY:
==10489== in use at exit: 3,113,204 bytes in 68,944 blocks
==10489== total heap usage: 1,603,414 allocs, 1,534,470 frees, 129,823,924 bytes allocated
==10489==
==10634== Searching for pointers to 69,170 not-freed blocks
--10634-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10634-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10634-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10634-- Scanning root segment: 0x4037000..0x403afff (16384)
--10634-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10634-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10634-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10634-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10634-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10634-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10634-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10634-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10634-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10634-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10634-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10634-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10634-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10634-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10634-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10634-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10634-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10634-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10634-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10634-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10634-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10634-- Scanning root segment: 0x701a000..0x701afff (4096)
--10634-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10634-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10634-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10634-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10634-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10634-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10634-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10634-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10634-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10634-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10489== Searching for pointers to 68,944 not-freed blocks
--10489-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10489-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10489-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10489-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10489-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10489-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10489-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10489-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10489-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10489-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10489-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10489-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10489-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10489-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10489-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10489-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10489-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10489-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10489-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10489-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10489-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10489-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10489-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10489-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10489-- Scanning root segment: 0x701a000..0x701afff (4096)
--10489-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10489-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10489-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10489-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10489-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10489-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10489-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10489-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10489-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10489-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10634== Checked 4,800,416 bytes
==10634==
==10634== LEAK SUMMARY:
==10634== definitely lost: 2,205 bytes in 14 blocks
==10634== indirectly lost: 6,756 bytes in 7 blocks
==10634== possibly lost: 0 bytes in 0 blocks
==10634== still reachable: 3,115,521 bytes in 69,149 blocks
==10634== suppressed: 0 bytes in 0 blocks
==10634== Rerun with --leak-check=full to see details of leaked memory
==10634==
==10634== Use --track-origins=yes to see where uninitialised values come from
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634==
==10634== 1 errors in context 1 of 2:
==10634== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10634== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10634== by 0x488CD0: stringsubst (subst.c:301)
==10634== by 0x48801B: prefork (subst.c:77)
==10634== by 0x42B318: execcmd (exec.c:2619)
==10634== by 0x428CA0: execpline2 (exec.c:1697)
==10634== by 0x427FD2: execpline (exec.c:1484)
==10634== by 0x427756: execlist (exec.c:1267)
==10634== by 0x42717C: execode (exec.c:1073)
==10634== by 0x431299: runshfunc (exec.c:5040)
==10634== by 0x430E76: doshfunc (exec.c:4920)
==10634== by 0x4302FB: execshfunc (exec.c:4557)
==10634== by 0x42D8C1: execcmd (exec.c:3373)
==10634==
==10634==
==10634== 2 errors in context 2 of 2:
==10634== Conditional jump or move depends on uninitialised value(s)
==10634== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10634== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10634== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10634== by 0x40EFC2: execbuiltin (builtin.c:450)
==10634== by 0x42D8E9: execcmd (exec.c:3378)
==10634== by 0x428CA0: execpline2 (exec.c:1697)
==10634== by 0x427FD2: execpline (exec.c:1484)
==10634== by 0x42779A: execlist (exec.c:1275)
==10634== by 0x42717C: execode (exec.c:1073)
==10634== by 0x431299: runshfunc (exec.c:5040)
==10634== by 0x430E76: doshfunc (exec.c:4920)
==10634== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10634==
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489== Checked 4,769,080 bytes
==10489==
==10489== LEAK SUMMARY:
==10489== definitely lost: 2,205 bytes in 14 blocks
==10489== indirectly lost: 6,756 bytes in 7 blocks
==10489== possibly lost: 0 bytes in 0 blocks
==10489== still reachable: 3,104,243 bytes in 68,923 blocks
==10489== suppressed: 0 bytes in 0 blocks
==10489== Rerun with --leak-check=full to see details of leaked memory
==10489==
==10489== Use --track-origins=yes to see where uninitialised values come from
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489==
==10489== 1 errors in context 1 of 2:
==10489== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10489== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10489== by 0x488CD0: stringsubst (subst.c:301)
==10489== by 0x48801B: prefork (subst.c:77)
==10489== by 0x42B318: execcmd (exec.c:2619)
==10489== by 0x428CA0: execpline2 (exec.c:1697)
==10489== by 0x427FD2: execpline (exec.c:1484)
==10489== by 0x427756: execlist (exec.c:1267)
==10489== by 0x42717C: execode (exec.c:1073)
==10489== by 0x431299: runshfunc (exec.c:5040)
==10489== by 0x430E76: doshfunc (exec.c:4920)
==10489== by 0x4302FB: execshfunc (exec.c:4557)
==10489== by 0x42D8C1: execcmd (exec.c:3373)
==10489==
==10489==
==10489== 2 errors in context 2 of 2:
==10489== Conditional jump or move depends on uninitialised value(s)
==10489== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10489== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10489== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10489== by 0x40EFC2: execbuiltin (builtin.c:450)
==10489== by 0x42D8E9: execcmd (exec.c:3378)
==10489== by 0x428CA0: execpline2 (exec.c:1697)
==10489== by 0x427FD2: execpline (exec.c:1484)
==10489== by 0x42779A: execlist (exec.c:1275)
==10489== by 0x42717C: execode (exec.c:1073)
==10489== by 0x431299: runshfunc (exec.c:5040)
==10489== by 0x430E76: doshfunc (exec.c:4920)
==10489== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10489==
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10635-by-pythonnut-on-???
==10635== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10635-by-pythonnut-on-???
==10635== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10635-by-pythonnut-on-???
==10635==
==10635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10635== don't want to do, unless you know exactly what you're doing,
==10635== or are doing some strange experiment):
==10635== /usr/lib/valgrind/../../bin/vgdb --pid=10635 ...command...
==10635==
==10635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10635== /path/to/gdb ./zsh
==10635== and then give GDB the following command
==10635== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10635
==10635== --pid is optional if only one valgrind process is running
==10635==
client request: code 4d430005, addr 0xFFEFF263C, len 4
--10636-- Caught __NR_exit; running __libc_freeres()
==10636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10636-by-pythonnut-on-???
==10636== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10636-by-pythonnut-on-???
==10636== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10636-by-pythonnut-on-???
==10636==
==10636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10636== don't want to do, unless you know exactly what you're doing,
==10636== or are doing some strange experiment):
==10636== /usr/lib/valgrind/../../bin/vgdb --pid=10636 ...command...
==10636==
==10636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10636== /path/to/gdb ./zsh
==10636== and then give GDB the following command
==10636== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10636
==10636== --pid is optional if only one valgrind process is running
==10636==
--10636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10636==
==10636== HEAP SUMMARY:
==10636== in use at exit: 3,113,740 bytes in 68,956 blocks
==10636== total heap usage: 1,603,241 allocs, 1,534,285 frees, 129,778,731 bytes allocated
==10636==
==10636== Searching for pointers to 68,956 not-freed blocks
--10636-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10636-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10636-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10636-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10636-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10636-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10636-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10636-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10636-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10636-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10636-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10636-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10636-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10636-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10636-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10636-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10636-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10636-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10636-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10636-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10636-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10636-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10636-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10636-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10636-- Scanning root segment: 0x701a000..0x701afff (4096)
--10636-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10636-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10636-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10636-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10636-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10636-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10636-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10636-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10636-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10636-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10636== Checked 4,771,656 bytes
==10636==
==10636== LEAK SUMMARY:
==10636== definitely lost: 2,205 bytes in 14 blocks
==10636== indirectly lost: 6,756 bytes in 7 blocks
==10636== possibly lost: 0 bytes in 0 blocks
==10636== still reachable: 3,104,779 bytes in 68,935 blocks
==10636== suppressed: 0 bytes in 0 blocks
==10636== Rerun with --leak-check=full to see details of leaked memory
==10636==
==10636== Use --track-origins=yes to see where uninitialised values come from
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10636==
==10636== 1 errors in context 1 of 2:
==10636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10636== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10636== by 0x488CD0: stringsubst (subst.c:301)
==10636== by 0x48801B: prefork (subst.c:77)
==10636== by 0x42B318: execcmd (exec.c:2619)
==10636== by 0x428CA0: execpline2 (exec.c:1697)
==10636== by 0x427FD2: execpline (exec.c:1484)
==10636== by 0x427756: execlist (exec.c:1267)
==10636== by 0x42717C: execode (exec.c:1073)
==10636== by 0x431299: runshfunc (exec.c:5040)
==10636== by 0x430E76: doshfunc (exec.c:4920)
==10636== by 0x4302FB: execshfunc (exec.c:4557)
==10636== by 0x42D8C1: execcmd (exec.c:3373)
==10636==
==10636==
==10636== 2 errors in context 2 of 2:
==10636== Conditional jump or move depends on uninitialised value(s)
==10636== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10636== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10636== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10636== by 0x40EFC2: execbuiltin (builtin.c:450)
==10636== by 0x42D8E9: execcmd (exec.c:3378)
==10636== by 0x428CA0: execpline2 (exec.c:1697)
==10636== by 0x427FD2: execpline (exec.c:1484)
==10636== by 0x42779A: execlist (exec.c:1275)
==10636== by 0x42717C: execode (exec.c:1073)
==10636== by 0x431299: runshfunc (exec.c:5040)
==10636== by 0x430E76: doshfunc (exec.c:4920)
==10636== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10636==
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF2AEC, len 4
--10638-- Caught __NR_exit; running __libc_freeres()
==10638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10638-by-pythonnut-on-???
==10638== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10638-by-pythonnut-on-???
==10638== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10638-by-pythonnut-on-???
==10638==
==10638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10638== don't want to do, unless you know exactly what you're doing,
==10638== or are doing some strange experiment):
==10638== /usr/lib/valgrind/../../bin/vgdb --pid=10638 ...command...
==10638==
==10638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10638== /path/to/gdb ./zsh
==10638== and then give GDB the following command
==10638== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10638
==10638== --pid is optional if only one valgrind process is running
==10638==
--10638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10638==
==10638== HEAP SUMMARY:
==10638== in use at exit: 3,114,131 bytes in 68,964 blocks
==10638== total heap usage: 1,603,257 allocs, 1,534,293 frees, 129,782,842 bytes allocated
==10638==
==10638== Searching for pointers to 68,964 not-freed blocks
--10638-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10638-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10638-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10638-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10638-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10638-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10638-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10638-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10638-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10638-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10638-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10638-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10638-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10638-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10638-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10638-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10638-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10638-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10638-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10638-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10638-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10638-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10638-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10638-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10638-- Scanning root segment: 0x701a000..0x701afff (4096)
--10638-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10638-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10638-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10638-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10638-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10638-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10638-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10638-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10638-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10638-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10638== Checked 4,771,760 bytes
==10638==
==10638== LEAK SUMMARY:
==10638== definitely lost: 2,205 bytes in 14 blocks
==10638== indirectly lost: 6,756 bytes in 7 blocks
==10638== possibly lost: 0 bytes in 0 blocks
==10638== still reachable: 3,105,170 bytes in 68,943 blocks
==10638== suppressed: 0 bytes in 0 blocks
==10638== Rerun with --leak-check=full to see details of leaked memory
==10638==
==10638== Use --track-origins=yes to see where uninitialised values come from
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10638==
==10638== 1 errors in context 1 of 2:
==10638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10638== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10638== by 0x488CD0: stringsubst (subst.c:301)
==10638== by 0x48801B: prefork (subst.c:77)
==10638== by 0x42B318: execcmd (exec.c:2619)
==10638== by 0x428CA0: execpline2 (exec.c:1697)
==10638== by 0x427FD2: execpline (exec.c:1484)
==10638== by 0x427756: execlist (exec.c:1267)
==10638== by 0x42717C: execode (exec.c:1073)
==10638== by 0x431299: runshfunc (exec.c:5040)
==10638== by 0x430E76: doshfunc (exec.c:4920)
==10638== by 0x4302FB: execshfunc (exec.c:4557)
==10638== by 0x42D8C1: execcmd (exec.c:3373)
==10638==
==10638==
==10638== 2 errors in context 2 of 2:
==10638== Conditional jump or move depends on uninitialised value(s)
==10638== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10638== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10638== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10638== by 0x40EFC2: execbuiltin (builtin.c:450)
==10638== by 0x42D8E9: execcmd (exec.c:3378)
==10638== by 0x428CA0: execpline2 (exec.c:1697)
==10638== by 0x427FD2: execpline (exec.c:1484)
==10638== by 0x42779A: execlist (exec.c:1275)
==10638== by 0x42717C: execode (exec.c:1073)
==10638== by 0x431299: runshfunc (exec.c:5040)
==10638== by 0x430E76: doshfunc (exec.c:4920)
==10638== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10638==
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10635-- Caught __NR_exit; running __libc_freeres()
--10635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10635==
==10635== HEAP SUMMARY:
==10635== in use at exit: 3,113,269 bytes in 68,945 blocks
==10635== total heap usage: 1,603,266 allocs, 1,534,321 frees, 129,784,845 bytes allocated
==10635==
==10635== Searching for pointers to 68,945 not-freed blocks
--10635-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10635-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10635-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10635-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10635-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10635-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10635-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10635-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10635-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10635-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10635-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10635-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10635-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10635-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10635-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10635-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10635-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10635-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10635-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10635-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10635-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10635-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10635-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10635-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10635-- Scanning root segment: 0x701a000..0x701afff (4096)
--10635-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10635-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10635-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10635-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10635-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10635-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10635-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10635-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10635-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10635-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10635== Checked 4,769,144 bytes
==10635==
==10635== LEAK SUMMARY:
==10635== definitely lost: 2,205 bytes in 14 blocks
==10635== indirectly lost: 6,756 bytes in 7 blocks
==10635== possibly lost: 0 bytes in 0 blocks
==10635== still reachable: 3,104,308 bytes in 68,924 blocks
==10635== suppressed: 0 bytes in 0 blocks
==10635== Rerun with --leak-check=full to see details of leaked memory
==10635==
==10635== Use --track-origins=yes to see where uninitialised values come from
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635==
==10635== 1 errors in context 1 of 2:
==10635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10635== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10635== by 0x488CD0: stringsubst (subst.c:301)
==10635== by 0x48801B: prefork (subst.c:77)
==10635== by 0x42B318: execcmd (exec.c:2619)
==10635== by 0x428CA0: execpline2 (exec.c:1697)
==10635== by 0x427FD2: execpline (exec.c:1484)
==10635== by 0x427756: execlist (exec.c:1267)
==10635== by 0x42717C: execode (exec.c:1073)
==10635== by 0x431299: runshfunc (exec.c:5040)
==10635== by 0x430E76: doshfunc (exec.c:4920)
==10635== by 0x4302FB: execshfunc (exec.c:4557)
==10635== by 0x42D8C1: execcmd (exec.c:3373)
==10635==
==10635==
==10635== 2 errors in context 2 of 2:
==10635== Conditional jump or move depends on uninitialised value(s)
==10635== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10635== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10635== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10635== by 0x40EFC2: execbuiltin (builtin.c:450)
==10635== by 0x42D8E9: execcmd (exec.c:3378)
==10635== by 0x428CA0: execpline2 (exec.c:1697)
==10635== by 0x427FD2: execpline (exec.c:1484)
==10635== by 0x42779A: execlist (exec.c:1275)
==10635== by 0x42717C: execode (exec.c:1073)
==10635== by 0x431299: runshfunc (exec.c:5040)
==10635== by 0x430E76: doshfunc (exec.c:4920)
==10635== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10635==
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10487-- Caught __NR_exit; running __libc_freeres()
--10487-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10487==
==10487== HEAP SUMMARY:
==10487== in use at exit: 3,112,472 bytes in 68,932 blocks
==10487== total heap usage: 1,603,300 allocs, 1,534,368 frees, 129,782,220 bytes allocated
==10487==
client request: code 4d430005, addr 0xFFEFE4DAC, len 4
==10487== Searching for pointers to 68,932 not-freed blocks
--10487-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10487-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10487-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10487-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10487-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10487-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10487-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10487-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10487-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10487-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10487-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10487-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10487-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10487-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10487-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10487-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10487-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10487-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10487-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10487-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10487-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10487-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10487-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10487-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10487-- Scanning root segment: 0x701a000..0x701afff (4096)
--10487-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10487-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10487-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10487-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10487-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10487-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10487-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10487-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10487-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10487-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10487== Checked 4,767,704 bytes
==10487==
==10487== LEAK SUMMARY:
==10487== definitely lost: 2,205 bytes in 14 blocks
==10487== indirectly lost: 6,756 bytes in 7 blocks
==10487== possibly lost: 0 bytes in 0 blocks
==10487== still reachable: 3,103,511 bytes in 68,911 blocks
==10487== suppressed: 0 bytes in 0 blocks
==10487== Rerun with --leak-check=full to see details of leaked memory
==10487==
==10487== Use --track-origins=yes to see where uninitialised values come from
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10487==
==10487== 1 errors in context 1 of 2:
==10487== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10487== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10487== by 0x488CD0: stringsubst (subst.c:301)
==10487== by 0x48801B: prefork (subst.c:77)
==10487== by 0x42B318: execcmd (exec.c:2619)
==10487== by 0x428CA0: execpline2 (exec.c:1697)
==10487== by 0x427FD2: execpline (exec.c:1484)
==10487== by 0x427756: execlist (exec.c:1267)
==10487== by 0x42717C: execode (exec.c:1073)
==10487== by 0x431299: runshfunc (exec.c:5040)
==10487== by 0x430E76: doshfunc (exec.c:4920)
==10487== by 0x4302FB: execshfunc (exec.c:4557)
==10487== by 0x42D8C1: execcmd (exec.c:3373)
==10487==
==10487==
==10487== 2 errors in context 2 of 2:
==10487== Conditional jump or move depends on uninitialised value(s)
==10487== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10487== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10487== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10487== by 0x40EFC2: execbuiltin (builtin.c:450)
==10487== by 0x42D8E9: execcmd (exec.c:3378)
==10487== by 0x428CA0: execpline2 (exec.c:1697)
==10487== by 0x427FD2: execpline (exec.c:1484)
==10487== by 0x42779A: execlist (exec.c:1275)
==10487== by 0x42717C: execode (exec.c:1073)
==10487== by 0x431299: runshfunc (exec.c:5040)
==10487== by 0x430E76: doshfunc (exec.c:4920)
==10487== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10487==
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10695-by-pythonnut-on-???
==10695== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10695-by-pythonnut-on-???
==10695== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10695-by-pythonnut-on-???
==10695==
==10695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10695== don't want to do, unless you know exactly what you're doing,
==10695== or are doing some strange experiment):
==10695== /usr/lib/valgrind/../../bin/vgdb --pid=10695 ...command...
==10695==
==10695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10695== /path/to/gdb ./zsh
==10695== and then give GDB the following command
==10695== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10695
==10695== --pid is optional if only one valgrind process is running
==10695==
--10695-- Caught __NR_exit; running __libc_freeres()
--10695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10695==
==10695== HEAP SUMMARY:
==10695== in use at exit: 3,167,657 bytes in 69,836 blocks
==10695== total heap usage: 1,700,417 allocs, 1,630,581 frees, 136,800,567 bytes allocated
==10695==
==10695== Searching for pointers to 69,836 not-freed blocks
--10695-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10695-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10695-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10695-- Scanning root segment: 0x4037000..0x403afff (16384)
--10695-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10695-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10695-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10695-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10695-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10695-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10695-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10695-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10695-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10695-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10695-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10695-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10695-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10695-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10695-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10695-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10695-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10695-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10695-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10695-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10695-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10695-- Scanning root segment: 0x701a000..0x701afff (4096)
--10695-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10695-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10695-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10695-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10695-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10695-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10695-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10695-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10695-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10695-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10695== Checked 4,855,312 bytes
==10695==
==10695== LEAK SUMMARY:
==10695== definitely lost: 2,205 bytes in 14 blocks
==10695== indirectly lost: 6,756 bytes in 7 blocks
==10695== possibly lost: 0 bytes in 0 blocks
==10695== still reachable: 3,158,696 bytes in 69,815 blocks
==10695== suppressed: 0 bytes in 0 blocks
==10695== Rerun with --leak-check=full to see details of leaked memory
==10695==
==10695== Use --track-origins=yes to see where uninitialised values come from
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695==
==10695== 1 errors in context 1 of 2:
==10695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10695== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10695== by 0x488CD0: stringsubst (subst.c:301)
==10695== by 0x48801B: prefork (subst.c:77)
==10695== by 0x42B318: execcmd (exec.c:2619)
==10695== by 0x428CA0: execpline2 (exec.c:1697)
==10695== by 0x427FD2: execpline (exec.c:1484)
==10695== by 0x427756: execlist (exec.c:1267)
==10695== by 0x42717C: execode (exec.c:1073)
==10695== by 0x431299: runshfunc (exec.c:5040)
==10695== by 0x430E76: doshfunc (exec.c:4920)
==10695== by 0x4302FB: execshfunc (exec.c:4557)
==10695== by 0x42D8C1: execcmd (exec.c:3373)
==10695==
==10695==
==10695== 2 errors in context 2 of 2:
==10695== Conditional jump or move depends on uninitialised value(s)
==10695== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10695== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10695== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10695== by 0x40EFC2: execbuiltin (builtin.c:450)
==10695== by 0x42D8E9: execcmd (exec.c:3378)
==10695== by 0x428CA0: execpline2 (exec.c:1697)
==10695== by 0x427FD2: execpline (exec.c:1484)
==10695== by 0x42779A: execlist (exec.c:1275)
==10695== by 0x42717C: execode (exec.c:1073)
==10695== by 0x431299: runshfunc (exec.c:5040)
==10695== by 0x430E76: doshfunc (exec.c:4920)
==10695== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10695==
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10906-by-pythonnut-on-???
==10906== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10906-by-pythonnut-on-???
==10906== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10906-by-pythonnut-on-???
==10906==
==10906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10906== don't want to do, unless you know exactly what you're doing,
==10906== or are doing some strange experiment):
==10906== /usr/lib/valgrind/../../bin/vgdb --pid=10906 ...command...
==10906==
==10906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10906== /path/to/gdb ./zsh
==10906== and then give GDB the following command
==10906== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10906
==10906== --pid is optional if only one valgrind process is running
==10906==
--10906-- Caught __NR_exit; running __libc_freeres()
--10906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10906==
==10906== HEAP SUMMARY:
==10906== in use at exit: 3,134,024 bytes in 69,387 blocks
==10906== total heap usage: 1,736,245 allocs, 1,666,858 frees, 139,848,575 bytes allocated
==10906==
==10906== Searching for pointers to 69,387 not-freed blocks
--10906-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10906-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10906-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10906-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10906-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10906-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10906-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10906-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10906-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10906-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10906-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10906-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10906-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10906-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10906-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10906-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10906-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10906-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10906-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10906-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10906-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10906-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10906-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10906-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10906-- Scanning root segment: 0x701a000..0x701afff (4096)
--10906-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10906-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10906-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10906-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10906-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10906-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10906-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10906-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10906-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10906-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10906== Checked 4,795,128 bytes
==10906==
==10906== LEAK SUMMARY:
==10906== definitely lost: 3,173 bytes in 18 blocks
==10906== indirectly lost: 6,756 bytes in 7 blocks
==10906== possibly lost: 0 bytes in 0 blocks
==10906== still reachable: 3,124,095 bytes in 69,362 blocks
==10906== suppressed: 0 bytes in 0 blocks
==10906== Rerun with --leak-check=full to see details of leaked memory
==10906==
==10906== Use --track-origins=yes to see where uninitialised values come from
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906==
==10906== 1 errors in context 1 of 2:
==10906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10906== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10906== by 0x488CD0: stringsubst (subst.c:301)
==10906== by 0x48801B: prefork (subst.c:77)
==10906== by 0x42B318: execcmd (exec.c:2619)
==10906== by 0x428CA0: execpline2 (exec.c:1697)
==10906== by 0x427FD2: execpline (exec.c:1484)
==10906== by 0x427756: execlist (exec.c:1267)
==10906== by 0x42717C: execode (exec.c:1073)
==10906== by 0x431299: runshfunc (exec.c:5040)
==10906== by 0x430E76: doshfunc (exec.c:4920)
==10906== by 0x4302FB: execshfunc (exec.c:4557)
==10906== by 0x42D8C1: execcmd (exec.c:3373)
==10906==
==10906==
==10906== 2 errors in context 2 of 2:
==10906== Conditional jump or move depends on uninitialised value(s)
==10906== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10906== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10906== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10906== by 0x40EFC2: execbuiltin (builtin.c:450)
==10906== by 0x42D8E9: execcmd (exec.c:3378)
==10906== by 0x428CA0: execpline2 (exec.c:1697)
==10906== by 0x427FD2: execpline (exec.c:1484)
==10906== by 0x42779A: execlist (exec.c:1275)
==10906== by 0x42717C: execode (exec.c:1073)
==10906== by 0x431299: runshfunc (exec.c:5040)
==10906== by 0x430E76: doshfunc (exec.c:4920)
==10906== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10906==
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10909-by-pythonnut-on-???
==10909== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10909-by-pythonnut-on-???
==10909== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10909-by-pythonnut-on-???
==10909==
==10909== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10909== don't want to do, unless you know exactly what you're doing,
==10909== or are doing some strange experiment):
==10909== /usr/lib/valgrind/../../bin/vgdb --pid=10909 ...command...
==10909==
==10909== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10909== /path/to/gdb ./zsh
==10909== and then give GDB the following command
==10909== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10909
==10909== --pid is optional if only one valgrind process is running
==10909==
--10909-- Caught __NR_exit; running __libc_freeres()
--10909-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10909==
==10909== HEAP SUMMARY:
==10909== in use at exit: 3,134,115 bytes in 69,387 blocks
==10909== total heap usage: 1,736,252 allocs, 1,666,865 frees, 139,851,607 bytes allocated
==10909==
==10909== Searching for pointers to 69,387 not-freed blocks
--10909-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10909-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10909-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10909-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10909-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10909-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10909-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10909-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10909-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10909-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10909-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10909-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10909-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10909-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10909-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10909-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10909-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10909-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10909-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10909-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10909-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10909-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10909-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10909-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10909-- Scanning root segment: 0x701a000..0x701afff (4096)
--10909-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10909-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10909-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10909-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10909-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10909-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10909-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10909-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10909-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10909-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10909== Checked 4,796,568 bytes
==10909==
==10909== LEAK SUMMARY:
==10909== definitely lost: 3,173 bytes in 18 blocks
==10909== indirectly lost: 6,756 bytes in 7 blocks
==10909== possibly lost: 0 bytes in 0 blocks
==10909== still reachable: 3,124,186 bytes in 69,362 blocks
==10909== suppressed: 0 bytes in 0 blocks
==10909== Rerun with --leak-check=full to see details of leaked memory
==10909==
==10909== Use --track-origins=yes to see where uninitialised values come from
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909==
==10909== 1 errors in context 1 of 2:
==10909== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10909== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10909== by 0x488CD0: stringsubst (subst.c:301)
==10909== by 0x48801B: prefork (subst.c:77)
==10909== by 0x42B318: execcmd (exec.c:2619)
==10909== by 0x428CA0: execpline2 (exec.c:1697)
==10909== by 0x427FD2: execpline (exec.c:1484)
==10909== by 0x427756: execlist (exec.c:1267)
==10909== by 0x42717C: execode (exec.c:1073)
==10909== by 0x431299: runshfunc (exec.c:5040)
==10909== by 0x430E76: doshfunc (exec.c:4920)
==10909== by 0x4302FB: execshfunc (exec.c:4557)
==10909== by 0x42D8C1: execcmd (exec.c:3373)
==10909==
==10909==
==10909== 2 errors in context 2 of 2:
==10909== Conditional jump or move depends on uninitialised value(s)
==10909== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10909== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10909== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10909== by 0x40EFC2: execbuiltin (builtin.c:450)
==10909== by 0x42D8E9: execcmd (exec.c:3378)
==10909== by 0x428CA0: execpline2 (exec.c:1697)
==10909== by 0x427FD2: execpline (exec.c:1484)
==10909== by 0x42779A: execlist (exec.c:1275)
==10909== by 0x42717C: execode (exec.c:1073)
==10909== by 0x431299: runshfunc (exec.c:5040)
==10909== by 0x430E76: doshfunc (exec.c:4920)
==10909== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10909==
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10911-by-pythonnut-on-???
==10911== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10911-by-pythonnut-on-???
==10911== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10911-by-pythonnut-on-???
==10911==
==10911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10911== don't want to do, unless you know exactly what you're doing,
==10911== or are doing some strange experiment):
==10911== /usr/lib/valgrind/../../bin/vgdb --pid=10911 ...command...
==10911==
==10911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10911== /path/to/gdb ./zsh
==10911== and then give GDB the following command
==10911== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10911
==10911== --pid is optional if only one valgrind process is running
==10911==
--10911-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFEE9BC, len 4
--10911-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10911==
==10911== HEAP SUMMARY:
==10911== in use at exit: 3,131,314 bytes in 69,317 blocks
==10911== total heap usage: 1,736,483 allocs, 1,667,166 frees, 139,877,271 bytes allocated
==10911==
==10911== Searching for pointers to 69,317 not-freed blocks
--10911-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10911-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10911-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10911-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10911-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10911-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10911-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10911-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10911-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10911-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10911-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10911-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10911-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10911-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10911-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10911-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10911-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10911-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10911-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10911-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10911-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10911-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10911-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10911-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10911-- Scanning root segment: 0x701a000..0x701afff (4096)
--10911-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10911-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10911-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10911-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10911-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10911-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10911-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10911-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10911-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10911-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10911== Checked 4,789,832 bytes
==10911==
==10911== LEAK SUMMARY:
==10911== definitely lost: 3,173 bytes in 18 blocks
==10911== indirectly lost: 6,756 bytes in 7 blocks
==10911== possibly lost: 0 bytes in 0 blocks
==10911== still reachable: 3,121,385 bytes in 69,292 blocks
==10911== suppressed: 0 bytes in 0 blocks
==10911== Rerun with --leak-check=full to see details of leaked memory
==10911==
==10911== Use --track-origins=yes to see where uninitialised values come from
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911==
==10911== 1 errors in context 1 of 2:
==10911== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10911== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10911== by 0x488CD0: stringsubst (subst.c:301)
==10911== by 0x48801B: prefork (subst.c:77)
==10911== by 0x42B318: execcmd (exec.c:2619)
==10911== by 0x428CA0: execpline2 (exec.c:1697)
==10911== by 0x427FD2: execpline (exec.c:1484)
==10911== by 0x427756: execlist (exec.c:1267)
==10911== by 0x42717C: execode (exec.c:1073)
==10911== by 0x431299: runshfunc (exec.c:5040)
==10911== by 0x430E76: doshfunc (exec.c:4920)
==10911== by 0x4302FB: execshfunc (exec.c:4557)
==10911== by 0x42D8C1: execcmd (exec.c:3373)
==10911==
==10911==
==10911== 2 errors in context 2 of 2:
==10911== Conditional jump or move depends on uninitialised value(s)
==10911== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10911== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10911== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10911== by 0x40EFC2: execbuiltin (builtin.c:450)
==10911== by 0x42D8E9: execcmd (exec.c:3378)
==10911== by 0x428CA0: execpline2 (exec.c:1697)
==10911== by 0x427FD2: execpline (exec.c:1484)
==10911== by 0x42779A: execlist (exec.c:1275)
==10911== by 0x42717C: execode (exec.c:1073)
==10911== by 0x431299: runshfunc (exec.c:5040)
==10911== by 0x430E76: doshfunc (exec.c:4920)
==10911== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10911==
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10910-- Caught __NR_exit; running __libc_freeres()
==10910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10910-by-pythonnut-on-???
==10910== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10910-by-pythonnut-on-???
==10910== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10910-by-pythonnut-on-???
==10910==
==10910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10910== don't want to do, unless you know exactly what you're doing,
==10910== or are doing some strange experiment):
==10910== /usr/lib/valgrind/../../bin/vgdb --pid=10910 ...command...
==10910==
==10910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10910== /path/to/gdb ./zsh
==10910== and then give GDB the following command
==10910== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10910
==10910== --pid is optional if only one valgrind process is running
==10910==
--10910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10910==
==10910== HEAP SUMMARY:
==10910== in use at exit: 3,131,250 bytes in 69,314 blocks
==10910== total heap usage: 1,736,481 allocs, 1,667,167 frees, 139,877,030 bytes allocated
==10910==
==10910== Searching for pointers to 69,314 not-freed blocks
--10910-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10910-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10910-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10910-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10910-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10910-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10910-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10910-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10910-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10910-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10910-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10910-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10910-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10910-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10910-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10910-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10910-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10910-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10910-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10910-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10910-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10910-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10910-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10910-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10910-- Scanning root segment: 0x701a000..0x701afff (4096)
--10910-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10910-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10910-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10910-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10910-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10910-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10910-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10910-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10910-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10910-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10910== Checked 4,789,144 bytes
==10910==
==10910== LEAK SUMMARY:
==10910== definitely lost: 3,173 bytes in 18 blocks
==10910== indirectly lost: 6,756 bytes in 7 blocks
==10910== possibly lost: 0 bytes in 0 blocks
==10910== still reachable: 3,121,321 bytes in 69,289 blocks
==10910== suppressed: 0 bytes in 0 blocks
==10910== Rerun with --leak-check=full to see details of leaked memory
==10910==
==10910== Use --track-origins=yes to see where uninitialised values come from
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10910==
==10910== 1 errors in context 1 of 2:
==10910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10910== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10910== by 0x488CD0: stringsubst (subst.c:301)
==10910== by 0x48801B: prefork (subst.c:77)
==10910== by 0x42B318: execcmd (exec.c:2619)
==10910== by 0x428CA0: execpline2 (exec.c:1697)
==10910== by 0x427FD2: execpline (exec.c:1484)
==10910== by 0x427756: execlist (exec.c:1267)
==10910== by 0x42717C: execode (exec.c:1073)
==10910== by 0x431299: runshfunc (exec.c:5040)
==10910== by 0x430E76: doshfunc (exec.c:4920)
==10910== by 0x4302FB: execshfunc (exec.c:4557)
==10910== by 0x42D8C1: execcmd (exec.c:3373)
==10910==
==10910==
==10910== 2 errors in context 2 of 2:
==10910== Conditional jump or move depends on uninitialised value(s)
==10910== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10910== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10910== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10910== by 0x40EFC2: execbuiltin (builtin.c:450)
==10910== by 0x42D8E9: execcmd (exec.c:3378)
==10910== by 0x428CA0: execpline2 (exec.c:1697)
==10910== by 0x427FD2: execpline (exec.c:1484)
==10910== by 0x42779A: execlist (exec.c:1275)
==10910== by 0x42717C: execode (exec.c:1073)
==10910== by 0x431299: runshfunc (exec.c:5040)
==10910== by 0x430E76: doshfunc (exec.c:4920)
==10910== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10910==
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10913-- Caught __NR_exit; running __libc_freeres()
==10913== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10913-by-pythonnut-on-???
==10913== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10913-by-pythonnut-on-???
==10913== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10913-by-pythonnut-on-???
==10913==
==10913== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10913== don't want to do, unless you know exactly what you're doing,
==10913== or are doing some strange experiment):
==10913== /usr/lib/valgrind/../../bin/vgdb --pid=10913 ...command...
==10913==
==10913== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10913== /path/to/gdb ./zsh
==10913== and then give GDB the following command
==10913== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10913
==10913== --pid is optional if only one valgrind process is running
==10913==
--10913-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10913==
==10913== HEAP SUMMARY:
==10913== in use at exit: 3,131,257 bytes in 69,314 blocks
==10913== total heap usage: 1,736,496 allocs, 1,667,182 frees, 139,882,028 bytes allocated
==10913==
==10913== Searching for pointers to 69,314 not-freed blocks
--10913-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10913-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10913-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10913-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10913-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10913-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10913-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10913-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10913-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10913-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10913-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10913-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10913-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10913-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10913-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10913-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10913-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10913-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10913-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10913-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10913-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10913-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10913-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10913-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10913-- Scanning root segment: 0x701a000..0x701afff (4096)
--10913-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10913-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10913-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10913-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10913-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10913-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10913-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10913-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10913-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10913-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10913== Checked 4,789,280 bytes
==10913==
==10913== LEAK SUMMARY:
==10913== definitely lost: 3,173 bytes in 18 blocks
==10913== indirectly lost: 6,756 bytes in 7 blocks
==10913== possibly lost: 0 bytes in 0 blocks
==10913== still reachable: 3,121,328 bytes in 69,289 blocks
==10913== suppressed: 0 bytes in 0 blocks
==10913== Rerun with --leak-check=full to see details of leaked memory
==10913==
==10913== Use --track-origins=yes to see where uninitialised values come from
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10913==
==10913== 1 errors in context 1 of 2:
==10913== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10913== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10913== by 0x488CD0: stringsubst (subst.c:301)
==10913== by 0x48801B: prefork (subst.c:77)
==10913== by 0x42B318: execcmd (exec.c:2619)
==10913== by 0x428CA0: execpline2 (exec.c:1697)
==10913== by 0x427FD2: execpline (exec.c:1484)
==10913== by 0x427756: execlist (exec.c:1267)
==10913== by 0x42717C: execode (exec.c:1073)
==10913== by 0x431299: runshfunc (exec.c:5040)
==10913== by 0x430E76: doshfunc (exec.c:4920)
==10913== by 0x4302FB: execshfunc (exec.c:4557)
==10913== by 0x42D8C1: execcmd (exec.c:3373)
==10913==
==10913==
==10913== 2 errors in context 2 of 2:
==10913== Conditional jump or move depends on uninitialised value(s)
==10913== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10913== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10913== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10913== by 0x40EFC2: execbuiltin (builtin.c:450)
==10913== by 0x42D8E9: execcmd (exec.c:3378)
==10913== by 0x428CA0: execpline2 (exec.c:1697)
==10913== by 0x427FD2: execpline (exec.c:1484)
==10913== by 0x42779A: execlist (exec.c:1275)
==10913== by 0x42717C: execode (exec.c:1073)
==10913== by 0x431299: runshfunc (exec.c:5040)
==10913== by 0x430E76: doshfunc (exec.c:4920)
==10913== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10913==
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10914-- Caught __NR_exit; running __libc_freeres()
==10914== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10914-by-pythonnut-on-???
==10914== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10914-by-pythonnut-on-???
==10914== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10914-by-pythonnut-on-???
==10914==
==10914== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10914== don't want to do, unless you know exactly what you're doing,
==10914== or are doing some strange experiment):
==10914== /usr/lib/valgrind/../../bin/vgdb --pid=10914 ...command...
==10914==
==10914== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10914== /path/to/gdb ./zsh
==10914== and then give GDB the following command
==10914== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10914
==10914== --pid is optional if only one valgrind process is running
==10914==
--10914-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10914==
==10914== HEAP SUMMARY:
==10914== in use at exit: 3,131,353 bytes in 69,314 blocks
==10914== total heap usage: 1,736,512 allocs, 1,667,198 frees, 139,886,815 bytes allocated
==10914==
==10914== Searching for pointers to 69,314 not-freed blocks
--10914-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10914-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10914-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10914-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10914-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10914-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10914-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10914-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10914-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10914-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10914-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10914-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10914-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10914-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10914-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10914-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10914-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10914-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10914-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10914-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10914-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10914-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10914-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10914-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10914-- Scanning root segment: 0x701a000..0x701afff (4096)
--10914-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10914-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10914-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10914-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10914-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10914-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10914-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10914-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10914-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10914-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10914== Checked 4,788,560 bytes
==10914==
==10914== LEAK SUMMARY:
==10914== definitely lost: 3,173 bytes in 18 blocks
==10914== indirectly lost: 6,756 bytes in 7 blocks
==10914== possibly lost: 0 bytes in 0 blocks
==10914== still reachable: 3,121,424 bytes in 69,289 blocks
==10914== suppressed: 0 bytes in 0 blocks
==10914== Rerun with --leak-check=full to see details of leaked memory
==10914==
==10914== Use --track-origins=yes to see where uninitialised values come from
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10914==
==10914== 1 errors in context 1 of 2:
==10914== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10914== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10914== by 0x488CD0: stringsubst (subst.c:301)
==10914== by 0x48801B: prefork (subst.c:77)
==10914== by 0x42B318: execcmd (exec.c:2619)
==10914== by 0x428CA0: execpline2 (exec.c:1697)
==10914== by 0x427FD2: execpline (exec.c:1484)
==10914== by 0x427756: execlist (exec.c:1267)
==10914== by 0x42717C: execode (exec.c:1073)
==10914== by 0x431299: runshfunc (exec.c:5040)
==10914== by 0x430E76: doshfunc (exec.c:4920)
==10914== by 0x4302FB: execshfunc (exec.c:4557)
==10914== by 0x42D8C1: execcmd (exec.c:3373)
==10914==
==10914==
==10914== 2 errors in context 2 of 2:
==10914== Conditional jump or move depends on uninitialised value(s)
==10914== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10914== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10914== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10914== by 0x40EFC2: execbuiltin (builtin.c:450)
==10914== by 0x42D8E9: execcmd (exec.c:3378)
==10914== by 0x428CA0: execpline2 (exec.c:1697)
==10914== by 0x427FD2: execpline (exec.c:1484)
==10914== by 0x42779A: execlist (exec.c:1275)
==10914== by 0x42717C: execode (exec.c:1073)
==10914== by 0x431299: runshfunc (exec.c:5040)
==10914== by 0x430E76: doshfunc (exec.c:4920)
==10914== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10914==
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10917-by-pythonnut-on-???
==10917== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10917-by-pythonnut-on-???
==10917== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10917-by-pythonnut-on-???
==10917==
==10917== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10917== don't want to do, unless you know exactly what you're doing,
==10917== or are doing some strange experiment):
==10917== /usr/lib/valgrind/../../bin/vgdb --pid=10917 ...command...
==10917==
==10917== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10917== /path/to/gdb ./zsh
==10917== and then give GDB the following command
==10917== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10917
==10917== --pid is optional if only one valgrind process is running
==10917==
--10917-- Caught __NR_exit; running __libc_freeres()
--10917-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10917==
==10917== HEAP SUMMARY:
==10917== in use at exit: 3,131,599 bytes in 69,320 blocks
==10917== total heap usage: 1,736,560 allocs, 1,667,240 frees, 139,895,839 bytes allocated
==10917==
==10917== Searching for pointers to 69,320 not-freed blocks
--10917-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10917-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10917-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10917-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10917-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10917-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10917-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10917-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10917-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10917-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10917-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10917-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10917-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10917-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10917-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10917-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10917-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10917-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10917-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10917-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10917-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10917-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10917-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10917-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10917-- Scanning root segment: 0x701a000..0x701afff (4096)
--10917-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10917-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10917-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10917-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10917-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10917-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10917-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10917-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10917-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10917-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10917== Checked 4,788,736 bytes
==10917==
==10917== LEAK SUMMARY:
==10917== definitely lost: 3,173 bytes in 18 blocks
==10917== indirectly lost: 6,756 bytes in 7 blocks
==10917== possibly lost: 0 bytes in 0 blocks
==10917== still reachable: 3,121,670 bytes in 69,295 blocks
==10917== suppressed: 0 bytes in 0 blocks
==10917== Rerun with --leak-check=full to see details of leaked memory
==10917==
==10917== Use --track-origins=yes to see where uninitialised values come from
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917==
==10917== 1 errors in context 1 of 2:
==10917== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10917== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10917== by 0x488CD0: stringsubst (subst.c:301)
==10917== by 0x48801B: prefork (subst.c:77)
==10917== by 0x42B318: execcmd (exec.c:2619)
==10917== by 0x428CA0: execpline2 (exec.c:1697)
==10917== by 0x427FD2: execpline (exec.c:1484)
==10917== by 0x427756: execlist (exec.c:1267)
==10917== by 0x42717C: execode (exec.c:1073)
==10917== by 0x431299: runshfunc (exec.c:5040)
==10917== by 0x430E76: doshfunc (exec.c:4920)
==10917== by 0x4302FB: execshfunc (exec.c:4557)
==10917== by 0x42D8C1: execcmd (exec.c:3373)
==10917==
==10917==
==10917== 2 errors in context 2 of 2:
==10917== Conditional jump or move depends on uninitialised value(s)
==10917== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10917== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10917== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10917== by 0x40EFC2: execbuiltin (builtin.c:450)
==10917== by 0x42D8E9: execcmd (exec.c:3378)
==10917== by 0x428CA0: execpline2 (exec.c:1697)
==10917== by 0x427FD2: execpline (exec.c:1484)
==10917== by 0x42779A: execlist (exec.c:1275)
==10917== by 0x42717C: execode (exec.c:1073)
==10917== by 0x431299: runshfunc (exec.c:5040)
==10917== by 0x430E76: doshfunc (exec.c:4920)
==10917== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10917==
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10918-- Caught __NR_exit; running __libc_freeres()
==10918== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10918-by-pythonnut-on-???
==10918== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10918-by-pythonnut-on-???
==10918== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10918-by-pythonnut-on-???
==10918==
==10918== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10918== don't want to do, unless you know exactly what you're doing,
==10918== or are doing some strange experiment):
==10918== /usr/lib/valgrind/../../bin/vgdb --pid=10918 ...command...
==10918==
==10918== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10918== /path/to/gdb ./zsh
==10918== and then give GDB the following command
==10918== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10918
==10918== --pid is optional if only one valgrind process is running
==10918==
--10918-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10918==
==10918== HEAP SUMMARY:
==10918== in use at exit: 3,131,535 bytes in 69,320 blocks
==10918== total heap usage: 1,736,540 allocs, 1,667,220 frees, 139,893,609 bytes allocated
==10918==
==10918== Searching for pointers to 69,320 not-freed blocks
--10918-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10918-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10918-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10918-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10918-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10918-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10918-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10918-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10918-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10918-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10918-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10918-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10918-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10918-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10918-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10918-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10918-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10918-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10918-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10918-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10918-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10918-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10918-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10918-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10918-- Scanning root segment: 0x701a000..0x701afff (4096)
--10918-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10918-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10918-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10918-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10918-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10918-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10918-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10918-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10918-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10918-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10918== Checked 4,788,656 bytes
==10918==
==10918== LEAK SUMMARY:
==10918== definitely lost: 3,173 bytes in 18 blocks
==10918== indirectly lost: 6,756 bytes in 7 blocks
==10918== possibly lost: 0 bytes in 0 blocks
==10918== still reachable: 3,121,606 bytes in 69,295 blocks
==10918== suppressed: 0 bytes in 0 blocks
==10918== Rerun with --leak-check=full to see details of leaked memory
==10918==
==10918== Use --track-origins=yes to see where uninitialised values come from
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10918==
==10918== 1 errors in context 1 of 2:
==10918== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10918== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10918== by 0x488CD0: stringsubst (subst.c:301)
==10918== by 0x48801B: prefork (subst.c:77)
==10918== by 0x42B318: execcmd (exec.c:2619)
==10918== by 0x428CA0: execpline2 (exec.c:1697)
==10918== by 0x427FD2: execpline (exec.c:1484)
==10918== by 0x427756: execlist (exec.c:1267)
==10918== by 0x42717C: execode (exec.c:1073)
==10918== by 0x431299: runshfunc (exec.c:5040)
==10918== by 0x430E76: doshfunc (exec.c:4920)
==10918== by 0x4302FB: execshfunc (exec.c:4557)
==10918== by 0x42D8C1: execcmd (exec.c:3373)
==10918==
==10918==
==10918== 2 errors in context 2 of 2:
==10918== Conditional jump or move depends on uninitialised value(s)
==10918== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10918== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10918== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10918== by 0x40EFC2: execbuiltin (builtin.c:450)
==10918== by 0x42D8E9: execcmd (exec.c:3378)
==10918== by 0x428CA0: execpline2 (exec.c:1697)
==10918== by 0x427FD2: execpline (exec.c:1484)
==10918== by 0x42779A: execlist (exec.c:1275)
==10918== by 0x42717C: execode (exec.c:1073)
==10918== by 0x431299: runshfunc (exec.c:5040)
==10918== by 0x430E76: doshfunc (exec.c:4920)
==10918== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10918==
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10919-by-pythonnut-on-???
==10919== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10919-by-pythonnut-on-???
==10919== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10919-by-pythonnut-on-???
==10919==
==10919== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10919== don't want to do, unless you know exactly what you're doing,
==10919== or are doing some strange experiment):
==10919== /usr/lib/valgrind/../../bin/vgdb --pid=10919 ...command...
==10919==
==10919== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10919== /path/to/gdb ./zsh
==10919== and then give GDB the following command
==10919== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10919
==10919== --pid is optional if only one valgrind process is running
==10919==
--10919-- Caught __NR_exit; running __libc_freeres()
--10919-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10919==
==10919== HEAP SUMMARY:
==10919== in use at exit: 3,131,563 bytes in 69,321 blocks
==10919== total heap usage: 1,736,553 allocs, 1,667,232 frees, 139,896,296 bytes allocated
==10919==
==10919== Searching for pointers to 69,321 not-freed blocks
--10919-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10919-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10919-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10919-- Scanning root segment: 0x4037000..0x403afff (16384)
--10919-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10919-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10919-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10919-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10919-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10919-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10919-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10919-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10919-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10919-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10919-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10919-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10919-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10919-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10919-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10919-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10919-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10919-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10919-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10919-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10919-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10919-- Scanning root segment: 0x701a000..0x701afff (4096)
--10919-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10919-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10919-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10919-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10919-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10919-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10919-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10919-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10919-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10919-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10919== Checked 4,804,552 bytes
==10919==
==10919== LEAK SUMMARY:
==10919== definitely lost: 3,173 bytes in 18 blocks
==10919== indirectly lost: 6,756 bytes in 7 blocks
==10919== possibly lost: 0 bytes in 0 blocks
==10919== still reachable: 3,121,634 bytes in 69,296 blocks
==10919== suppressed: 0 bytes in 0 blocks
==10919== Rerun with --leak-check=full to see details of leaked memory
==10919==
==10919== Use --track-origins=yes to see where uninitialised values come from
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919==
==10919== 1 errors in context 1 of 2:
==10919== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10919== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10919== by 0x488CD0: stringsubst (subst.c:301)
==10919== by 0x48801B: prefork (subst.c:77)
==10919== by 0x42B318: execcmd (exec.c:2619)
==10919== by 0x428CA0: execpline2 (exec.c:1697)
==10919== by 0x427FD2: execpline (exec.c:1484)
==10919== by 0x427756: execlist (exec.c:1267)
==10919== by 0x42717C: execode (exec.c:1073)
==10919== by 0x431299: runshfunc (exec.c:5040)
==10919== by 0x430E76: doshfunc (exec.c:4920)
==10919== by 0x4302FB: execshfunc (exec.c:4557)
==10919== by 0x42D8C1: execcmd (exec.c:3373)
==10919==
==10919==
==10919== 2 errors in context 2 of 2:
==10919== Conditional jump or move depends on uninitialised value(s)
==10919== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10919== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10919== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10919== by 0x40EFC2: execbuiltin (builtin.c:450)
==10919== by 0x42D8E9: execcmd (exec.c:3378)
==10919== by 0x428CA0: execpline2 (exec.c:1697)
==10919== by 0x427FD2: execpline (exec.c:1484)
==10919== by 0x42779A: execlist (exec.c:1275)
==10919== by 0x42717C: execode (exec.c:1073)
==10919== by 0x431299: runshfunc (exec.c:5040)
==10919== by 0x430E76: doshfunc (exec.c:4920)
==10919== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10919==
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10920-- Caught __NR_exit; running __libc_freeres()
==10920== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10920-by-pythonnut-on-???
==10920== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10920-by-pythonnut-on-???
==10920== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10920-by-pythonnut-on-???
==10920==
==10920== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10920== don't want to do, unless you know exactly what you're doing,
==10920== or are doing some strange experiment):
==10920== /usr/lib/valgrind/../../bin/vgdb --pid=10920 ...command...
==10920==
==10920== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10920== /path/to/gdb ./zsh
==10920== and then give GDB the following command
==10920== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10920
==10920== --pid is optional if only one valgrind process is running
==10920==
--10920-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10920==
==10920== HEAP SUMMARY:
==10920== in use at exit: 3,131,620 bytes in 69,319 blocks
==10920== total heap usage: 1,736,988 allocs, 1,667,669 frees, 139,939,428 bytes allocated
==10920==
==10920== Searching for pointers to 69,319 not-freed blocks
--10920-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10920-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10920-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10920-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10920-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10920-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10920-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10920-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10920-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10920-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10920-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10920-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10920-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10920-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10920-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10920-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10920-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10920-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10920-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10920-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10920-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10920-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10920-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10920-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10920-- Scanning root segment: 0x701a000..0x701afff (4096)
--10920-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10920-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10920-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10920-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10920-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10920-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10920-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10920-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10920-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10920-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10920== Checked 4,789,864 bytes
==10920==
==10920== LEAK SUMMARY:
==10920== definitely lost: 3,173 bytes in 18 blocks
==10920== indirectly lost: 6,756 bytes in 7 blocks
==10920== possibly lost: 0 bytes in 0 blocks
==10920== still reachable: 3,121,691 bytes in 69,294 blocks
==10920== suppressed: 0 bytes in 0 blocks
==10920== Rerun with --leak-check=full to see details of leaked memory
==10920==
==10920== Use --track-origins=yes to see where uninitialised values come from
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10920==
==10920== 1 errors in context 1 of 2:
==10920== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10920== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10920== by 0x488CD0: stringsubst (subst.c:301)
==10920== by 0x48801B: prefork (subst.c:77)
==10920== by 0x42B318: execcmd (exec.c:2619)
==10920== by 0x428CA0: execpline2 (exec.c:1697)
==10920== by 0x427FD2: execpline (exec.c:1484)
==10920== by 0x427756: execlist (exec.c:1267)
==10920== by 0x42717C: execode (exec.c:1073)
==10920== by 0x431299: runshfunc (exec.c:5040)
==10920== by 0x430E76: doshfunc (exec.c:4920)
==10920== by 0x4302FB: execshfunc (exec.c:4557)
==10920== by 0x42D8C1: execcmd (exec.c:3373)
==10920==
==10920==
==10920== 2 errors in context 2 of 2:
==10920== Conditional jump or move depends on uninitialised value(s)
==10920== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10920== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10920== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10920== by 0x40EFC2: execbuiltin (builtin.c:450)
==10920== by 0x42D8E9: execcmd (exec.c:3378)
==10920== by 0x428CA0: execpline2 (exec.c:1697)
==10920== by 0x427FD2: execpline (exec.c:1484)
==10920== by 0x42779A: execlist (exec.c:1275)
==10920== by 0x42717C: execode (exec.c:1073)
==10920== by 0x431299: runshfunc (exec.c:5040)
==10920== by 0x430E76: doshfunc (exec.c:4920)
==10920== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10920==
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10921-by-pythonnut-on-???
==10921== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10921-by-pythonnut-on-???
==10921== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10921-by-pythonnut-on-???
==10921==
==10921== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10921== don't want to do, unless you know exactly what you're doing,
==10921== or are doing some strange experiment):
==10921== /usr/lib/valgrind/../../bin/vgdb --pid=10921 ...command...
==10921==
==10921== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10921== /path/to/gdb ./zsh
==10921== and then give GDB the following command
==10921== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10921
==10921== --pid is optional if only one valgrind process is running
==10921==
--10921-- Caught __NR_exit; running __libc_freeres()
--10921-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10921==
==10921== HEAP SUMMARY:
==10921== in use at exit: 3,138,594 bytes in 69,516 blocks
==10921== total heap usage: 1,737,268 allocs, 1,667,752 frees, 139,957,438 bytes allocated
==10921==
==10921== Searching for pointers to 69,516 not-freed blocks
--10921-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10921-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10921-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10921-- Scanning root segment: 0x4037000..0x403afff (16384)
--10921-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10921-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10921-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10921-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10921-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10921-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10921-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10921-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10921-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10921-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10921-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10921-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10921-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10921-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10921-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10921-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10921-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10921-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10921-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10921-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10921-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10921-- Scanning root segment: 0x701a000..0x701afff (4096)
--10921-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10921-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10921-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10921-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10921-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10921-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10921-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10921-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10921-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10921-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10921== Checked 4,820,752 bytes
==10921==
==10921== LEAK SUMMARY:
==10921== definitely lost: 3,173 bytes in 18 blocks
==10921== indirectly lost: 6,756 bytes in 7 blocks
==10921== possibly lost: 0 bytes in 0 blocks
==10921== still reachable: 3,128,665 bytes in 69,491 blocks
==10921== suppressed: 0 bytes in 0 blocks
==10921== Rerun with --leak-check=full to see details of leaked memory
==10921==
==10921== Use --track-origins=yes to see where uninitialised values come from
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921==
==10921== 1 errors in context 1 of 2:
==10921== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10921== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10921== by 0x488CD0: stringsubst (subst.c:301)
==10921== by 0x48801B: prefork (subst.c:77)
==10921== by 0x42B318: execcmd (exec.c:2619)
==10921== by 0x428CA0: execpline2 (exec.c:1697)
==10921== by 0x427FD2: execpline (exec.c:1484)
==10921== by 0x427756: execlist (exec.c:1267)
==10921== by 0x42717C: execode (exec.c:1073)
==10921== by 0x431299: runshfunc (exec.c:5040)
==10921== by 0x430E76: doshfunc (exec.c:4920)
==10921== by 0x4302FB: execshfunc (exec.c:4557)
==10921== by 0x42D8C1: execcmd (exec.c:3373)
==10921==
==10921==
==10921== 2 errors in context 2 of 2:
==10921== Conditional jump or move depends on uninitialised value(s)
==10921== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10921== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10921== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10921== by 0x40EFC2: execbuiltin (builtin.c:450)
==10921== by 0x42D8E9: execcmd (exec.c:3378)
==10921== by 0x428CA0: execpline2 (exec.c:1697)
==10921== by 0x427FD2: execpline (exec.c:1484)
==10921== by 0x42779A: execlist (exec.c:1275)
==10921== by 0x42717C: execode (exec.c:1073)
==10921== by 0x431299: runshfunc (exec.c:5040)
==10921== by 0x430E76: doshfunc (exec.c:4920)
==10921== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10921==
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10922-by-pythonnut-on-???
==10922== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10922-by-pythonnut-on-???
==10922== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10922-by-pythonnut-on-???
==10922==
==10922== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10922== don't want to do, unless you know exactly what you're doing,
==10922== or are doing some strange experiment):
==10922== /usr/lib/valgrind/../../bin/vgdb --pid=10922 ...command...
==10922==
==10922== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10922== /path/to/gdb ./zsh
==10922== and then give GDB the following command
==10922== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10922
==10922== --pid is optional if only one valgrind process is running
==10922==
--10922-- Caught __NR_exit; running __libc_freeres()
--10922-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10922==
==10922== HEAP SUMMARY:
==10922== in use at exit: 3,138,737 bytes in 69,516 blocks
==10922== total heap usage: 1,737,276 allocs, 1,667,760 frees, 139,960,494 bytes allocated
==10922==
==10922== Searching for pointers to 69,516 not-freed blocks
--10922-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10922-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10922-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10922-- Scanning root segment: 0x4037000..0x403afff (16384)
--10922-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10922-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10922-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10922-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10922-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10922-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10922-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10922-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10922-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10922-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10922-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10922-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10922-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10922-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10922-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10922-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10922-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10922-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10922-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10922-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10922-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10922-- Scanning root segment: 0x701a000..0x701afff (4096)
--10922-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10922-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10922-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10922-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10922-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10922-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10922-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10922-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10922-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10922-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10922== Checked 4,822,248 bytes
==10922==
==10922== LEAK SUMMARY:
==10922== definitely lost: 3,173 bytes in 18 blocks
==10922== indirectly lost: 6,756 bytes in 7 blocks
==10922== possibly lost: 0 bytes in 0 blocks
==10922== still reachable: 3,128,808 bytes in 69,491 blocks
==10922== suppressed: 0 bytes in 0 blocks
==10922== Rerun with --leak-check=full to see details of leaked memory
==10922==
==10922== Use --track-origins=yes to see where uninitialised values come from
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922==
==10922== 1 errors in context 1 of 2:
==10922== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10922== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10922== by 0x488CD0: stringsubst (subst.c:301)
==10922== by 0x48801B: prefork (subst.c:77)
==10922== by 0x42B318: execcmd (exec.c:2619)
==10922== by 0x428CA0: execpline2 (exec.c:1697)
==10922== by 0x427FD2: execpline (exec.c:1484)
==10922== by 0x427756: execlist (exec.c:1267)
==10922== by 0x42717C: execode (exec.c:1073)
==10922== by 0x431299: runshfunc (exec.c:5040)
==10922== by 0x430E76: doshfunc (exec.c:4920)
==10922== by 0x4302FB: execshfunc (exec.c:4557)
==10922== by 0x42D8C1: execcmd (exec.c:3373)
==10922==
==10922==
==10922== 2 errors in context 2 of 2:
==10922== Conditional jump or move depends on uninitialised value(s)
==10922== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10922== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10922== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10922== by 0x40EFC2: execbuiltin (builtin.c:450)
==10922== by 0x42D8E9: execcmd (exec.c:3378)
==10922== by 0x428CA0: execpline2 (exec.c:1697)
==10922== by 0x427FD2: execpline (exec.c:1484)
==10922== by 0x42779A: execlist (exec.c:1275)
==10922== by 0x42717C: execode (exec.c:1073)
==10922== by 0x431299: runshfunc (exec.c:5040)
==10922== by 0x430E76: doshfunc (exec.c:4920)
==10922== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10922==
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10925-by-pythonnut-on-???
==10925== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10925-by-pythonnut-on-???
==10925== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10925-by-pythonnut-on-???
==10925==
==10925== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10925== don't want to do, unless you know exactly what you're doing,
==10925== or are doing some strange experiment):
==10925== /usr/lib/valgrind/../../bin/vgdb --pid=10925 ...command...
==10925==
==10925== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10925== /path/to/gdb ./zsh
==10925== and then give GDB the following command
==10925== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10925
==10925== --pid is optional if only one valgrind process is running
==10925==
--10925-- Caught __NR_exit; running __libc_freeres()
--10925-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10925==
==10925== HEAP SUMMARY:
==10925== in use at exit: 3,138,613 bytes in 69,516 blocks
==10925== total heap usage: 1,737,762 allocs, 1,668,246 frees, 140,002,599 bytes allocated
==10925==
==10925== Searching for pointers to 69,516 not-freed blocks
--10925-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10925-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10925-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10925-- Scanning root segment: 0x4037000..0x403afff (16384)
--10925-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10925-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10925-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10925-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10925-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10925-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10925-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10925-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10925-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10925-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10925-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10925-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10925-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10925-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10925-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10925-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10925-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10925-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10925-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10925-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10925-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10925-- Scanning root segment: 0x701a000..0x701afff (4096)
--10925-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10925-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10925-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10925-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10925-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10925-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10925-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10925-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10925-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10925-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10925== Checked 4,820,768 bytes
==10925==
==10925== LEAK SUMMARY:
==10925== definitely lost: 3,173 bytes in 18 blocks
==10925== indirectly lost: 6,756 bytes in 7 blocks
==10925== possibly lost: 0 bytes in 0 blocks
==10925== still reachable: 3,128,684 bytes in 69,491 blocks
==10925== suppressed: 0 bytes in 0 blocks
==10925== Rerun with --leak-check=full to see details of leaked memory
==10925==
==10925== Use --track-origins=yes to see where uninitialised values come from
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925==
==10925== 1 errors in context 1 of 2:
==10925== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10925== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10925== by 0x488CD0: stringsubst (subst.c:301)
==10925== by 0x48801B: prefork (subst.c:77)
==10925== by 0x42B318: execcmd (exec.c:2619)
==10925== by 0x428CA0: execpline2 (exec.c:1697)
==10925== by 0x427FD2: execpline (exec.c:1484)
==10925== by 0x427756: execlist (exec.c:1267)
==10925== by 0x42717C: execode (exec.c:1073)
==10925== by 0x431299: runshfunc (exec.c:5040)
==10925== by 0x430E76: doshfunc (exec.c:4920)
==10925== by 0x4302FB: execshfunc (exec.c:4557)
==10925== by 0x42D8C1: execcmd (exec.c:3373)
==10925==
==10925==
==10925== 2 errors in context 2 of 2:
==10925== Conditional jump or move depends on uninitialised value(s)
==10925== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10925== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10925== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10925== by 0x40EFC2: execbuiltin (builtin.c:450)
==10925== by 0x42D8E9: execcmd (exec.c:3378)
==10925== by 0x428CA0: execpline2 (exec.c:1697)
==10925== by 0x427FD2: execpline (exec.c:1484)
==10925== by 0x42779A: execlist (exec.c:1275)
==10925== by 0x42717C: execode (exec.c:1073)
==10925== by 0x431299: runshfunc (exec.c:5040)
==10925== by 0x430E76: doshfunc (exec.c:4920)
==10925== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10925==
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10926-by-pythonnut-on-???
==10926== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10926-by-pythonnut-on-???
==10926== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10926-by-pythonnut-on-???
==10926==
==10926== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10926== don't want to do, unless you know exactly what you're doing,
==10926== or are doing some strange experiment):
==10926== /usr/lib/valgrind/../../bin/vgdb --pid=10926 ...command...
==10926==
==10926== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10926== /path/to/gdb ./zsh
==10926== and then give GDB the following command
==10926== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10926
==10926== --pid is optional if only one valgrind process is running
==10926==
--10926-- Caught __NR_exit; running __libc_freeres()
--10926-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10926==
==10926== HEAP SUMMARY:
==10926== in use at exit: 3,138,756 bytes in 69,516 blocks
==10926== total heap usage: 1,737,770 allocs, 1,668,254 frees, 140,005,655 bytes allocated
==10926==
==10926== Searching for pointers to 69,516 not-freed blocks
--10926-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10926-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10926-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10926-- Scanning root segment: 0x4037000..0x403afff (16384)
--10926-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10926-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10926-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10926-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10926-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10926-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10926-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10926-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10926-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10926-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10926-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10926-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10926-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10926-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10926-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10926-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10926-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10926-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10926-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10926-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10926-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10926-- Scanning root segment: 0x701a000..0x701afff (4096)
--10926-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10926-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10926-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10926-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10926-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10926-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10926-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10926-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10926-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10926-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10926== Checked 4,822,264 bytes
==10926==
==10926== LEAK SUMMARY:
==10926== definitely lost: 3,173 bytes in 18 blocks
==10926== indirectly lost: 6,756 bytes in 7 blocks
==10926== possibly lost: 0 bytes in 0 blocks
==10926== still reachable: 3,128,827 bytes in 69,491 blocks
==10926== suppressed: 0 bytes in 0 blocks
==10926== Rerun with --leak-check=full to see details of leaked memory
==10926==
==10926== Use --track-origins=yes to see where uninitialised values come from
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926==
==10926== 1 errors in context 1 of 2:
==10926== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10926== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10926== by 0x488CD0: stringsubst (subst.c:301)
==10926== by 0x48801B: prefork (subst.c:77)
==10926== by 0x42B318: execcmd (exec.c:2619)
==10926== by 0x428CA0: execpline2 (exec.c:1697)
==10926== by 0x427FD2: execpline (exec.c:1484)
==10926== by 0x427756: execlist (exec.c:1267)
==10926== by 0x42717C: execode (exec.c:1073)
==10926== by 0x431299: runshfunc (exec.c:5040)
==10926== by 0x430E76: doshfunc (exec.c:4920)
==10926== by 0x4302FB: execshfunc (exec.c:4557)
==10926== by 0x42D8C1: execcmd (exec.c:3373)
==10926==
==10926==
==10926== 2 errors in context 2 of 2:
==10926== Conditional jump or move depends on uninitialised value(s)
==10926== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10926== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10926== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10926== by 0x40EFC2: execbuiltin (builtin.c:450)
==10926== by 0x42D8E9: execcmd (exec.c:3378)
==10926== by 0x428CA0: execpline2 (exec.c:1697)
==10926== by 0x427FD2: execpline (exec.c:1484)
==10926== by 0x42779A: execlist (exec.c:1275)
==10926== by 0x42717C: execode (exec.c:1073)
==10926== by 0x431299: runshfunc (exec.c:5040)
==10926== by 0x430E76: doshfunc (exec.c:4920)
==10926== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10926==
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10927-by-pythonnut-on-???
==10927== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10927-by-pythonnut-on-???
==10927== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10927-by-pythonnut-on-???
==10927==
==10927== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10927== don't want to do, unless you know exactly what you're doing,
==10927== or are doing some strange experiment):
==10927== /usr/lib/valgrind/../../bin/vgdb --pid=10927 ...command...
==10927==
==10927== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10927== /path/to/gdb ./zsh
==10927== and then give GDB the following command
==10927== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10927
==10927== --pid is optional if only one valgrind process is running
==10927==
==10928== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10928-by-pythonnut-on-???
==10928== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10928-by-pythonnut-on-???
==10928== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10928-by-pythonnut-on-???
==10928==
==10928== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10928== don't want to do, unless you know exactly what you're doing,
==10928== or are doing some strange experiment):
==10928== /usr/lib/valgrind/../../bin/vgdb --pid=10928 ...command...
==10928==
==10928== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10928== /path/to/gdb ./zsh
==10928== and then give GDB the following command
==10928== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10928
==10928== --pid is optional if only one valgrind process is running
==10928==
==10930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10930-by-pythonnut-on-???
==10930== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10930-by-pythonnut-on-???
==10930== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10930-by-pythonnut-on-???
==10930==
==10930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10930== don't want to do, unless you know exactly what you're doing,
==10930== or are doing some strange experiment):
==10930== /usr/lib/valgrind/../../bin/vgdb --pid=10930 ...command...
==10930==
==10930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10930== /path/to/gdb ./zsh
==10930== and then give GDB the following command
==10930== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10930
==10930== --pid is optional if only one valgrind process is running
==10930==
--10929-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005, addr 0xFFEFF3EAC, len 4
==10929== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10929-by-pythonnut-on-???
==10931== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10931-by-pythonnut-on-???
==10929== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10929-by-pythonnut-on-???
==10931== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10931-by-pythonnut-on-???
==10929== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10929-by-pythonnut-on-???
==10931== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10931-by-pythonnut-on-???
==10929==
==10931==
==10929== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10929== don't want to do, unless you know exactly what you're doing,
==10929== or are doing some strange experiment):
==10929== /usr/lib/valgrind/../../bin/vgdb --pid=10929 ...command...
==10929==
==10931== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10931== don't want to do, unless you know exactly what you're doing,
==10931== or are doing some strange experiment):
==10931== /usr/lib/valgrind/../../bin/vgdb --pid=10931 ...command...
==10929== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10929== /path/to/gdb ./zsh
==10929== and then give GDB the following command
==10929== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10929
==10931==
==10929== --pid is optional if only one valgrind process is running
==10929==
==10931== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10931== /path/to/gdb ./zsh
==10931== and then give GDB the following command
==10931== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10931
==10931== --pid is optional if only one valgrind process is running
==10931==
==10932== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10932-by-pythonnut-on-???
==10932== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10932-by-pythonnut-on-???
==10932== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10932-by-pythonnut-on-???
==10932==
==10932== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10932== don't want to do, unless you know exactly what you're doing,
==10932== or are doing some strange experiment):
==10932== /usr/lib/valgrind/../../bin/vgdb --pid=10932 ...command...
==10932==
==10932== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10932== /path/to/gdb ./zsh
==10932== and then give GDB the following command
==10932== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10932
==10932== --pid is optional if only one valgrind process is running
==10932==
--10929-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10933-by-pythonnut-on-???
==10933== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10933-by-pythonnut-on-???
==10933== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10933-by-pythonnut-on-???
==10933==
==10933== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10933== don't want to do, unless you know exactly what you're doing,
==10933== or are doing some strange experiment):
==10933== /usr/lib/valgrind/../../bin/vgdb --pid=10933 ...command...
==10933==
==10933== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10933== /path/to/gdb ./zsh
==10933== and then give GDB the following command
==10933== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10933
==10933== --pid is optional if only one valgrind process is running
==10933==
==10929==
==10929== HEAP SUMMARY:
==10929== in use at exit: 3,113,529 bytes in 68,956 blocks
==10929== total heap usage: 1,738,007 allocs, 1,669,051 frees, 140,036,781 bytes allocated
==10929==
client request: code 4d430005, addr 0xFFEFE66FC, len 4
--10933-- Caught __NR_exit; running __libc_freeres()
==10929== Searching for pointers to 68,956 not-freed blocks
--10929-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10929-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10929-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10929-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10929-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10929-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10929-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10929-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10929-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10929-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10929-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10929-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10929-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10929-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10929-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10929-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10929-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10929-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10929-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10929-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10929-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10929-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10929-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10929-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10929-- Scanning root segment: 0x701a000..0x701afff (4096)
--10929-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10929-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10929-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10929-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10929-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10929-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10929-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10929-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10929-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10929-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10933-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933==
==10933== HEAP SUMMARY:
==10933== in use at exit: 3,137,594 bytes in 69,547 blocks
==10933== total heap usage: 1,599,659 allocs, 1,530,112 frees, 129,165,578 bytes allocated
==10933==
==10933== Searching for pointers to 69,547 not-freed blocks
--10933-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10933-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10933-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10933-- Scanning root segment: 0x4037000..0x403efff (32768)
--10933-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10933-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10933-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10933-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10933-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10933-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10933-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10933-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10933-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10933-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10933-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10933-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10933-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10933-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10933-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10933-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10933-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10933-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10933-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10933-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10933-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10933-- Scanning root segment: 0x701a000..0x701afff (4096)
--10933-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10933-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10933-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10933-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10933-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10933-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10933-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10933-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10933-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10933-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10929== Checked 4,769,864 bytes
==10929==
==10929== LEAK SUMMARY:
==10929== definitely lost: 3,173 bytes in 18 blocks
==10929== indirectly lost: 6,756 bytes in 7 blocks
==10929== possibly lost: 0 bytes in 0 blocks
==10929== still reachable: 3,103,600 bytes in 68,931 blocks
==10929== suppressed: 0 bytes in 0 blocks
==10929== Rerun with --leak-check=full to see details of leaked memory
==10929==
==10929== Use --track-origins=yes to see where uninitialised values come from
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10929==
==10929== 1 errors in context 1 of 2:
==10929== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10929== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10929== by 0x488CD0: stringsubst (subst.c:301)
==10929== by 0x48801B: prefork (subst.c:77)
==10929== by 0x42B318: execcmd (exec.c:2619)
==10929== by 0x428CA0: execpline2 (exec.c:1697)
==10929== by 0x427FD2: execpline (exec.c:1484)
==10929== by 0x427756: execlist (exec.c:1267)
==10929== by 0x42717C: execode (exec.c:1073)
==10929== by 0x431299: runshfunc (exec.c:5040)
==10929== by 0x430E76: doshfunc (exec.c:4920)
==10929== by 0x4302FB: execshfunc (exec.c:4557)
==10929== by 0x42D8C1: execcmd (exec.c:3373)
==10929==
==10929==
==10929== 2 errors in context 2 of 2:
==10929== Conditional jump or move depends on uninitialised value(s)
==10929== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10929== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933== Checked 4,841,504 bytes
==10929== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933==
==10929== by 0x40EFC2: execbuiltin (builtin.c:450)
==10929== by 0x42D8E9: execcmd (exec.c:3378)
==10929== by 0x428CA0: execpline2 (exec.c:1697)
==10929== by 0x427FD2: execpline (exec.c:1484)
==10929== by 0x42779A: execlist (exec.c:1275)
==10929== by 0x42717C: execode (exec.c:1073)
==10929== by 0x431299: runshfunc (exec.c:5040)
==10929== by 0x430E76: doshfunc (exec.c:4920)
==10929== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10929==
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Caught __NR_exit; running __libc_freeres()
==10933== LEAK SUMMARY:
==10933== definitely lost: 2,221 bytes in 14 blocks
==10933== indirectly lost: 6,796 bytes in 9 blocks
==10933== possibly lost: 0 bytes in 0 blocks
==10933== still reachable: 3,128,577 bytes in 69,524 blocks
==10933== suppressed: 0 bytes in 0 blocks
==10933== Rerun with --leak-check=full to see details of leaked memory
==10933==
==10933== Use --track-origins=yes to see where uninitialised values come from
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10933==
==10933== 1 errors in context 1 of 2:
==10933== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10933== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10933== by 0x488CD0: stringsubst (subst.c:301)
==10933== by 0x48801B: prefork (subst.c:77)
==10933== by 0x42B318: execcmd (exec.c:2619)
==10933== by 0x428CA0: execpline2 (exec.c:1697)
==10933== by 0x427FD2: execpline (exec.c:1484)
==10933== by 0x427756: execlist (exec.c:1267)
==10933== by 0x42717C: execode (exec.c:1073)
==10933== by 0x431299: runshfunc (exec.c:5040)
==10933== by 0x430E76: doshfunc (exec.c:4920)
==10933== by 0x4302FB: execshfunc (exec.c:4557)
==10933== by 0x42D8C1: execcmd (exec.c:3373)
==10933==
==10933==
==10933== 2 errors in context 2 of 2:
==10933== Conditional jump or move depends on uninitialised value(s)
==10933== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10933== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933== by 0x40EFC2: execbuiltin (builtin.c:450)
==10933== by 0x42D8E9: execcmd (exec.c:3378)
==10933== by 0x428CA0: execpline2 (exec.c:1697)
==10933== by 0x427FD2: execpline (exec.c:1484)
==10933== by 0x42779A: execlist (exec.c:1275)
==10933== by 0x42717C: execode (exec.c:1073)
==10933== by 0x431299: runshfunc (exec.c:5040)
==10933== by 0x430E76: doshfunc (exec.c:4920)
==10933== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10933==
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10927==
==10927== HEAP SUMMARY:
==10927== in use at exit: 3,113,138 bytes in 68,946 blocks
==10927== total heap usage: 1,738,009 allocs, 1,669,063 frees, 140,037,325 bytes allocated
==10927==
client request: code 4d430005, addr 0xFFEFE6BAC, len 4
==10927== Searching for pointers to 68,946 not-freed blocks
--10927-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10927-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10927-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10927-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10927-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10927-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10927-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10927-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10927-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10927-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10927-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10927-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10927-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10927-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10927-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10927-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10927-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10927-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10927-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10927-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10927-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10927-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10927-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10927-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10927-- Scanning root segment: 0x701a000..0x701afff (4096)
--10927-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10927-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10927-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10927-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10927-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10927-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10927-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10927-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10927-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10927-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10927== Checked 4,767,520 bytes
==10927==
--10935-- Caught __NR_exit; running __libc_freeres()
==10927== LEAK SUMMARY:
==10927== definitely lost: 3,173 bytes in 18 blocks
==10927== indirectly lost: 6,756 bytes in 7 blocks
==10927== possibly lost: 0 bytes in 0 blocks
==10927== still reachable: 3,103,209 bytes in 68,921 blocks
==10927== suppressed: 0 bytes in 0 blocks
==10927== Rerun with --leak-check=full to see details of leaked memory
==10927==
==10927== Use --track-origins=yes to see where uninitialised values come from
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927==
==10927== 1 errors in context 1 of 2:
==10927== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10927== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10927== by 0x488CD0: stringsubst (subst.c:301)
==10927== by 0x48801B: prefork (subst.c:77)
==10927== by 0x42B318: execcmd (exec.c:2619)
==10927== by 0x428CA0: execpline2 (exec.c:1697)
==10927== by 0x427FD2: execpline (exec.c:1484)
==10927== by 0x427756: execlist (exec.c:1267)
==10927== by 0x42717C: execode (exec.c:1073)
==10927== by 0x431299: runshfunc (exec.c:5040)
==10927== by 0x430E76: doshfunc (exec.c:4920)
==10927== by 0x4302FB: execshfunc (exec.c:4557)
==10927== by 0x42D8C1: execcmd (exec.c:3373)
==10927==
==10927==
==10927== 2 errors in context 2 of 2:
==10927== Conditional jump or move depends on uninitialised value(s)
==10927== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10927== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10927== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10927== by 0x40EFC2: execbuiltin (builtin.c:450)
==10927== by 0x42D8E9: execcmd (exec.c:3378)
==10927== by 0x428CA0: execpline2 (exec.c:1697)
==10927== by 0x427FD2: execpline (exec.c:1484)
==10927== by 0x42779A: execlist (exec.c:1275)
==10927== by 0x42717C: execode (exec.c:1073)
==10927== by 0x431299: runshfunc (exec.c:5040)
==10927== by 0x430E76: doshfunc (exec.c:4920)
==10927== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10927==
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10935-by-pythonnut-on-???
==10935== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10935-by-pythonnut-on-???
==10935== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10935-by-pythonnut-on-???
==10935==
==10935== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10935== don't want to do, unless you know exactly what you're doing,
==10935== or are doing some strange experiment):
==10935== /usr/lib/valgrind/../../bin/vgdb --pid=10935 ...command...
==10935==
==10935== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10935== /path/to/gdb ./zsh
==10935== and then give GDB the following command
==10935== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10935
==10935== --pid is optional if only one valgrind process is running
==10935==
--10935-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935==
==10935== HEAP SUMMARY:
==10935== in use at exit: 3,137,839 bytes in 69,552 blocks
==10935== total heap usage: 1,599,671 allocs, 1,530,119 frees, 129,169,479 bytes allocated
==10935==
--10984-- Caught __NR_exit; running __libc_freeres()
==10984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10984-by-pythonnut-on-???
==10985== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10985-by-pythonnut-on-???
==10984== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10984-by-pythonnut-on-???
==10985== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10985-by-pythonnut-on-???
==10984== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10984-by-pythonnut-on-???
==10985== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10985-by-pythonnut-on-???
==10984==
==10985==
==10984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10984== don't want to do, unless you know exactly what you're doing,
==10984== or are doing some strange experiment):
==10984== /usr/lib/valgrind/../../bin/vgdb --pid=10984 ...command...
==10985== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10985== don't want to do, unless you know exactly what you're doing,
==10985== or are doing some strange experiment):
==10985== /usr/lib/valgrind/../../bin/vgdb --pid=10985 ...command...
==10984==
==10985==
==10984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10984== /path/to/gdb ./zsh
==10984== and then give GDB the following command
==10984== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10984
==10985== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10985== /path/to/gdb ./zsh
==10985== and then give GDB the following command
==10985== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10985
==10984== --pid is optional if only one valgrind process is running
==10985== --pid is optional if only one valgrind process is running
==10984==
==10985==
client request: code 4d430005, addr 0xFFEFF268C, len 4
==10988== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10988-by-pythonnut-on-???
==10988== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10988-by-pythonnut-on-???
==10988== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10988-by-pythonnut-on-???
==10988==
==10988== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10988== don't want to do, unless you know exactly what you're doing,
==10988== or are doing some strange experiment):
==10988== /usr/lib/valgrind/../../bin/vgdb --pid=10988 ...command...
==10988==
==10988== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10988== /path/to/gdb ./zsh
==10988== and then give GDB the following command
==10988== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10988
==10988== --pid is optional if only one valgrind process is running
==10988==
--10984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935== Searching for pointers to 69,552 not-freed blocks
--10935-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
client request: code 4d430005, addr 0xFFEFF25EC, len 4
--10935-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10935-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10935-- Scanning root segment: 0x4037000..0x403efff (32768)
--10935-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10935-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10935-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10935-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10935-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10935-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10935-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10935-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10935-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10935-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10935-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10935-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10935-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10935-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10935-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10935-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10935-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10935-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10935-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10935-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10935-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10935-- Scanning root segment: 0x701a000..0x701afff (4096)
--10935-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10935-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10935-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10935-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10935-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10935-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10935-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10935-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10935-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10935-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10984==
==10984== HEAP SUMMARY:
==10984== in use at exit: 3,113,614 bytes in 68,957 blocks
==10984== total heap usage: 1,738,040 allocs, 1,669,083 frees, 140,049,905 bytes allocated
==10984==
==10983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10983-by-pythonnut-on-???
==10983== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10983-by-pythonnut-on-???
==10983== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10983-by-pythonnut-on-???
==10983==
==10983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10983== don't want to do, unless you know exactly what you're doing,
==10983== or are doing some strange experiment):
==10983== /usr/lib/valgrind/../../bin/vgdb --pid=10983 ...command...
==10983==
==10983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10983== /path/to/gdb ./zsh
==10983== and then give GDB the following command
==10983== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10983
==10983== --pid is optional if only one valgrind process is running
==10983==
==10984== Searching for pointers to 68,957 not-freed blocks
--10984-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10984-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10984-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10984-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10984-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10984-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10984-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10984-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10984-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10984-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10984-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10984-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10984-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10984-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10984-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10984-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10984-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10984-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10984-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10984-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10984-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10984-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10984-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10984-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10984-- Scanning root segment: 0x701a000..0x701afff (4096)
--10984-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10984-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10984-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10984-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10984-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10984-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10984-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10984-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10984-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10984-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10935== Checked 4,841,472 bytes
==10935==
==10935== LEAK SUMMARY:
==10935== definitely lost: 2,221 bytes in 14 blocks
==10935== indirectly lost: 6,796 bytes in 9 blocks
==10935== possibly lost: 0 bytes in 0 blocks
==10935== still reachable: 3,128,822 bytes in 69,529 blocks
==10935== suppressed: 0 bytes in 0 blocks
==10935== Rerun with --leak-check=full to see details of leaked memory
==10935==
==10935== Use --track-origins=yes to see where uninitialised values come from
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935==
==10935== 1 errors in context 1 of 2:
==10935== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10935== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10935== by 0x488CD0: stringsubst (subst.c:301)
==10935== by 0x48801B: prefork (subst.c:77)
==10935== by 0x42B318: execcmd (exec.c:2619)
==10935== by 0x428CA0: execpline2 (exec.c:1697)
==10935== by 0x427FD2: execpline (exec.c:1484)
==10935== by 0x427756: execlist (exec.c:1267)
==10935== by 0x42717C: execode (exec.c:1073)
==10935== by 0x431299: runshfunc (exec.c:5040)
==10935== by 0x430E76: doshfunc (exec.c:4920)
==10935== by 0x4302FB: execshfunc (exec.c:4557)
==10935== by 0x42D8C1: execcmd (exec.c:3373)
==10935==
==10935==
==10935== 2 errors in context 2 of 2:
==10935== Conditional jump or move depends on uninitialised value(s)
==10935== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10935== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10935== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10935== by 0x40EFC2: execbuiltin (builtin.c:450)
==10935== by 0x42D8E9: execcmd (exec.c:3378)
==10935== by 0x428CA0: execpline2 (exec.c:1697)
==10935== by 0x427FD2: execpline (exec.c:1484)
==10935== by 0x42779A: execlist (exec.c:1275)
==10935== by 0x42717C: execode (exec.c:1073)
==10935== by 0x431299: runshfunc (exec.c:5040)
==10935== by 0x430E76: doshfunc (exec.c:4920)
==10935== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10935==
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984== Checked 4,770,648 bytes
==10984==
--10932-- Caught __NR_exit; running __libc_freeres()
==10984== LEAK SUMMARY:
==10984== definitely lost: 3,173 bytes in 18 blocks
==10984== indirectly lost: 6,756 bytes in 7 blocks
==10984== possibly lost: 0 bytes in 0 blocks
==10984== still reachable: 3,103,685 bytes in 68,932 blocks
==10984== suppressed: 0 bytes in 0 blocks
==10984== Rerun with --leak-check=full to see details of leaked memory
==10984==
==10984== Use --track-origins=yes to see where uninitialised values come from
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984==
==10984== 1 errors in context 1 of 2:
==10984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10984== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10984== by 0x488CD0: stringsubst (subst.c:301)
==10984== by 0x48801B: prefork (subst.c:77)
==10984== by 0x42B318: execcmd (exec.c:2619)
==10984== by 0x428CA0: execpline2 (exec.c:1697)
==10984== by 0x427FD2: execpline (exec.c:1484)
==10984== by 0x427756: execlist (exec.c:1267)
==10984== by 0x42717C: execode (exec.c:1073)
==10984== by 0x431299: runshfunc (exec.c:5040)
==10984== by 0x430E76: doshfunc (exec.c:4920)
==10984== by 0x4302FB: execshfunc (exec.c:4557)
==10984== by 0x42D8C1: execcmd (exec.c:3373)
==10984==
==10984==
==10984== 2 errors in context 2 of 2:
==10984== Conditional jump or move depends on uninitialised value(s)
==10984== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10984== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10984== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10984== by 0x40EFC2: execbuiltin (builtin.c:450)
==10984== by 0x42D8E9: execcmd (exec.c:3378)
==10984== by 0x428CA0: execpline2 (exec.c:1697)
==10984== by 0x427FD2: execpline (exec.c:1484)
==10984== by 0x42779A: execlist (exec.c:1275)
==10984== by 0x42717C: execode (exec.c:1073)
==10984== by 0x431299: runshfunc (exec.c:5040)
==10984== by 0x430E76: doshfunc (exec.c:4920)
==10984== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10984==
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10983-- Caught __NR_exit; running __libc_freeres()
--10932-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10932==
==10932== HEAP SUMMARY:
==10932== in use at exit: 3,135,675 bytes in 69,477 blocks
==10932== total heap usage: 1,599,622 allocs, 1,530,145 frees, 129,170,090 bytes allocated
==10932==
--10983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10983==
==10983== HEAP SUMMARY:
==10983== in use at exit: 3,113,550 bytes in 68,957 blocks
==10983== total heap usage: 1,738,044 allocs, 1,669,087 frees, 140,049,441 bytes allocated
==10983==
==10932== Searching for pointers to 69,477 not-freed blocks
--10932-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10932-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10932-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10932-- Scanning root segment: 0x4037000..0x403afff (16384)
--10932-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10932-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10932-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10932-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10932-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10932-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10932-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10932-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10932-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10932-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10932-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10932-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10932-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10932-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10932-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10932-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10932-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10932-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10932-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10932-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10932-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10932-- Scanning root segment: 0x701a000..0x701afff (4096)
--10932-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10932-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10932-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10932-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10932-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10932-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10932-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10932-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10932-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10932-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10983== Searching for pointers to 68,957 not-freed blocks
--10983-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10983-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10983-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10983-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10983-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10983-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10983-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10983-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10983-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10983-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10983-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10983-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10983-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10983-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10983-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10983-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10983-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10983-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10983-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10983-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10983-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10983-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10983-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10983-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10983-- Scanning root segment: 0x701a000..0x701afff (4096)
--10983-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10983-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10983-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10983-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10983-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10983-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10983-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10983-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10983-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10983-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10932== Checked 4,821,400 bytes
==10932==
==10983== Checked 4,770,280 bytes
==10983==
==10932== LEAK SUMMARY:
==10932== definitely lost: 2,221 bytes in 14 blocks
==10932== indirectly lost: 6,796 bytes in 9 blocks
==10932== possibly lost: 0 bytes in 0 blocks
==10932== still reachable: 3,126,658 bytes in 69,454 blocks
==10932== suppressed: 0 bytes in 0 blocks
==10932== Rerun with --leak-check=full to see details of leaked memory
==10932==
==10932== Use --track-origins=yes to see where uninitialised values come from
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10932==
==10932== 1 errors in context 1 of 2:
==10932== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10932== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10932== by 0x488CD0: stringsubst (subst.c:301)
==10932== by 0x48801B: prefork (subst.c:77)
==10932== by 0x42B318: execcmd (exec.c:2619)
==10932== by 0x428CA0: execpline2 (exec.c:1697)
==10932== by 0x427FD2: execpline (exec.c:1484)
==10932== by 0x427756: execlist (exec.c:1267)
==10932== by 0x42717C: execode (exec.c:1073)
==10932== by 0x431299: runshfunc (exec.c:5040)
==10932== by 0x430E76: doshfunc (exec.c:4920)
==10932== by 0x4302FB: execshfunc (exec.c:4557)
==10932== by 0x42D8C1: execcmd (exec.c:3373)
==10932==
==10932==
==10932== 2 errors in context 2 of 2:
==10932== Conditional jump or move depends on uninitialised value(s)
==10932== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10932== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10932== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10932== by 0x40EFC2: execbuiltin (builtin.c:450)
==10932== by 0x42D8E9: execcmd (exec.c:3378)
==10932== by 0x428CA0: execpline2 (exec.c:1697)
==10932== by 0x427FD2: execpline (exec.c:1484)
==10932== by 0x42779A: execlist (exec.c:1275)
==10932== by 0x42717C: execode (exec.c:1073)
==10932== by 0x431299: runshfunc (exec.c:5040)
==10932== by 0x430E76: doshfunc (exec.c:4920)
==10932== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10932==
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983== LEAK SUMMARY:
==10983== definitely lost: 3,173 bytes in 18 blocks
==10983== indirectly lost: 6,756 bytes in 7 blocks
==10983== possibly lost: 0 bytes in 0 blocks
==10983== still reachable: 3,103,621 bytes in 68,932 blocks
==10983== suppressed: 0 bytes in 0 blocks
==10983== Rerun with --leak-check=full to see details of leaked memory
==10983==
==10983== Use --track-origins=yes to see where uninitialised values come from
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983==
==10983== 1 errors in context 1 of 2:
==10983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10983== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10983== by 0x488CD0: stringsubst (subst.c:301)
==10983== by 0x48801B: prefork (subst.c:77)
==10983== by 0x42B318: execcmd (exec.c:2619)
==10983== by 0x428CA0: execpline2 (exec.c:1697)
==10983== by 0x427FD2: execpline (exec.c:1484)
==10983== by 0x427756: execlist (exec.c:1267)
==10983== by 0x42717C: execode (exec.c:1073)
==10983== by 0x431299: runshfunc (exec.c:5040)
==10983== by 0x430E76: doshfunc (exec.c:4920)
==10983== by 0x4302FB: execshfunc (exec.c:4557)
==10983== by 0x42D8C1: execcmd (exec.c:3373)
==10983==
==10983==
==10983== 2 errors in context 2 of 2:
==10983== Conditional jump or move depends on uninitialised value(s)
==10983== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10983== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10983== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10983== by 0x40EFC2: execbuiltin (builtin.c:450)
==10983== by 0x42D8E9: execcmd (exec.c:3378)
==10983== by 0x428CA0: execpline2 (exec.c:1697)
==10983== by 0x427FD2: execpline (exec.c:1484)
==10983== by 0x42779A: execlist (exec.c:1275)
==10983== by 0x42717C: execode (exec.c:1073)
==10983== by 0x431299: runshfunc (exec.c:5040)
==10983== by 0x430E76: doshfunc (exec.c:4920)
==10983== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10983==
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10991-by-pythonnut-on-???
==10991== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10991-by-pythonnut-on-???
==10991== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10991-by-pythonnut-on-???
==10991==
==10991== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10991== don't want to do, unless you know exactly what you're doing,
==10991== or are doing some strange experiment):
==10991== /usr/lib/valgrind/../../bin/vgdb --pid=10991 ...command...
==10991==
==10991== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10991== /path/to/gdb ./zsh
==10991== and then give GDB the following command
==10991== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10991
==10991== --pid is optional if only one valgrind process is running
==10991==
--10991-- Caught __NR_exit; running __libc_freeres()
==10992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10992-by-pythonnut-on-???
==10992== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10992-by-pythonnut-on-???
==10992== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10992-by-pythonnut-on-???
==10992==
==10992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10992== don't want to do, unless you know exactly what you're doing,
==10992== or are doing some strange experiment):
==10992== /usr/lib/valgrind/../../bin/vgdb --pid=10992 ...command...
==10992==
==10992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10992== /path/to/gdb ./zsh
==10992== and then give GDB the following command
==10992== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10992
==10992== --pid is optional if only one valgrind process is running
==10992==
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
client request: code 4d430005, addr 0xFFEFF2BDC, len 4
--10990-- Caught __NR_exit; running __libc_freeres()
--10991-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10991==
==10990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10990-by-pythonnut-on-???
==10990== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10990-by-pythonnut-on-???
==10990== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10990-by-pythonnut-on-???
==10990==
==10990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10990== don't want to do, unless you know exactly what you're doing,
==10990== or are doing some strange experiment):
==10990== /usr/lib/valgrind/../../bin/vgdb --pid=10990 ...command...
==10990==
==10990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10990== /path/to/gdb ./zsh
==10990== and then give GDB the following command
==10990== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10990
==10990== --pid is optional if only one valgrind process is running
==10990==
==10991== HEAP SUMMARY:
==10991== in use at exit: 3,137,448 bytes in 69,539 blocks
==10991== total heap usage: 1,599,691 allocs, 1,530,152 frees, 129,178,853 bytes allocated
==10991==
--10990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990==
==10990== HEAP SUMMARY:
==10990== in use at exit: 3,113,813 bytes in 68,962 blocks
==10990== total heap usage: 1,738,055 allocs, 1,669,093 frees, 140,054,529 bytes allocated
==10990==
==10991== Searching for pointers to 69,539 not-freed blocks
--10991-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10991-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10991-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10991-- Scanning root segment: 0x4037000..0x403efff (32768)
--10991-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10991-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10991-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10991-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10991-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10991-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10991-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10991-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10991-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10991-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10991-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10991-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10991-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10991-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10991-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10991-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10991-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10991-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10991-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10991-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10991-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10991-- Scanning root segment: 0x701a000..0x701afff (4096)
--10991-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10991-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10991-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10991-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10991-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10991-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10991-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10991-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10991-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10991-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10990== Searching for pointers to 68,962 not-freed blocks
--10990-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10990-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10990-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10990-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10990-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10990-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10990-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10990-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10990-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10990-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10990-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10990-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10990-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10990-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10990-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10990-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10990-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10990-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10990-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10990-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10990-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10990-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10990-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10990-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10990-- Scanning root segment: 0x701a000..0x701afff (4096)
--10990-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10990-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10990-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10990-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10990-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10990-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10990-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10990-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10990-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10990-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10991== Checked 4,840,040 bytes
==10991==
==10991== LEAK SUMMARY:
==10991== definitely lost: 2,221 bytes in 14 blocks
==10991== indirectly lost: 6,796 bytes in 9 blocks
==10991== possibly lost: 0 bytes in 0 blocks
==10991== still reachable: 3,128,431 bytes in 69,516 blocks
==10991== suppressed: 0 bytes in 0 blocks
==10991== Rerun with --leak-check=full to see details of leaked memory
==10991==
==10991== Use --track-origins=yes to see where uninitialised values come from
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991==
==10991== 1 errors in context 1 of 2:
==10991== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10991== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10991== by 0x488CD0: stringsubst (subst.c:301)
==10991== by 0x48801B: prefork (subst.c:77)
==10991== by 0x42B318: execcmd (exec.c:2619)
==10991== by 0x428CA0: execpline2 (exec.c:1697)
==10991== by 0x427FD2: execpline (exec.c:1484)
==10991== by 0x427756: execlist (exec.c:1267)
==10991== by 0x42717C: execode (exec.c:1073)
==10991== by 0x431299: runshfunc (exec.c:5040)
==10991== by 0x430E76: doshfunc (exec.c:4920)
==10991== by 0x4302FB: execshfunc (exec.c:4557)
==10991== by 0x42D8C1: execcmd (exec.c:3373)
==10991==
==10991==
==10991== 2 errors in context 2 of 2:
==10991== Conditional jump or move depends on uninitialised value(s)
==10991== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10991== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10991== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10991== by 0x40EFC2: execbuiltin (builtin.c:450)
==10991== by 0x42D8E9: execcmd (exec.c:3378)
==10991== by 0x428CA0: execpline2 (exec.c:1697)
==10991== by 0x427FD2: execpline (exec.c:1484)
==10991== by 0x42779A: execlist (exec.c:1275)
==10991== by 0x42717C: execode (exec.c:1073)
==10991== by 0x431299: runshfunc (exec.c:5040)
==10991== by 0x430E76: doshfunc (exec.c:4920)
==10991== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10991==
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10989-by-pythonnut-on-???
==10989== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10989-by-pythonnut-on-???
==10989== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10989-by-pythonnut-on-???
==10989==
==10989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10989== don't want to do, unless you know exactly what you're doing,
==10989== or are doing some strange experiment):
==10989== /usr/lib/valgrind/../../bin/vgdb --pid=10989 ...command...
==10989==
==10989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10989== /path/to/gdb ./zsh
==10989== and then give GDB the following command
==10989== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10989
==10989== --pid is optional if only one valgrind process is running
==10989==
--10989-- Caught __NR_exit; running __libc_freeres()
==10990== Checked 4,770,264 bytes
==10990==
--10989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990== LEAK SUMMARY:
==10990== definitely lost: 3,173 bytes in 18 blocks
==10990== indirectly lost: 6,756 bytes in 7 blocks
==10990== possibly lost: 0 bytes in 0 blocks
==10990== still reachable: 3,103,884 bytes in 68,937 blocks
==10990== suppressed: 0 bytes in 0 blocks
==10990== Rerun with --leak-check=full to see details of leaked memory
==10990==
==10990== Use --track-origins=yes to see where uninitialised values come from
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10990==
==10990== 1 errors in context 1 of 2:
==10990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10990== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10990== by 0x488CD0: stringsubst (subst.c:301)
==10990== by 0x48801B: prefork (subst.c:77)
==10990== by 0x42B318: execcmd (exec.c:2619)
==10990== by 0x428CA0: execpline2 (exec.c:1697)
==10990== by 0x427FD2: execpline (exec.c:1484)
==10990== by 0x427756: execlist (exec.c:1267)
==10990== by 0x42717C: execode (exec.c:1073)
==10990== by 0x431299: runshfunc (exec.c:5040)
==10990== by 0x430E76: doshfunc (exec.c:4920)
==10990== by 0x4302FB: execshfunc (exec.c:4557)
==10990== by 0x42D8C1: execcmd (exec.c:3373)
==10990==
==10990==
==10990== 2 errors in context 2 of 2:
==10990== Conditional jump or move depends on uninitialised value(s)
==10990== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10990== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10990== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10990== by 0x40EFC2: execbuiltin (builtin.c:450)
==10990== by 0x42D8E9: execcmd (exec.c:3378)
==10990== by 0x428CA0: execpline2 (exec.c:1697)
==10990== by 0x427FD2: execpline (exec.c:1484)
==10990== by 0x42779A: execlist (exec.c:1275)
==10990== by 0x42717C: execode (exec.c:1073)
==10990== by 0x431299: runshfunc (exec.c:5040)
==10990== by 0x430E76: doshfunc (exec.c:4920)
==10990== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10990==
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989==
==10989== HEAP SUMMARY:
==10989== in use at exit: 3,137,384 bytes in 69,536 blocks
==10989== total heap usage: 1,599,693 allocs, 1,530,157 frees, 129,179,397 bytes allocated
==10989==
==10989== Searching for pointers to 69,536 not-freed blocks
--10989-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10989-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10989-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10989-- Scanning root segment: 0x4037000..0x403efff (32768)
--10989-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10989-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10989-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10989-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10989-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10989-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10989-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10989-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10989-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10989-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10989-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10989-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10989-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10989-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10989-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10989-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10989-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10989-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10989-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10989-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10989-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10989-- Scanning root segment: 0x701a000..0x701afff (4096)
--10989-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10989-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10989-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10989-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10989-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10989-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10989-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10989-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10989-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10989-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF272C, len 4
==10995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10995-by-pythonnut-on-???
==10995== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10995-by-pythonnut-on-???
==10995== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10995-by-pythonnut-on-???
==10995==
==10995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10995== don't want to do, unless you know exactly what you're doing,
==10995== or are doing some strange experiment):
==10995== /usr/lib/valgrind/../../bin/vgdb --pid=10995 ...command...
==10995==
==10995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10995== /path/to/gdb ./zsh
==10995== and then give GDB the following command
==10995== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10995
==10995== --pid is optional if only one valgrind process is running
==10995==
--10994-- Caught __NR_exit; running __libc_freeres()
==10994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10994-by-pythonnut-on-???
==10994== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10994-by-pythonnut-on-???
==10994== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10994-by-pythonnut-on-???
==10994==
==10994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10994== don't want to do, unless you know exactly what you're doing,
==10994== or are doing some strange experiment):
==10994== /usr/lib/valgrind/../../bin/vgdb --pid=10994 ...command...
==10994==
==10994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10994== /path/to/gdb ./zsh
==10994== and then give GDB the following command
==10994== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10994
==10994== --pid is optional if only one valgrind process is running
==10994==
--10994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10994==
==10994== HEAP SUMMARY:
==10994== in use at exit: 3,113,920 bytes in 68,966 blocks
==10994== total heap usage: 1,738,063 allocs, 1,669,097 frees, 140,056,748 bytes allocated
==10994==
==10994== Searching for pointers to 68,966 not-freed blocks
--10994-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10994-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10994-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10994-- Scanning root segment: 0x4037000..0x403afff (16384)
--10994-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10994-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10994-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10994-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10994-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10994-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10994-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10994-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10994-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10994-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10994-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10994-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10994-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10994-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10994-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10994-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10994-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10994-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10994-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10994-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10994-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10994-- Scanning root segment: 0x701a000..0x701afff (4096)
--10994-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10994-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10994-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10994-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10994-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10994-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10994-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10994-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10994-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10994-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10989== Checked 4,839,352 bytes
==10989==
==10989== LEAK SUMMARY:
==10989== definitely lost: 2,221 bytes in 14 blocks
==10989== indirectly lost: 6,796 bytes in 9 blocks
==10989== possibly lost: 0 bytes in 0 blocks
==10989== still reachable: 3,128,367 bytes in 69,513 blocks
==10989== suppressed: 0 bytes in 0 blocks
==10989== Rerun with --leak-check=full to see details of leaked memory
==10989==
==10989== Use --track-origins=yes to see where uninitialised values come from
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989==
==10989== 1 errors in context 1 of 2:
==10989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10989== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10989== by 0x488CD0: stringsubst (subst.c:301)
==10989== by 0x48801B: prefork (subst.c:77)
==10989== by 0x42B318: execcmd (exec.c:2619)
==10989== by 0x428CA0: execpline2 (exec.c:1697)
==10989== by 0x427FD2: execpline (exec.c:1484)
==10989== by 0x427756: execlist (exec.c:1267)
==10989== by 0x42717C: execode (exec.c:1073)
==10989== by 0x431299: runshfunc (exec.c:5040)
==10989== by 0x430E76: doshfunc (exec.c:4920)
==10989== by 0x4302FB: execshfunc (exec.c:4557)
==10989== by 0x42D8C1: execcmd (exec.c:3373)
==10989==
==10989==
==10989== 2 errors in context 2 of 2:
==10989== Conditional jump or move depends on uninitialised value(s)
==10989== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10989== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10989== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10989== by 0x40EFC2: execbuiltin (builtin.c:450)
==10989== by 0x42D8E9: execcmd (exec.c:3378)
==10989== by 0x428CA0: execpline2 (exec.c:1697)
==10989== by 0x427FD2: execpline (exec.c:1484)
==10989== by 0x42779A: execlist (exec.c:1275)
==10989== by 0x42717C: execode (exec.c:1073)
==10989== by 0x431299: runshfunc (exec.c:5040)
==10989== by 0x430E76: doshfunc (exec.c:4920)
==10989== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10989==
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10996-by-pythonnut-on-???
==10996== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10996-by-pythonnut-on-???
==10996== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10996-by-pythonnut-on-???
==10996==
==10996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10996== don't want to do, unless you know exactly what you're doing,
==10996== or are doing some strange experiment):
==10996== /usr/lib/valgrind/../../bin/vgdb --pid=10996 ...command...
==10996==
==10996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10996== /path/to/gdb ./zsh
==10996== and then give GDB the following command
==10996== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10996
==10996== --pid is optional if only one valgrind process is running
==10996==
--10996-- Caught __NR_exit; running __libc_freeres()
--10996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996==
==10996== HEAP SUMMARY:
==10996== in use at exit: 3,137,388 bytes in 69,536 blocks
==10996== total heap usage: 1,599,710 allocs, 1,530,174 frees, 129,184,417 bytes allocated
==10996==
==10994== Checked 4,787,016 bytes
==10994==
==10994== LEAK SUMMARY:
==10994== definitely lost: 3,173 bytes in 18 blocks
==10994== indirectly lost: 6,756 bytes in 7 blocks
==10994== possibly lost: 0 bytes in 0 blocks
==10994== still reachable: 3,103,991 bytes in 68,941 blocks
==10994== suppressed: 0 bytes in 0 blocks
==10994== Rerun with --leak-check=full to see details of leaked memory
==10994==
==10994== Use --track-origins=yes to see where uninitialised values come from
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10994==
==10994== 1 errors in context 1 of 2:
==10994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10994== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10994== by 0x488CD0: stringsubst (subst.c:301)
==10994== by 0x48801B: prefork (subst.c:77)
==10994== by 0x42B318: execcmd (exec.c:2619)
==10994== by 0x428CA0: execpline2 (exec.c:1697)
==10994== by 0x427FD2: execpline (exec.c:1484)
==10994== by 0x427756: execlist (exec.c:1267)
==10994== by 0x42717C: execode (exec.c:1073)
==10994== by 0x431299: runshfunc (exec.c:5040)
==10994== by 0x430E76: doshfunc (exec.c:4920)
==10994== by 0x4302FB: execshfunc (exec.c:4557)
==10994== by 0x42D8C1: execcmd (exec.c:3373)
==10994==
==10994==
==10994== 2 errors in context 2 of 2:
==10994== Conditional jump or move depends on uninitialised value(s)
==10994== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10994== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10994== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10994== by 0x40EFC2: execbuiltin (builtin.c:450)
==10994== by 0x42D8E9: execcmd (exec.c:3378)
==10994== by 0x428CA0: execpline2 (exec.c:1697)
==10994== by 0x427FD2: execpline (exec.c:1484)
==10994== by 0x42779A: execlist (exec.c:1275)
==10994== by 0x42717C: execode (exec.c:1073)
==10994== by 0x431299: runshfunc (exec.c:5040)
==10994== by 0x430E76: doshfunc (exec.c:4920)
==10994== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10994==
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== Searching for pointers to 69,536 not-freed blocks
--10996-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10996-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10996-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10996-- Scanning root segment: 0x4037000..0x403efff (32768)
--10996-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10996-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10996-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10996-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10996-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10996-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10996-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10996-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10996-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10996-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10996-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10996-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10996-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10996-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10996-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10996-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10996-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10996-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10996-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10996-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10996-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10996-- Scanning root segment: 0x701a000..0x701afff (4096)
--10996-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10996-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10996-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10996-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10996-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10996-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10996-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10996-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10996-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10996-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005, addr 0xFFEFF30AC, len 4
client request: code 4d430005, addr 0xFFEFF2A2C, len 4
--10999-- Caught __NR_exit; running __libc_freeres()
==10996== Checked 4,839,360 bytes
==10996==
==10999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10999-by-pythonnut-on-???
==10999== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-10999-by-pythonnut-on-???
==10999== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-10999-by-pythonnut-on-???
==10999==
==10999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10999== don't want to do, unless you know exactly what you're doing,
==10999== or are doing some strange experiment):
==10999== /usr/lib/valgrind/../../bin/vgdb --pid=10999 ...command...
==10999==
==10999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10999== /path/to/gdb ./zsh
==10999== and then give GDB the following command
==10999== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10999
==10999== --pid is optional if only one valgrind process is running
==10999==
--10999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996== LEAK SUMMARY:
==10996== definitely lost: 2,221 bytes in 14 blocks
==10996== indirectly lost: 6,796 bytes in 9 blocks
==10996== possibly lost: 0 bytes in 0 blocks
==10996== still reachable: 3,128,371 bytes in 69,513 blocks
==10996== suppressed: 0 bytes in 0 blocks
==10996== Rerun with --leak-check=full to see details of leaked memory
==10996==
==10996== Use --track-origins=yes to see where uninitialised values come from
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996==
==10996== 1 errors in context 1 of 2:
==10996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10996== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10996== by 0x488CD0: stringsubst (subst.c:301)
==10996== by 0x48801B: prefork (subst.c:77)
==10996== by 0x42B318: execcmd (exec.c:2619)
==10996== by 0x428CA0: execpline2 (exec.c:1697)
==10996== by 0x427FD2: execpline (exec.c:1484)
==10996== by 0x427756: execlist (exec.c:1267)
==10996== by 0x42717C: execode (exec.c:1073)
==10996== by 0x431299: runshfunc (exec.c:5040)
==10996== by 0x430E76: doshfunc (exec.c:4920)
==10996== by 0x4302FB: execshfunc (exec.c:4557)
==10996== by 0x42D8C1: execcmd (exec.c:3373)
==10996==
==10996==
==10996== 2 errors in context 2 of 2:
==10996== Conditional jump or move depends on uninitialised value(s)
==10996== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10996== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10996== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10996== by 0x40EFC2: execbuiltin (builtin.c:450)
==10996== by 0x42D8E9: execcmd (exec.c:3378)
==10996== by 0x428CA0: execpline2 (exec.c:1697)
==10996== by 0x427FD2: execpline (exec.c:1484)
==10996== by 0x42779A: execlist (exec.c:1275)
==10996== by 0x42717C: execode (exec.c:1073)
==10996== by 0x431299: runshfunc (exec.c:5040)
==10996== by 0x430E76: doshfunc (exec.c:4920)
==10996== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10996==
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999==
==10999== HEAP SUMMARY:
==10999== in use at exit: 3,113,247 bytes in 68,951 blocks
==10999== total heap usage: 1,738,113 allocs, 1,669,162 frees, 140,063,175 bytes allocated
==10999==
==11000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11000-by-pythonnut-on-???
==11000== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11000-by-pythonnut-on-???
==11000== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11000-by-pythonnut-on-???
==11000==
==11000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11000== don't want to do, unless you know exactly what you're doing,
==11000== or are doing some strange experiment):
==11000== /usr/lib/valgrind/../../bin/vgdb --pid=11000 ...command...
==11000==
==11000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11000== /path/to/gdb ./zsh
==11000== and then give GDB the following command
==11000== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11000
==11000== --pid is optional if only one valgrind process is running
==11000==
--11000-- Caught __NR_exit; running __libc_freeres()
==10999== Searching for pointers to 68,951 not-freed blocks
--10999-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10999-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10999-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10999-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10999-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10999-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10999-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10999-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10999-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10999-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10999-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10999-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10999-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10999-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10999-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10999-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10999-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10999-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10999-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10999-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10999-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10999-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10999-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10999-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10999-- Scanning root segment: 0x701a000..0x701afff (4096)
--10999-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10999-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10999-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10999-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10999-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10999-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10999-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10999-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10999-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10999-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--11000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11000==
==11000== HEAP SUMMARY:
==11000== in use at exit: 3,137,387 bytes in 69,536 blocks
==11000== total heap usage: 1,599,715 allocs, 1,530,179 frees, 129,186,530 bytes allocated
==11000==
==11000== Searching for pointers to 69,536 not-freed blocks
--11000-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11000-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11000-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11000-- Scanning root segment: 0x4037000..0x403efff (32768)
--11000-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11000-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11000-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11000-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11000-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11000-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11000-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11000-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11000-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11000-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11000-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11000-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11000-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11000-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11000-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11000-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11000-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11000-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11000-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11000-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11000-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11000-- Scanning root segment: 0x701a000..0x701afff (4096)
--11000-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11000-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11000-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11000-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11000-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11000-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11000-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11000-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11000-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11000-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10999== Checked 4,787,208 bytes
==10999==
==10999== LEAK SUMMARY:
==10999== definitely lost: 3,173 bytes in 18 blocks
==10999== indirectly lost: 6,756 bytes in 7 blocks
==10999== possibly lost: 0 bytes in 0 blocks
==10999== still reachable: 3,103,318 bytes in 68,926 blocks
==10999== suppressed: 0 bytes in 0 blocks
==10999== Rerun with --leak-check=full to see details of leaked memory
==10999==
==10999== Use --track-origins=yes to see where uninitialised values come from
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999==
==10999== 1 errors in context 1 of 2:
==10999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10999== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10999== by 0x488CD0: stringsubst (subst.c:301)
==10999== by 0x48801B: prefork (subst.c:77)
==10999== by 0x42B318: execcmd (exec.c:2619)
==10999== by 0x428CA0: execpline2 (exec.c:1697)
==10999== by 0x427FD2: execpline (exec.c:1484)
==10999== by 0x427756: execlist (exec.c:1267)
==10999== by 0x42717C: execode (exec.c:1073)
==10999== by 0x431299: runshfunc (exec.c:5040)
==10999== by 0x430E76: doshfunc (exec.c:4920)
==10999== by 0x4302FB: execshfunc (exec.c:4557)
==10999== by 0x42D8C1: execcmd (exec.c:3373)
==10999==
==10999==
==10999== 2 errors in context 2 of 2:
==10999== Conditional jump or move depends on uninitialised value(s)
==10999== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10999== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10999== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10999== by 0x40EFC2: execbuiltin (builtin.c:450)
==10999== by 0x42D8E9: execcmd (exec.c:3378)
==10999== by 0x428CA0: execpline2 (exec.c:1697)
==10999== by 0x427FD2: execpline (exec.c:1484)
==10999== by 0x42779A: execlist (exec.c:1275)
==10999== by 0x42717C: execode (exec.c:1073)
==10999== by 0x431299: runshfunc (exec.c:5040)
==10999== by 0x430E76: doshfunc (exec.c:4920)
==10999== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10999==
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000== Checked 4,839,360 bytes
==11000==
--11003-- Caught __NR_exit; running __libc_freeres()
==11003== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11003-by-pythonnut-on-???
==11003== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11003-by-pythonnut-on-???
==11003== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11003-by-pythonnut-on-???
==11003==
==11003== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11003== don't want to do, unless you know exactly what you're doing,
==11003== or are doing some strange experiment):
==11003== /usr/lib/valgrind/../../bin/vgdb --pid=11003 ...command...
==11003==
==11003== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11003== /path/to/gdb ./zsh
==11003== and then give GDB the following command
==11003== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11003
==11003== --pid is optional if only one valgrind process is running
==11003==
==11000== LEAK SUMMARY:
==11000== definitely lost: 2,221 bytes in 14 blocks
==11000== indirectly lost: 6,796 bytes in 9 blocks
==11000== possibly lost: 0 bytes in 0 blocks
==11000== still reachable: 3,128,370 bytes in 69,513 blocks
==11000== suppressed: 0 bytes in 0 blocks
==11000== Rerun with --leak-check=full to see details of leaked memory
==11000==
==11000== Use --track-origins=yes to see where uninitialised values come from
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000==
==11000== 1 errors in context 1 of 2:
==11000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11000== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11000== by 0x488CD0: stringsubst (subst.c:301)
==11000== by 0x48801B: prefork (subst.c:77)
==11000== by 0x42B318: execcmd (exec.c:2619)
==11000== by 0x428CA0: execpline2 (exec.c:1697)
==11000== by 0x427FD2: execpline (exec.c:1484)
==11000== by 0x427756: execlist (exec.c:1267)
==11000== by 0x42717C: execode (exec.c:1073)
==11000== by 0x431299: runshfunc (exec.c:5040)
==11000== by 0x430E76: doshfunc (exec.c:4920)
==11000== by 0x4302FB: execshfunc (exec.c:4557)
==11000== by 0x42D8C1: execcmd (exec.c:3373)
==11000==
==11000==
==11000== 2 errors in context 2 of 2:
==11000== Conditional jump or move depends on uninitialised value(s)
==11000== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11000== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11000== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11000== by 0x40EFC2: execbuiltin (builtin.c:450)
==11000== by 0x42D8E9: execcmd (exec.c:3378)
==11000== by 0x428CA0: execpline2 (exec.c:1697)
==11000== by 0x427FD2: execpline (exec.c:1484)
==11000== by 0x42779A: execlist (exec.c:1275)
==11000== by 0x42717C: execode (exec.c:1073)
==11000== by 0x431299: runshfunc (exec.c:5040)
==11000== by 0x430E76: doshfunc (exec.c:4920)
==11000== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11000==
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--11003-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11004-by-pythonnut-on-???
==11004== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11004-by-pythonnut-on-???
==11004== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11004-by-pythonnut-on-???
==11004==
==11004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11004== don't want to do, unless you know exactly what you're doing,
==11004== or are doing some strange experiment):
==11004== /usr/lib/valgrind/../../bin/vgdb --pid=11004 ...command...
==11004==
==11004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11004== /path/to/gdb ./zsh
==11004== and then give GDB the following command
==11004== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11004
==11004== --pid is optional if only one valgrind process is running
==11004==
--11004-- Caught __NR_exit; running __libc_freeres()
==11003==
==11003== HEAP SUMMARY:
==11003== in use at exit: 3,115,003 bytes in 69,006 blocks
==11003== total heap usage: 1,738,209 allocs, 1,669,203 frees, 140,071,029 bytes allocated
==11003==
--11004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11003== Searching for pointers to 69,006 not-freed blocks
--11003-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11003-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11003-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11003-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11003-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11003-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11003-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11003-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11003-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11003-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11003-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11003-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11003-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11003-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11003-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11003-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11003-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11003-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11003-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11003-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11003-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11003-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11003-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11003-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11003-- Scanning root segment: 0x701a000..0x701afff (4096)
--11003-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11003-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11003-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11003-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11003-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11003-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11003-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11003-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11003-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11003-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11004==
==11004== HEAP SUMMARY:
==11004== in use at exit: 3,137,386 bytes in 69,536 blocks
==11004== total heap usage: 1,599,720 allocs, 1,530,184 frees, 129,188,643 bytes allocated
==11004==
==11004== Searching for pointers to 69,536 not-freed blocks
--11004-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11004-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11004-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11004-- Scanning root segment: 0x4037000..0x403efff (32768)
--11004-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11004-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11004-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11004-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11004-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11004-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11004-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11004-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11004-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11004-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11004-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11004-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11004-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11004-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11004-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11004-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11004-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11004-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11004-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11004-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11004-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11004-- Scanning root segment: 0x701a000..0x701afff (4096)
--11004-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11004-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11004-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11004-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11004-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11004-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11004-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11004-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11004-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11004-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11003== Checked 4,789,472 bytes
==11003==
==11003== LEAK SUMMARY:
==11003== definitely lost: 3,197 bytes in 19 blocks
==11003== indirectly lost: 6,812 bytes in 10 blocks
==11003== possibly lost: 0 bytes in 0 blocks
==11003== still reachable: 3,104,994 bytes in 68,977 blocks
==11003== suppressed: 0 bytes in 0 blocks
==11003== Rerun with --leak-check=full to see details of leaked memory
==11003==
==11003== Use --track-origins=yes to see where uninitialised values come from
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11003==
==11003== 1 errors in context 1 of 2:
==11003== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11003== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11003== by 0x488CD0: stringsubst (subst.c:301)
==11003== by 0x48801B: prefork (subst.c:77)
==11003== by 0x42B318: execcmd (exec.c:2619)
==11003== by 0x428CA0: execpline2 (exec.c:1697)
==11003== by 0x427FD2: execpline (exec.c:1484)
==11003== by 0x427756: execlist (exec.c:1267)
==11003== by 0x42717C: execode (exec.c:1073)
==11003== by 0x431299: runshfunc (exec.c:5040)
==11003== by 0x430E76: doshfunc (exec.c:4920)
==11003== by 0x4302FB: execshfunc (exec.c:4557)
==11003== by 0x42D8C1: execcmd (exec.c:3373)
==11003==
==11003==
==11003== 2 errors in context 2 of 2:
==11003== Conditional jump or move depends on uninitialised value(s)
==11003== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11003== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11003== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11003== by 0x40EFC2: execbuiltin (builtin.c:450)
==11003== by 0x42D8E9: execcmd (exec.c:3378)
==11003== by 0x428CA0: execpline2 (exec.c:1697)
==11003== by 0x427FD2: execpline (exec.c:1484)
==11003== by 0x42779A: execlist (exec.c:1275)
==11003== by 0x42717C: execode (exec.c:1073)
==11003== by 0x431299: runshfunc (exec.c:5040)
==11003== by 0x430E76: doshfunc (exec.c:4920)
==11003== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11003==
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004== Checked 4,839,360 bytes
==11004==
==11004== LEAK SUMMARY:
==11004== definitely lost: 2,221 bytes in 14 blocks
==11004== indirectly lost: 6,796 bytes in 9 blocks
==11004== possibly lost: 0 bytes in 0 blocks
==11004== still reachable: 3,128,369 bytes in 69,513 blocks
==11004== suppressed: 0 bytes in 0 blocks
==11004== Rerun with --leak-check=full to see details of leaked memory
==11004==
==11004== Use --track-origins=yes to see where uninitialised values come from
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004==
==11004== 1 errors in context 1 of 2:
==11004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11004== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11004== by 0x488CD0: stringsubst (subst.c:301)
==11004== by 0x48801B: prefork (subst.c:77)
==11004== by 0x42B318: execcmd (exec.c:2619)
==11004== by 0x428CA0: execpline2 (exec.c:1697)
==11004== by 0x427FD2: execpline (exec.c:1484)
==11004== by 0x427756: execlist (exec.c:1267)
==11004== by 0x42717C: execode (exec.c:1073)
==11004== by 0x431299: runshfunc (exec.c:5040)
==11004== by 0x430E76: doshfunc (exec.c:4920)
==11004== by 0x4302FB: execshfunc (exec.c:4557)
==11004== by 0x42D8C1: execcmd (exec.c:3373)
==11004==
==11004==
==11004== 2 errors in context 2 of 2:
==11004== Conditional jump or move depends on uninitialised value(s)
==11004== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11004== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11004== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11004== by 0x40EFC2: execbuiltin (builtin.c:450)
==11004== by 0x42D8E9: execcmd (exec.c:3378)
==11004== by 0x428CA0: execpline2 (exec.c:1697)
==11004== by 0x427FD2: execpline (exec.c:1484)
==11004== by 0x42779A: execlist (exec.c:1275)
==11004== by 0x42717C: execode (exec.c:1073)
==11004== by 0x431299: runshfunc (exec.c:5040)
==11004== by 0x430E76: doshfunc (exec.c:4920)
==11004== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11004==
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF4ACC, len 4
==11007== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11007-by-pythonnut-on-???
==11007== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11007-by-pythonnut-on-???
==11007== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11007-by-pythonnut-on-???
==11007==
==11007== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11007== don't want to do, unless you know exactly what you're doing,
==11007== or are doing some strange experiment):
==11007== /usr/lib/valgrind/../../bin/vgdb --pid=11007 ...command...
==11007==
==11007== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11007== /path/to/gdb ./zsh
==11007== and then give GDB the following command
==11007== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11007
==11007== --pid is optional if only one valgrind process is running
==11007==
--11007-- Caught __NR_exit; running __libc_freeres()
--11005-- Caught __NR_exit; running __libc_freeres()
==11005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11005-by-pythonnut-on-???
==11005== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11005-by-pythonnut-on-???
==11005== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11005-by-pythonnut-on-???
==11005==
==11005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11005== don't want to do, unless you know exactly what you're doing,
==11005== or are doing some strange experiment):
==11005== /usr/lib/valgrind/../../bin/vgdb --pid=11005 ...command...
==11005==
==11005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11005== /path/to/gdb ./zsh
==11005== and then give GDB the following command
==11005== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11005
==11005== --pid is optional if only one valgrind process is running
==11005==
--11007-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--11005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11007==
==11007== HEAP SUMMARY:
==11007== in use at exit: 3,137,385 bytes in 69,536 blocks
==11007== total heap usage: 1,599,725 allocs, 1,530,189 frees, 129,190,756 bytes allocated
==11007==
==11005==
==11005== HEAP SUMMARY:
==11005== in use at exit: 3,114,963 bytes in 69,005 blocks
==11005== total heap usage: 1,738,217 allocs, 1,669,212 frees, 140,073,141 bytes allocated
==11005==
==11007== Searching for pointers to 69,536 not-freed blocks
--11007-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11007-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11007-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11007-- Scanning root segment: 0x4037000..0x403efff (32768)
--11007-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11007-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11007-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11007-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11007-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11007-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11007-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11007-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11007-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11007-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11007-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11007-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11007-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11007-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11007-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11007-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11007-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11007-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11007-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11007-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11007-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11007-- Scanning root segment: 0x701a000..0x701afff (4096)
--11007-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11007-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11007-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11007-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11007-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11007-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11007-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11007-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11007-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11007-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Searching for pointers to 69,005 not-freed blocks
--11005-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11005-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11005-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11005-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11005-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11005-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11005-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11005-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11005-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11005-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11005-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11005-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11005-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11005-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11005-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11005-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11005-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11005-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11005-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11005-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11005-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11005-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11005-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11005-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11005-- Scanning root segment: 0x701a000..0x701afff (4096)
--11005-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11005-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11005-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11005-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11005-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11005-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11005-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11005-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11005-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11005-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Checked 4,789,120 bytes
==11005==
==11007== Checked 4,839,360 bytes
==11007==
==11005== LEAK SUMMARY:
==11005== definitely lost: 3,189 bytes in 19 blocks
==11005== indirectly lost: 6,756 bytes in 7 blocks
==11005== possibly lost: 0 bytes in 0 blocks
==11005== still reachable: 3,105,018 bytes in 68,979 blocks
==11005== suppressed: 0 bytes in 0 blocks
==11005== Rerun with --leak-check=full to see details of leaked memory
==11005==
==11005== Use --track-origins=yes to see where uninitialised values come from
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11005==
==11005== 1 errors in context 1 of 2:
==11005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11005== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11005== by 0x488CD0: stringsubst (subst.c:301)
==11005== by 0x48801B: prefork (subst.c:77)
==11005== by 0x42B318: execcmd (exec.c:2619)
==11005== by 0x428CA0: execpline2 (exec.c:1697)
==11005== by 0x427FD2: execpline (exec.c:1484)
==11005== by 0x427756: execlist (exec.c:1267)
==11005== by 0x42717C: execode (exec.c:1073)
==11005== by 0x431299: runshfunc (exec.c:5040)
==11005== by 0x430E76: doshfunc (exec.c:4920)
==11005== by 0x4302FB: execshfunc (exec.c:4557)
==11005== by 0x42D8C1: execcmd (exec.c:3373)
==11005==
==11005==
==11005== 2 errors in context 2 of 2:
==11005== Conditional jump or move depends on uninitialised value(s)
==11005== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11005== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11005== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11005== by 0x40EFC2: execbuiltin (builtin.c:450)
==11005== by 0x42D8E9: execcmd (exec.c:3378)
==11005== by 0x428CA0: execpline2 (exec.c:1697)
==11005== by 0x427FD2: execpline (exec.c:1484)
==11005== by 0x42779A: execlist (exec.c:1275)
==11005== by 0x42717C: execode (exec.c:1073)
==11005== by 0x431299: runshfunc (exec.c:5040)
==11005== by 0x430E76: doshfunc (exec.c:4920)
==11005== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11005==
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007== LEAK SUMMARY:
==11007== definitely lost: 2,221 bytes in 14 blocks
==11007== indirectly lost: 6,796 bytes in 9 blocks
==11007== possibly lost: 0 bytes in 0 blocks
==11007== still reachable: 3,128,368 bytes in 69,513 blocks
==11007== suppressed: 0 bytes in 0 blocks
==11007== Rerun with --leak-check=full to see details of leaked memory
==11007==
==11007== Use --track-origins=yes to see where uninitialised values come from
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007==
==11007== 1 errors in context 1 of 2:
==11007== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11007== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11007== by 0x488CD0: stringsubst (subst.c:301)
==11007== by 0x48801B: prefork (subst.c:77)
==11007== by 0x42B318: execcmd (exec.c:2619)
==11007== by 0x428CA0: execpline2 (exec.c:1697)
==11007== by 0x427FD2: execpline (exec.c:1484)
==11007== by 0x427756: execlist (exec.c:1267)
==11007== by 0x42717C: execode (exec.c:1073)
==11007== by 0x431299: runshfunc (exec.c:5040)
==11007== by 0x430E76: doshfunc (exec.c:4920)
==11007== by 0x4302FB: execshfunc (exec.c:4557)
==11007== by 0x42D8C1: execcmd (exec.c:3373)
==11007==
==11007==
==11007== 2 errors in context 2 of 2:
==11007== Conditional jump or move depends on uninitialised value(s)
==11007== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11007== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11007== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11007== by 0x40EFC2: execbuiltin (builtin.c:450)
==11007== by 0x42D8E9: execcmd (exec.c:3378)
==11007== by 0x428CA0: execpline2 (exec.c:1697)
==11007== by 0x427FD2: execpline (exec.c:1484)
==11007== by 0x42779A: execlist (exec.c:1275)
==11007== by 0x42717C: execode (exec.c:1073)
==11007== by 0x431299: runshfunc (exec.c:5040)
==11007== by 0x430E76: doshfunc (exec.c:4920)
==11007== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11007==
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11009-by-pythonnut-on-???
==11009== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11009-by-pythonnut-on-???
==11009== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11009-by-pythonnut-on-???
==11009==
==11009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11009== don't want to do, unless you know exactly what you're doing,
==11009== or are doing some strange experiment):
==11009== /usr/lib/valgrind/../../bin/vgdb --pid=11009 ...command...
==11009==
==11009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11009== /path/to/gdb ./zsh
==11009== and then give GDB the following command
==11009== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11009
==11009== --pid is optional if only one valgrind process is running
==11009==
--11009-- Caught __NR_exit; running __libc_freeres()
==11008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11008-by-pythonnut-on-???
==11008== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11008-by-pythonnut-on-???
==11008== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11008-by-pythonnut-on-???
==11008==
==11008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11008== don't want to do, unless you know exactly what you're doing,
==11008== or are doing some strange experiment):
==11008== /usr/lib/valgrind/../../bin/vgdb --pid=11008 ...command...
==11008==
==11008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11008== /path/to/gdb ./zsh
==11008== and then give GDB the following command
==11008== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11008
==11008== --pid is optional if only one valgrind process is running
==11008==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
--11009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11009==
==11009== HEAP SUMMARY:
==11009== in use at exit: 3,137,384 bytes in 69,536 blocks
==11009== total heap usage: 1,599,730 allocs, 1,530,194 frees, 129,192,869 bytes allocated
==11009==
==11009== Searching for pointers to 69,536 not-freed blocks
--11009-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11009-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11009-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11009-- Scanning root segment: 0x4037000..0x403efff (32768)
--11009-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11009-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11009-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11009-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11009-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11009-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11009-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11009-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11009-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11009-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11009-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11009-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11009-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11009-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11009-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11009-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11009-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11009-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11009-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11009-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11009-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11009-- Scanning root segment: 0x701a000..0x701afff (4096)
--11009-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11009-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11009-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11009-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11009-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11009-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11009-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11009-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11009-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11009-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11009== Checked 4,839,360 bytes
==11009==
==11009== LEAK SUMMARY:
==11009== definitely lost: 2,221 bytes in 14 blocks
==11009== indirectly lost: 6,796 bytes in 9 blocks
==11009== possibly lost: 0 bytes in 0 blocks
==11009== still reachable: 3,128,367 bytes in 69,513 blocks
==11009== suppressed: 0 bytes in 0 blocks
==11009== Rerun with --leak-check=full to see details of leaked memory
==11009==
==11009== Use --track-origins=yes to see where uninitialised values come from
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009==
==11009== 1 errors in context 1 of 2:
==11009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11009== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11009== by 0x488CD0: stringsubst (subst.c:301)
==11009== by 0x48801B: prefork (subst.c:77)
==11009== by 0x42B318: execcmd (exec.c:2619)
==11009== by 0x428CA0: execpline2 (exec.c:1697)
==11009== by 0x427FD2: execpline (exec.c:1484)
==11009== by 0x427756: execlist (exec.c:1267)
==11009== by 0x42717C: execode (exec.c:1073)
==11009== by 0x431299: runshfunc (exec.c:5040)
==11009== by 0x430E76: doshfunc (exec.c:4920)
==11009== by 0x4302FB: execshfunc (exec.c:4557)
==11009== by 0x42D8C1: execcmd (exec.c:3373)
==11009==
==11009==
==11009== 2 errors in context 2 of 2:
==11009== Conditional jump or move depends on uninitialised value(s)
==11009== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11009== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11009== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11009== by 0x40EFC2: execbuiltin (builtin.c:450)
==11009== by 0x42D8E9: execcmd (exec.c:3378)
==11009== by 0x428CA0: execpline2 (exec.c:1697)
==11009== by 0x427FD2: execpline (exec.c:1484)
==11009== by 0x42779A: execlist (exec.c:1275)
==11009== by 0x42717C: execode (exec.c:1073)
==11009== by 0x431299: runshfunc (exec.c:5040)
==11009== by 0x430E76: doshfunc (exec.c:4920)
==11009== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11009==
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11010-by-pythonnut-on-???
==11010== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11010-by-pythonnut-on-???
==11010== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11010-by-pythonnut-on-???
==11010==
==11010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11010== don't want to do, unless you know exactly what you're doing,
==11010== or are doing some strange experiment):
==11010== /usr/lib/valgrind/../../bin/vgdb --pid=11010 ...command...
==11010==
==11010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11010== /path/to/gdb ./zsh
==11010== and then give GDB the following command
==11010== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11010
==11010== --pid is optional if only one valgrind process is running
==11010==
--11010-- Caught __NR_exit; running __libc_freeres()
--11010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11010==
==11010== HEAP SUMMARY:
==11010== in use at exit: 3,137,383 bytes in 69,536 blocks
==11010== total heap usage: 1,599,738 allocs, 1,530,202 frees, 129,196,522 bytes allocated
==11010==
==11010== Searching for pointers to 69,536 not-freed blocks
--11010-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11010-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11010-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11010-- Scanning root segment: 0x4037000..0x403efff (32768)
--11010-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11010-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11010-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11010-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11010-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11010-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11010-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11010-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11010-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11010-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11010-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11010-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11010-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11010-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11010-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11010-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11010-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11010-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11010-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11010-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11010-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11010-- Scanning root segment: 0x701a000..0x701afff (4096)
--11010-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11010-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11010-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11010-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11010-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11010-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11010-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11010-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11010-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11010-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11010== Checked 4,839,360 bytes
==11010==
==11010== LEAK SUMMARY:
==11010== definitely lost: 2,221 bytes in 14 blocks
==11010== indirectly lost: 6,796 bytes in 9 blocks
==11010== possibly lost: 0 bytes in 0 blocks
==11010== still reachable: 3,128,366 bytes in 69,513 blocks
==11010== suppressed: 0 bytes in 0 blocks
==11010== Rerun with --leak-check=full to see details of leaked memory
==11010==
==11010== Use --track-origins=yes to see where uninitialised values come from
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010==
==11010== 1 errors in context 1 of 2:
==11010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11010== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11010== by 0x488CD0: stringsubst (subst.c:301)
==11010== by 0x48801B: prefork (subst.c:77)
==11010== by 0x42B318: execcmd (exec.c:2619)
==11010== by 0x428CA0: execpline2 (exec.c:1697)
==11010== by 0x427FD2: execpline (exec.c:1484)
==11010== by 0x427756: execlist (exec.c:1267)
==11010== by 0x42717C: execode (exec.c:1073)
==11010== by 0x431299: runshfunc (exec.c:5040)
==11010== by 0x430E76: doshfunc (exec.c:4920)
==11010== by 0x4302FB: execshfunc (exec.c:4557)
==11010== by 0x42D8C1: execcmd (exec.c:3373)
==11010==
==11010==
==11010== 2 errors in context 2 of 2:
==11010== Conditional jump or move depends on uninitialised value(s)
==11010== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11010== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11010== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11010== by 0x40EFC2: execbuiltin (builtin.c:450)
==11010== by 0x42D8E9: execcmd (exec.c:3378)
==11010== by 0x428CA0: execpline2 (exec.c:1697)
==11010== by 0x427FD2: execpline (exec.c:1484)
==11010== by 0x42779A: execlist (exec.c:1275)
==11010== by 0x42717C: execode (exec.c:1073)
==11010== by 0x431299: runshfunc (exec.c:5040)
==11010== by 0x430E76: doshfunc (exec.c:4920)
==11010== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11010==
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11011-by-pythonnut-on-???
==11011== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11011-by-pythonnut-on-???
==11011== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11011-by-pythonnut-on-???
==11011==
==11011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11011== don't want to do, unless you know exactly what you're doing,
==11011== or are doing some strange experiment):
==11011== /usr/lib/valgrind/../../bin/vgdb --pid=11011 ...command...
==11011==
==11011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11011== /path/to/gdb ./zsh
==11011== and then give GDB the following command
==11011== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11011
==11011== --pid is optional if only one valgrind process is running
==11011==
--11011-- Caught __NR_exit; running __libc_freeres()
--11011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11011==
==11011== HEAP SUMMARY:
==11011== in use at exit: 3,137,386 bytes in 69,536 blocks
==11011== total heap usage: 1,599,740 allocs, 1,530,204 frees, 129,197,099 bytes allocated
==11011==
==11011== Searching for pointers to 69,536 not-freed blocks
--11011-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11011-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11011-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11011-- Scanning root segment: 0x4037000..0x403efff (32768)
--11011-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11011-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11011-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11011-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11011-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11011-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11011-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11011-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11011-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11011-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11011-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11011-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11011-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11011-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11011-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11011-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11011-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11011-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11011-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11011-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11011-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11011-- Scanning root segment: 0x701a000..0x701afff (4096)
--11011-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11011-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11011-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11011-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11011-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11011-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11011-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11011-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11011-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11011-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11011== Checked 4,839,360 bytes
==11011==
==11011== LEAK SUMMARY:
==11011== definitely lost: 2,221 bytes in 14 blocks
==11011== indirectly lost: 6,796 bytes in 9 blocks
==11011== possibly lost: 0 bytes in 0 blocks
==11011== still reachable: 3,128,369 bytes in 69,513 blocks
==11011== suppressed: 0 bytes in 0 blocks
==11011== Rerun with --leak-check=full to see details of leaked memory
==11011==
==11011== Use --track-origins=yes to see where uninitialised values come from
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011==
==11011== 1 errors in context 1 of 2:
==11011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11011== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11011== by 0x488CD0: stringsubst (subst.c:301)
==11011== by 0x48801B: prefork (subst.c:77)
==11011== by 0x42B318: execcmd (exec.c:2619)
==11011== by 0x428CA0: execpline2 (exec.c:1697)
==11011== by 0x427FD2: execpline (exec.c:1484)
==11011== by 0x427756: execlist (exec.c:1267)
==11011== by 0x42717C: execode (exec.c:1073)
==11011== by 0x431299: runshfunc (exec.c:5040)
==11011== by 0x430E76: doshfunc (exec.c:4920)
==11011== by 0x4302FB: execshfunc (exec.c:4557)
==11011== by 0x42D8C1: execcmd (exec.c:3373)
==11011==
==11011==
==11011== 2 errors in context 2 of 2:
==11011== Conditional jump or move depends on uninitialised value(s)
==11011== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11011== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11011== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11011== by 0x40EFC2: execbuiltin (builtin.c:450)
==11011== by 0x42D8E9: execcmd (exec.c:3378)
==11011== by 0x428CA0: execpline2 (exec.c:1697)
==11011== by 0x427FD2: execpline (exec.c:1484)
==11011== by 0x42779A: execlist (exec.c:1275)
==11011== by 0x42717C: execode (exec.c:1073)
==11011== by 0x431299: runshfunc (exec.c:5040)
==11011== by 0x430E76: doshfunc (exec.c:4920)
==11011== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11011==
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11012-by-pythonnut-on-???
==11012== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11012-by-pythonnut-on-???
==11012== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11012-by-pythonnut-on-???
==11012==
==11012== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11012== don't want to do, unless you know exactly what you're doing,
==11012== or are doing some strange experiment):
==11012== /usr/lib/valgrind/../../bin/vgdb --pid=11012 ...command...
==11012==
==11012== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11012== /path/to/gdb ./zsh
==11012== and then give GDB the following command
==11012== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11012
==11012== --pid is optional if only one valgrind process is running
==11012==
--11013-- Caught __NR_exit; running __libc_freeres()
==11013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11013-by-pythonnut-on-???
==11013== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11013-by-pythonnut-on-???
==11013== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11013-by-pythonnut-on-???
==11013==
==11013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11013== don't want to do, unless you know exactly what you're doing,
==11013== or are doing some strange experiment):
==11013== /usr/lib/valgrind/../../bin/vgdb --pid=11013 ...command...
==11013==
==11013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11013== /path/to/gdb ./zsh
==11013== and then give GDB the following command
==11013== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11013
==11013== --pid is optional if only one valgrind process is running
==11013==
client request: code 4d430005, addr 0xFFEFE7F4C, len 4
--11013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11013==
==11013== HEAP SUMMARY:
==11013== in use at exit: 3,137,636 bytes in 69,541 blocks
==11013== total heap usage: 1,599,745 allocs, 1,530,204 frees, 129,200,689 bytes allocated
==11013==
==11013== Searching for pointers to 69,541 not-freed blocks
--11013-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11013-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11013-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11013-- Scanning root segment: 0x4037000..0x403efff (32768)
--11013-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11013-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11013-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11013-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11013-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11013-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11013-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11013-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11013-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11013-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11013-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11013-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11013-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11013-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11013-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11013-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11013-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11013-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11013-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11013-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11013-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11013-- Scanning root segment: 0x701a000..0x701afff (4096)
--11013-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11013-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11013-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11013-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11013-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11013-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11013-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11013-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11013-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11013-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11017-by-pythonnut-on-???
==11017== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11017-by-pythonnut-on-???
==11017== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11017-by-pythonnut-on-???
==11017==
==11017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11017== don't want to do, unless you know exactly what you're doing,
==11017== or are doing some strange experiment):
==11017== /usr/lib/valgrind/../../bin/vgdb --pid=11017 ...command...
==11017==
==11017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11017== /path/to/gdb ./zsh
==11017== and then give GDB the following command
==11017== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11017
==11017== --pid is optional if only one valgrind process is running
==11017==
client request: code 4d430005, addr 0xFFEFF4F9C, len 4
==11012==
==11012== Process terminating with default action of signal 15 (SIGTERM)
==10928==
==10928== Process terminating with default action of signal 15 (SIGTERM)
==10074==
==10074== Process terminating with default action of signal 15 (SIGTERM)
==10074== at 0x59EED90: sigprocmask (in /usr/lib/libc-2.20.so)
==10074== by 0x484CF4: signal_block (signals.c:212)
==10074== by 0x42841B: execpline (exec.c:1561)
==10074== by 0x427756: execlist (exec.c:1267)
==10074== by 0x4564F1: execwhile (loop.c:420)
==10074== by 0x42D731: execcmd (exec.c:3336)
==10074== by 0x428CA0: execpline2 (exec.c:1697)
==10074== by 0x428F63: execpline2 (exec.c:1758)
==10074== by 0x427FD2: execpline (exec.c:1484)
==10074== by 0x427756: execlist (exec.c:1267)
==10074== by 0x45689D: execif (loop.c:525)
==10074== by 0x42D731: execcmd (exec.c:3336)
--10074-- Caught __NR_exit; running __libc_freeres()
==10928== at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10928== by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10928== by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10928== by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10928== by 0x42EC76: readoutput (exec.c:3894)
==10928== by 0x42EA40: getoutput (exec.c:3859)
==10928== by 0x488C77: stringsubst (subst.c:293)
==10928== by 0x48801B: prefork (subst.c:77)
==10928== by 0x42A2EA: addvars (exec.c:2239)
==10928== by 0x4272AB: execsimple (exec.c:1116)
==10928== by 0x42761D: execlist (exec.c:1238)
==10928== by 0x42717C: execode (exec.c:1073)
--10928-- Caught __NR_exit; running __libc_freeres()
==10930==
==10930== Process terminating with default action of signal 15 (SIGTERM)
==10930== at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10930== by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10930== by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10930== by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10930== by 0x42EC76: readoutput (exec.c:3894)
==10930== by 0x42EA40: getoutput (exec.c:3859)
==11012== at 0x59EEE46: sigsuspend (in /usr/lib/libc-2.20.so)
==10930== by 0x488C77: stringsubst (subst.c:293)
==10930== by 0x48801B: prefork (subst.c:77)
==10930== by 0x42A2EA: addvars (exec.c:2239)
==11012== by 0x484F59: signal_suspend (signals.c:375)
==10930== by 0x4272AB: execsimple (exec.c:1116)
==11012== by 0x44D409: zwaitjob (jobs.c:1454)
==10930== by 0x42761D: execlist (exec.c:1238)
==11012== by 0x44D68B: waitjobs (jobs.c:1499)
==10930== by 0x42717C: execode (exec.c:1073)
==11012== by 0x4283AC: execpline (exec.c:1560)
==11012== by 0x427756: execlist (exec.c:1267)
==11012== by 0x42717C: execode (exec.c:1073)
==11012== by 0x42EB38: getoutput (exec.c:3871)
==11012== by 0x488C77: stringsubst (subst.c:293)
==11012== by 0x48801B: prefork (subst.c:77)
--10930-- Caught __NR_exit; running __libc_freeres()
==11012== by 0x42A2EA: addvars (exec.c:2239)
==11012== by 0x4272AB: execsimple (exec.c:1116)
--11012-- Caught __NR_exit; running __libc_freeres()
==11018== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11018-by-pythonnut-on-???
==11018== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11018-by-pythonnut-on-???
==11018== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11018-by-pythonnut-on-???
==11018==
==11018== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11018== don't want to do, unless you know exactly what you're doing,
==11018== or are doing some strange experiment):
==11018== /usr/lib/valgrind/../../bin/vgdb --pid=11018 ...command...
==11018==
==11018== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11018== /path/to/gdb ./zsh
==11018== and then give GDB the following command
==11018== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11018
==11018== --pid is optional if only one valgrind process is running
==11018==
--11018-- Caught __NR_exit; running __libc_freeres()
--11012-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10074-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10928-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11012==
==10928==
==10074==
==11013== Checked 4,840,240 bytes
==11013==
==10928== HEAP SUMMARY:
==10928== in use at exit: 3,132,504 bytes in 69,342 blocks
==10928== total heap usage: 1,599,432 allocs, 1,530,090 frees, 129,149,408 bytes allocated
==10928==
==11012== HEAP SUMMARY:
==11012== in use at exit: 3,137,980 bytes in 69,541 blocks
==11012== total heap usage: 1,599,748 allocs, 1,530,207 frees, 129,201,265 bytes allocated
==11012==
==10074== HEAP SUMMARY:
==10074== in use at exit: 3,129,214 bytes in 69,252 blocks
==10074== total heap usage: 1,605,341 allocs, 1,536,089 frees, 129,494,873 bytes allocated
==10074==
==10930==
==10930== HEAP SUMMARY:
==10930== in use at exit: 3,136,604 bytes in 69,479 blocks
==10930== total heap usage: 1,599,682 allocs, 1,530,203 frees, 129,199,561 bytes allocated
==10930==
--11018-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11018==
==11013== LEAK SUMMARY:
==11013== definitely lost: 2,221 bytes in 14 blocks
==11013== indirectly lost: 6,796 bytes in 9 blocks
==11013== possibly lost: 0 bytes in 0 blocks
==11013== still reachable: 3,128,619 bytes in 69,518 blocks
==11013== suppressed: 0 bytes in 0 blocks
==11013== Rerun with --leak-check=full to see details of leaked memory
==11013==
==11013== Use --track-origins=yes to see where uninitialised values come from
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11013==
==11013== 1 errors in context 1 of 2:
==11013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11013== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11013== by 0x488CD0: stringsubst (subst.c:301)
==11013== by 0x48801B: prefork (subst.c:77)
==11013== by 0x42B318: execcmd (exec.c:2619)
==11013== by 0x428CA0: execpline2 (exec.c:1697)
==11013== by 0x427FD2: execpline (exec.c:1484)
==11013== by 0x427756: execlist (exec.c:1267)
==11013== by 0x42717C: execode (exec.c:1073)
==11013== by 0x431299: runshfunc (exec.c:5040)
==11013== by 0x430E76: doshfunc (exec.c:4920)
==11013== by 0x4302FB: execshfunc (exec.c:4557)
==11013== by 0x42D8C1: execcmd (exec.c:3373)
==11013==
==11013==
==11013== 2 errors in context 2 of 2:
==11013== Conditional jump or move depends on uninitialised value(s)
==11013== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11013== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11013== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11013== by 0x40EFC2: execbuiltin (builtin.c:450)
==11013== by 0x42D8E9: execcmd (exec.c:3378)
==11013== by 0x428CA0: execpline2 (exec.c:1697)
==11013== by 0x427FD2: execpline (exec.c:1484)
==11013== by 0x42779A: execlist (exec.c:1275)
==11013== by 0x42717C: execode (exec.c:1073)
==11013== by 0x431299: runshfunc (exec.c:5040)
==11013== by 0x430E76: doshfunc (exec.c:4920)
==11013== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11013==
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== HEAP SUMMARY:
==11018== in use at exit: 3,115,586 bytes in 69,011 blocks
==11018== total heap usage: 1,776,833 allocs, 1,707,822 frees, 141,630,595 bytes allocated
==11018==
==11012== Searching for pointers to 69,541 not-freed blocks
--11012-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11012-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11012-- Scanning root segment: 0x4037000..0x403efff (32768)
--11012-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11012-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11012-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11012-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11012-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11012-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11012-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11012-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11012-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11012-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11012-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11012-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11012-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11012-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11012-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11012-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10928== Searching for pointers to 69,342 not-freed blocks
--10928-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11012-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11012-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11012-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10928-- Scanning root segment: 0x4022000..0x4027fff (24576)
--11012-- Scanning root segment: 0x701a000..0x701afff (4096)
--11012-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11012-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10928-- Scanning root segment: 0x4037000..0x403afff (16384)
--11012-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11012-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10928-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11012-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11012-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10928-- Scanning root segment: 0x4222000..0x4222fff (4096)
==10930== Searching for pointers to 69,479 not-freed blocks
--10930-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11012-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11012-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11012-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10928-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10928-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10928-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10928-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10928-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930-- Scanning root segment: 0x4022000..0x4027fff (24576)
--10928-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930-- Scanning root segment: 0x4037000..0x403efff (32768)
--10930-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10928-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10930-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10928-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10930-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10930-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10930-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10928-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10930-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10930-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10928-- Scanning root segment: 0x701a000..0x701afff (4096)
--10928-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10930-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10930-- Scanning root segment: 0x59ba000..0x59bafff (4096)
==10074== Searching for pointers to 69,252 not-freed blocks
--10928-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10074-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10930-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10930-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10930-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10928-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074-- Scanning root segment: 0x4022000..0x4026fff (20480)
--10930-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10074-- Scanning root segment: 0x4037000..0x403afff (16384)
--10074-- Scanning root segment: 0x4049000..0x404cfff (16384)
--10930-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074-- Scanning root segment: 0x4222000..0x4222fff (4096)
--10074-- Scanning root segment: 0x4223000..0x4223fff (4096)
--10074-- Scanning root segment: 0x4224000..0x4224fff (4096)
--10930-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10074-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074-- Scanning root segment: 0x5041000..0x5041fff (4096)
--10074-- Scanning root segment: 0x5245000..0x5245fff (4096)
--10074-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930-- Scanning root segment: 0x701a000..0x701afff (4096)
--10074-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10930-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--10074-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10930-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10074-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10930-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10930-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10074-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10930-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10930-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10074-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074-- Scanning root segment: 0x701a000..0x701afff (4096)
--10074-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074-- Scanning root segment: 0xae51000..0xae52fff (8192)
--10074-- Scanning root segment: 0xb054000..0xb054fff (4096)
--10074-- Scanning root segment: 0xb268000..0xb268fff (4096)
--10074-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10074-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10074-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11018== Searching for pointers to 69,011 not-freed blocks
--11018-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11018-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11018-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11018-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11018-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11018-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11018-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11018-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11018-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11018-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11018-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11018-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11018-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11018-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11018-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11018-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11018-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11018-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11018-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11018-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11018-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11018-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11018-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11018-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11018-- Scanning root segment: 0x701a000..0x701afff (4096)
--11018-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11018-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11018-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11018-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11018-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11018-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11018-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11018-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11018-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11018-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11012== Checked 4,840,360 bytes
==11012==
==10930== Checked 4,842,720 bytes
==10930==
==10928== Checked 4,819,488 bytes
==10928==
==10074== Checked 4,809,608 bytes
==10074==
==11012== LEAK SUMMARY:
==11012== definitely lost: 2,221 bytes in 14 blocks
==11012== indirectly lost: 6,796 bytes in 9 blocks
==11012== possibly lost: 0 bytes in 0 blocks
==11012== still reachable: 3,128,963 bytes in 69,518 blocks
==11012== suppressed: 0 bytes in 0 blocks
==11012== Rerun with --leak-check=full to see details of leaked memory
==11012==
==11012== Use --track-origins=yes to see where uninitialised values come from
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012==
==11012== 1 errors in context 1 of 2:
==11012== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11012== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11012== by 0x488CD0: stringsubst (subst.c:301)
==11012== by 0x48801B: prefork (subst.c:77)
==11012== by 0x42B318: execcmd (exec.c:2619)
==11012== by 0x428CA0: execpline2 (exec.c:1697)
==11012== by 0x427FD2: execpline (exec.c:1484)
==11012== by 0x427756: execlist (exec.c:1267)
==11012== by 0x42717C: execode (exec.c:1073)
==11012== by 0x431299: runshfunc (exec.c:5040)
==11012== by 0x430E76: doshfunc (exec.c:4920)
==11012== by 0x4302FB: execshfunc (exec.c:4557)
==11012== by 0x42D8C1: execcmd (exec.c:3373)
==11012==
==11012==
==11012== 2 errors in context 2 of 2:
==11012== Conditional jump or move depends on uninitialised value(s)
==11012== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11012== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11012== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11012== by 0x40EFC2: execbuiltin (builtin.c:450)
==11012== by 0x42D8E9: execcmd (exec.c:3378)
==11012== by 0x428CA0: execpline2 (exec.c:1697)
==11012== by 0x427FD2: execpline (exec.c:1484)
==11012== by 0x42779A: execlist (exec.c:1275)
==11012== by 0x42717C: execode (exec.c:1073)
==11012== by 0x431299: runshfunc (exec.c:5040)
==11012== by 0x430E76: doshfunc (exec.c:4920)
==11012== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11012==
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928== LEAK SUMMARY:
==10928== definitely lost: 2,221 bytes in 14 blocks
==10928== indirectly lost: 6,796 bytes in 9 blocks
==10928== possibly lost: 0 bytes in 0 blocks
==10928== still reachable: 3,123,487 bytes in 69,319 blocks
==10928== suppressed: 0 bytes in 0 blocks
==10928== Rerun with --leak-check=full to see details of leaked memory
==10928==
==10928== Use --track-origins=yes to see where uninitialised values come from
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928==
==10928== 1 errors in context 1 of 2:
==10928== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10928== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10928== by 0x488CD0: stringsubst (subst.c:301)
==10928== by 0x48801B: prefork (subst.c:77)
==10928== by 0x42B318: execcmd (exec.c:2619)
==10928== by 0x428CA0: execpline2 (exec.c:1697)
==10928== by 0x427FD2: execpline (exec.c:1484)
==10928== by 0x427756: execlist (exec.c:1267)
==10928== by 0x42717C: execode (exec.c:1073)
==10928== by 0x431299: runshfunc (exec.c:5040)
==10928== by 0x430E76: doshfunc (exec.c:4920)
==10928== by 0x4302FB: execshfunc (exec.c:4557)
==10928== by 0x42D8C1: execcmd (exec.c:3373)
==10928==
==10928==
==10928== 2 errors in context 2 of 2:
==10928== Conditional jump or move depends on uninitialised value(s)
==10928== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10928== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10928== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10928== by 0x40EFC2: execbuiltin (builtin.c:450)
==10928== by 0x42D8E9: execcmd (exec.c:3378)
==10928== by 0x428CA0: execpline2 (exec.c:1697)
==10928== by 0x427FD2: execpline (exec.c:1484)
==10928== by 0x42779A: execlist (exec.c:1275)
==10928== by 0x42717C: execode (exec.c:1073)
==10928== by 0x431299: runshfunc (exec.c:5040)
==10928== by 0x430E76: doshfunc (exec.c:4920)
==10928== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10928==
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930== LEAK SUMMARY:
==10930== definitely lost: 2,221 bytes in 14 blocks
==10930== indirectly lost: 6,796 bytes in 9 blocks
==10930== possibly lost: 0 bytes in 0 blocks
==10930== still reachable: 3,127,587 bytes in 69,456 blocks
==10930== suppressed: 0 bytes in 0 blocks
==10930== Rerun with --leak-check=full to see details of leaked memory
==10930==
==10930== Use --track-origins=yes to see where uninitialised values come from
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930==
==10930== 1 errors in context 1 of 2:
==10930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10930== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10930== by 0x488CD0: stringsubst (subst.c:301)
==10930== by 0x48801B: prefork (subst.c:77)
==10930== by 0x42B318: execcmd (exec.c:2619)
==10930== by 0x428CA0: execpline2 (exec.c:1697)
==10930== by 0x427FD2: execpline (exec.c:1484)
==10930== by 0x427756: execlist (exec.c:1267)
==10930== by 0x42717C: execode (exec.c:1073)
==10930== by 0x431299: runshfunc (exec.c:5040)
==10930== by 0x430E76: doshfunc (exec.c:4920)
==10930== by 0x4302FB: execshfunc (exec.c:4557)
==10930== by 0x42D8C1: execcmd (exec.c:3373)
==10930==
==10930==
==10930== 2 errors in context 2 of 2:
==10930== Conditional jump or move depends on uninitialised value(s)
==10930== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10930== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10930== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10930== by 0x40EFC2: execbuiltin (builtin.c:450)
==10930== by 0x42D8E9: execcmd (exec.c:3378)
==10930== by 0x428CA0: execpline2 (exec.c:1697)
==10930== by 0x427FD2: execpline (exec.c:1484)
==10930== by 0x42779A: execlist (exec.c:1275)
==10930== by 0x42717C: execode (exec.c:1073)
==10930== by 0x431299: runshfunc (exec.c:5040)
==10930== by 0x430E76: doshfunc (exec.c:4920)
==10930== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10930==
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== Checked 4,789,280 bytes
==11018==
==10074== LEAK SUMMARY:
==10074== definitely lost: 2,197 bytes in 13 blocks
==10074== indirectly lost: 6,756 bytes in 7 blocks
==10074== possibly lost: 0 bytes in 0 blocks
==10074== still reachable: 3,120,261 bytes in 69,232 blocks
==10074== suppressed: 0 bytes in 0 blocks
==10074== Rerun with --leak-check=full to see details of leaked memory
==10074==
==10074== Use --track-origins=yes to see where uninitialised values come from
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10074==
==10074== 1 errors in context 1 of 2:
==10074== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10074== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10074== by 0x488CD0: stringsubst (subst.c:301)
==10074== by 0x48801B: prefork (subst.c:77)
==10074== by 0x42B318: execcmd (exec.c:2619)
==10074== by 0x428CA0: execpline2 (exec.c:1697)
==10074== by 0x427FD2: execpline (exec.c:1484)
==10074== by 0x427756: execlist (exec.c:1267)
==10074== by 0x42717C: execode (exec.c:1073)
==10074== by 0x431299: runshfunc (exec.c:5040)
==10074== by 0x430E76: doshfunc (exec.c:4920)
==10074== by 0x4302FB: execshfunc (exec.c:4557)
==10074== by 0x42D8C1: execcmd (exec.c:3373)
==10074==
==10074==
==10074== 2 errors in context 2 of 2:
==10074== Conditional jump or move depends on uninitialised value(s)
==10074== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10074== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10074== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10074== by 0x40EFC2: execbuiltin (builtin.c:450)
==10074== by 0x42D8E9: execcmd (exec.c:3378)
==10074== by 0x428CA0: execpline2 (exec.c:1697)
==10074== by 0x427FD2: execpline (exec.c:1484)
==10074== by 0x42779A: execlist (exec.c:1275)
==10074== by 0x42717C: execode (exec.c:1073)
==10074== by 0x431299: runshfunc (exec.c:5040)
==10074== by 0x430E76: doshfunc (exec.c:4920)
==10074== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10074==
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== LEAK SUMMARY:
==11018== definitely lost: 3,213 bytes in 20 blocks
==11018== indirectly lost: 6,812 bytes in 10 blocks
==11018== possibly lost: 0 bytes in 0 blocks
==11018== still reachable: 3,105,561 bytes in 68,981 blocks
==11018== suppressed: 0 bytes in 0 blocks
==11018== Rerun with --leak-check=full to see details of leaked memory
==11018==
==11018== Use --track-origins=yes to see where uninitialised values come from
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018==
==11018== 1 errors in context 1 of 2:
==11018== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11018== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11018== by 0x488CD0: stringsubst (subst.c:301)
==11018== by 0x48801B: prefork (subst.c:77)
==11018== by 0x42B318: execcmd (exec.c:2619)
==11018== by 0x428CA0: execpline2 (exec.c:1697)
==11018== by 0x427FD2: execpline (exec.c:1484)
==11018== by 0x427756: execlist (exec.c:1267)
==11018== by 0x42717C: execode (exec.c:1073)
==11018== by 0x431299: runshfunc (exec.c:5040)
==11018== by 0x430E76: doshfunc (exec.c:4920)
==11018== by 0x4302FB: execshfunc (exec.c:4557)
==11018== by 0x42D8C1: execcmd (exec.c:3373)
==11018==
==11018==
==11018== 2 errors in context 2 of 2:
==11018== Conditional jump or move depends on uninitialised value(s)
==11018== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11018== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11018== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11018== by 0x40EFC2: execbuiltin (builtin.c:450)
==11018== by 0x42D8E9: execcmd (exec.c:3378)
==11018== by 0x428CA0: execpline2 (exec.c:1697)
==11018== by 0x427FD2: execpline (exec.c:1484)
==11018== by 0x42779A: execlist (exec.c:1275)
==11018== by 0x42717C: execode (exec.c:1073)
==11018== by 0x431299: runshfunc (exec.c:5040)
==11018== by 0x430E76: doshfunc (exec.c:4920)
==11018== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11018==
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF514C, len 4
--11019-- Caught __NR_exit; running __libc_freeres()
==11019== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11019-by-pythonnut-on-???
==11019== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-11019-by-pythonnut-on-???
==11019== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-11019-by-pythonnut-on-???
==11019==
==11019== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11019== don't want to do, unless you know exactly what you're doing,
==11019== or are doing some strange experiment):
==11019== /usr/lib/valgrind/../../bin/vgdb --pid=11019 ...command...
==11019==
==11019== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11019== /path/to/gdb ./zsh
==11019== and then give GDB the following command
==11019== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11019
==11019== --pid is optional if only one valgrind process is running
==11019==
--11019-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11019==
==11019== HEAP SUMMARY:
==11019== in use at exit: 3,115,442 bytes in 69,007 blocks
==11019== total heap usage: 1,776,839 allocs, 1,707,832 frees, 141,632,619 bytes allocated
==11019==
==11019== Searching for pointers to 69,007 not-freed blocks
--11019-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11019-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11019-- Scanning root segment: 0x4022000..0x4026fff (20480)
--11019-- Scanning root segment: 0x4049000..0x404cfff (16384)
--11019-- Scanning root segment: 0x4222000..0x4222fff (4096)
--11019-- Scanning root segment: 0x4223000..0x4223fff (4096)
--11019-- Scanning root segment: 0x4224000..0x4224fff (4096)
--11019-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11019-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11019-- Scanning root segment: 0x5041000..0x5041fff (4096)
--11019-- Scanning root segment: 0x5245000..0x5245fff (4096)
--11019-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--11019-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--11019-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11019-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--11019-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11019-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11019-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11019-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11019-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11019-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11019-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11019-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11019-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11019-- Scanning root segment: 0x701a000..0x701afff (4096)
--11019-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11019-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11019-- Scanning root segment: 0xae51000..0xae52fff (8192)
--11019-- Scanning root segment: 0xb054000..0xb054fff (4096)
--11019-- Scanning root segment: 0xb268000..0xb268fff (4096)
--11019-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--11019-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11019-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11019-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11019-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11019== Checked 4,788,816 bytes
==11019==
==11019== LEAK SUMMARY:
==11019== definitely lost: 3,205 bytes in 20 blocks
==11019== indirectly lost: 6,756 bytes in 7 blocks
==11019== possibly lost: 0 bytes in 0 blocks
==11019== still reachable: 3,105,481 bytes in 68,980 blocks
==11019== suppressed: 0 bytes in 0 blocks
==11019== Rerun with --leak-check=full to see details of leaked memory
==11019==
==11019== Use --track-origins=yes to see where uninitialised values come from
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11019==
==11019== 1 errors in context 1 of 2:
==11019== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11019== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11019== by 0x488CD0: stringsubst (subst.c:301)
==11019== by 0x48801B: prefork (subst.c:77)
==11019== by 0x42B318: execcmd (exec.c:2619)
==11019== by 0x428CA0: execpline2 (exec.c:1697)
==11019== by 0x427FD2: execpline (exec.c:1484)
==11019== by 0x427756: execlist (exec.c:1267)
==11019== by 0x42717C: execode (exec.c:1073)
==11019== by 0x431299: runshfunc (exec.c:5040)
==11019== by 0x430E76: doshfunc (exec.c:4920)
==11019== by 0x4302FB: execshfunc (exec.c:4557)
==11019== by 0x42D8C1: execcmd (exec.c:3373)
==11019==
==11019==
==11019== 2 errors in context 2 of 2:
==11019== Conditional jump or move depends on uninitialised value(s)
==11019== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11019== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11019== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11019== by 0x40EFC2: execbuiltin (builtin.c:450)
==11019== by 0x42D8E9: execcmd (exec.c:3378)
==11019== by 0x428CA0: execpline2 (exec.c:1697)
==11019== by 0x427FD2: execpline (exec.c:1484)
==11019== by 0x42779A: execlist (exec.c:1275)
==11019== by 0x42717C: execode (exec.c:1073)
==11019== by 0x431299: runshfunc (exec.c:5040)
==11019== by 0x430E76: doshfunc (exec.c:4920)
==11019== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11019==
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005, addr 0xFFEFF561C, len 4
--7806-- Caught __NR_exit; running __libc_freeres()
--7806-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7806==
==7806== HEAP SUMMARY:
==7806== in use at exit: 3,113,959 bytes in 68,947 blocks
==7806== total heap usage: 1,776,798 allocs, 1,707,851 frees, 141,637,222 bytes allocated
==7806==
==7806== Searching for pointers to 68,947 not-freed blocks
--7806-- Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7806-- Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7806-- Scanning root segment: 0x4022000..0x4026fff (20480)
--7806-- Scanning root segment: 0x4049000..0x404cfff (16384)
--7806-- Scanning root segment: 0x4222000..0x4222fff (4096)
--7806-- Scanning root segment: 0x4223000..0x4223fff (4096)
--7806-- Scanning root segment: 0x4224000..0x4224fff (4096)
--7806-- Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7806-- Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7806-- Scanning root segment: 0x5041000..0x5041fff (4096)
--7806-- Scanning root segment: 0x5245000..0x5245fff (4096)
--7806-- Scanning root segment: 0x54ac000..0x54acfff (4096)
--7806-- Scanning root segment: 0x54ad000..0x54adfff (4096)
--7806-- Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7806-- Scanning root segment: 0x59ba000..0x59bafff (4096)
--7806-- Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7806-- Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7806-- Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7806-- Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7806-- Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7806-- Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7806-- Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7806-- Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7806-- Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7806-- Scanning root segment: 0x701a000..0x701afff (4096)
--7806-- Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--7806-- Scanning root segment: 0xac4d000..0xac4dfff (4096)
--7806-- Scanning root segment: 0xae51000..0xae52fff (8192)
--7806-- Scanning root segment: 0xb054000..0xb054fff (4096)
--7806-- Scanning root segment: 0xb268000..0xb268fff (4096)
--7806-- Scanning root segment: 0xb46a000..0xb46afff (4096)
--7806-- Scanning root segment: 0xba6f000..0xba6ffff (4096)
--7806-- Scanning root segment: 0xbc82000..0xbc83fff (8192)
--7806-- Scanning root segment: 0xbe85000..0xbe85fff (4096)
--7806-- Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Checked 4,786,664 bytes
==7806==
==7806== LEAK SUMMARY:
==7806== definitely lost: 3,205 bytes in 20 blocks
==7806== indirectly lost: 6,756 bytes in 7 blocks
==7806== possibly lost: 0 bytes in 0 blocks
==7806== still reachable: 3,103,998 bytes in 68,920 blocks
==7806== suppressed: 0 bytes in 0 blocks
==7806== Rerun with --leak-check=full to see details of leaked memory
==7806==
==7806== Use --track-origins=yes to see where uninitialised values come from
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806==
==7806== 1 errors in context 1 of 2:
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806== at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806== by 0x488CD0: stringsubst (subst.c:301)
==7806== by 0x48801B: prefork (subst.c:77)
==7806== by 0x42B318: execcmd (exec.c:2619)
==7806== by 0x428CA0: execpline2 (exec.c:1697)
==7806== by 0x427FD2: execpline (exec.c:1484)
==7806== by 0x427756: execlist (exec.c:1267)
==7806== by 0x42717C: execode (exec.c:1073)
==7806== by 0x431299: runshfunc (exec.c:5040)
==7806== by 0x430E76: doshfunc (exec.c:4920)
==7806== by 0x4302FB: execshfunc (exec.c:4557)
==7806== by 0x42D8C1: execcmd (exec.c:3373)
==7806==
==7806==
==7806== 2 errors in context 2 of 2:
==7806== Conditional jump or move depends on uninitialised value(s)
==7806== at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806== by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806== by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806== by 0x40EFC2: execbuiltin (builtin.c:450)
==7806== by 0x42D8E9: execcmd (exec.c:3378)
==7806== by 0x428CA0: execpline2 (exec.c:1697)
==7806== by 0x427FD2: execpline (exec.c:1484)
==7806== by 0x42779A: execlist (exec.c:1275)
==7806== by 0x42717C: execode (exec.c:1073)
==7806== by 0x431299: runshfunc (exec.c:5040)
==7806== by 0x430E76: doshfunc (exec.c:4920)
==7806== by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806==
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
next prev parent reply other threads:[~2014-12-15 21:21 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-12-13 19:49 Jonathan H
2014-12-13 23:28 ` Bart Schaefer
2014-12-13 23:36 ` Jonathan H
2014-12-14 4:40 ` Bart Schaefer
2014-12-14 18:20 ` Peter Stephenson
2014-12-14 18:43 ` Bart Schaefer
2014-12-15 21:20 ` Jonathan H [this message]
2014-12-15 23:39 ` Bart Schaefer
2014-12-16 20:58 ` Peter Stephenson
2014-12-17 17:18 ` Jonathan H
2014-12-18 6:14 ` Bart Schaefer
2014-12-18 19:09 ` Peter Stephenson
2014-12-18 19:34 ` Peter Stephenson
2014-12-29 0:57 ` Daniel Shahaf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAAW2-Zft+xzCfSYF4O9F5TnaYqODdr8P_ZisPTPHQK8qyeGuVw@mail.gmail.com \
--to=pythonnut@gmail.com \
--cc=p.w.stephenson@ntlworld.com \
--cc=zsh-workers@zsh.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.vuxu.org/mirror/zsh/
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).