==5407== Memcheck, a memory error detector ==5407== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==5407== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==5407== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 1007-9950-0.004 ==5407== Parent PID: 7579 ==5407== ==5407== Conditional jump or move depends on uninitialised value(s) ==5407== at 0x7C6785: ieee_slurp_section_data (ieee.c:1689) ==5407== by 0x7C9776: ieee_object_p (ieee.c:1958) ==5407== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==5407== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==5407== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==5407== by 0x40F7B2: display_file (objdump.c:3425) ==5407== by 0x40A079: main (objdump.c:3707) ==5407== ==5407== Invalid read of size 1 ==5407== at 0x7C5E20: ieee_slurp_external_symbols (ieee.c:737) ==5407== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==5407== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==5407== by 0x40CBAD: slurp_symtab (objdump.c:563) ==5407== by 0x40CBAD: dump_bfd (objdump.c:3242) ==5407== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==5407== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==5407== by 0x40F7B2: display_file (objdump.c:3425) ==5407== by 0x40A079: main (objdump.c:3707) ==5407== Address 0xdaf9050 is not stack'd, malloc'd or (recently) free'd ==5407== ==5407== ==5407== Process terminating with default action of signal 11 (SIGSEGV) ==5407== Access not within mapped region at address 0xDAF9050 ==5407== at 0x7C5E20: ieee_slurp_external_symbols (ieee.c:737) ==5407== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==5407== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==5407== by 0x40CBAD: slurp_symtab (objdump.c:563) ==5407== by 0x40CBAD: dump_bfd (objdump.c:3242) ==5407== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==5407== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==5407== by 0x40F7B2: display_file (objdump.c:3425) ==5407== by 0x40A079: main (objdump.c:3707) ==5407== If you believe this happened as a result of a stack ==5407== overflow in your program's main thread (unlikely but ==5407== possible), you can try to increase the size of the ==5407== main thread stack using the --main-stacksize= flag. ==5407== The main thread stack size used in this run was 8388608. ==5407== ==5407== HEAP SUMMARY: ==5407== in use at exit: 33,563,864 bytes in 9 blocks ==5407== total heap usage: 21 allocs, 12 frees, 33,610,736 bytes allocated ==5407== ==5407== LEAK SUMMARY: ==5407== definitely lost: 0 bytes in 0 blocks ==5407== indirectly lost: 0 bytes in 0 blocks ==5407== possibly lost: 0 bytes in 0 blocks ==5407== still reachable: 33,563,864 bytes in 9 blocks ==5407== suppressed: 0 bytes in 0 blocks ==5407== Rerun with --leak-check=full to see details of leaked memory ==5407== ==5407== For counts of detected and suppressed errors, rerun with: -v ==5407== Use --track-origins=yes to see where uninitialised values come from ==5407== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 1 from 1)