==10342== Memcheck, a memory error detector ==10342== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==10342== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==10342== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 162-8700-0.004 ==10342== Parent PID: 8731 ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C549C: parse_int.isra.2 (ieee.c:348) ==10342== by 0x7C9AA6: ieee_slurp_sections (ieee.c:1192) ==10342== by 0x7C9AA6: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C549C: parse_int.isra.2 (ieee.c:348) ==10342== by 0x7C9AB3: ieee_slurp_sections (ieee.c:1193) ==10342== by 0x7C9AB3: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C549C: parse_int.isra.2 (ieee.c:348) ==10342== by 0x7C9ABE: ieee_slurp_sections (ieee.c:1194) ==10342== by 0x7C9ABE: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C9743: ieee_slurp_sections (ieee.c:1109) ==10342== by 0x7C9743: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C974B: ieee_slurp_sections (ieee.c:1109) ==10342== by 0x7C974B: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Conditional jump or move depends on uninitialised value(s) ==10342== at 0x7C9753: ieee_slurp_sections (ieee.c:1109) ==10342== by 0x7C9753: ieee_object_p (ieee.c:1951) ==10342== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==10342== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==10342== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== ==10342== Invalid read of size 1 ==10342== at 0x7C5E20: ieee_slurp_external_symbols (ieee.c:737) ==10342== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==10342== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==10342== by 0x40CBAD: slurp_symtab (objdump.c:563) ==10342== by 0x40CBAD: dump_bfd (objdump.c:3242) ==10342== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==10342== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== Address 0x455fded0 is not stack'd, malloc'd or (recently) free'd ==10342== ==10342== ==10342== Process terminating with default action of signal 11 (SIGSEGV) ==10342== Access not within mapped region at address 0x455FDED0 ==10342== at 0x7C5E20: ieee_slurp_external_symbols (ieee.c:737) ==10342== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==10342== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==10342== by 0x40CBAD: slurp_symtab (objdump.c:563) ==10342== by 0x40CBAD: dump_bfd (objdump.c:3242) ==10342== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==10342== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==10342== by 0x40F7B2: display_file (objdump.c:3425) ==10342== by 0x40A079: main (objdump.c:3707) ==10342== If you believe this happened as a result of a stack ==10342== overflow in your program's main thread (unlikely but ==10342== possible), you can try to increase the size of the ==10342== main thread stack using the --main-stacksize= flag. ==10342== The main thread stack size used in this run was 8388608. ==10342== ==10342== HEAP SUMMARY: ==10342== in use at exit: 2,106,567 bytes in 9 blocks ==10342== total heap usage: 21 allocs, 12 frees, 2,153,439 bytes allocated ==10342== ==10342== LEAK SUMMARY: ==10342== definitely lost: 0 bytes in 0 blocks ==10342== indirectly lost: 0 bytes in 0 blocks ==10342== possibly lost: 0 bytes in 0 blocks ==10342== still reachable: 2,106,567 bytes in 9 blocks ==10342== suppressed: 0 bytes in 0 blocks ==10342== Rerun with --leak-check=full to see details of leaked memory ==10342== ==10342== For counts of detected and suppressed errors, rerun with: -v ==10342== Use --track-origins=yes to see where uninitialised values come from ==10342== ERROR SUMMARY: 7 errors from 7 contexts (suppressed: 1 from 1)