==26195== Memcheck, a memory error detector ==26195== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==26195== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==26195== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 1674-418-0.004 ==26195== Parent PID: 8731 ==26195== ==26195== Invalid read of size 1 ==26195== at 0x7C676C: ieee_slurp_section_data (ieee.c:1673) ==26195== by 0x7C9776: ieee_object_p (ieee.c:1958) ==26195== by 0x4FE6A6: bfd_check_format_matches (format.c:305) ==26195== by 0x40D6B1: display_object_bfd (objdump.c:3328) ==26195== by 0x40D6B1: display_any_bfd (objdump.c:3404) ==26195== by 0x40F7B2: display_file (objdump.c:3425) ==26195== by 0x40A079: main (objdump.c:3707) ==26195== Address 0x5601a94 is 10,964 bytes inside an unallocated block of size 4,169,760 in arena "client" ==26195== ==26195== Invalid read of size 8 ==26195== at 0x7C578C: parse_expression (ieee.c:639) ==26195== by 0x7C609B: ieee_slurp_external_symbols (ieee.c:857) ==26195== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==26195== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==26195== by 0x40CBAD: slurp_symtab (objdump.c:563) ==26195== by 0x40CBAD: dump_bfd (objdump.c:3242) ==26195== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==26195== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==26195== by 0x40F7B2: display_file (objdump.c:3425) ==26195== by 0x40A079: main (objdump.c:3707) ==26195== Address 0xffefffc90 is on thread 1's stack ==26195== 144 bytes below stack pointer ==26195== ==26195== ==26195== Process terminating with default action of signal 11 (SIGSEGV) ==26195== Access not within mapped region at address 0xFFEFFDFF8 ==26195== at 0x7C578C: parse_expression (ieee.c:639) ==26195== by 0x7C609B: ieee_slurp_external_symbols (ieee.c:857) ==26195== by 0x7C9CB4: ieee_slurp_symbol_table (ieee.c:969) ==26195== by 0x7C9CB4: ieee_get_symtab_upper_bound (ieee.c:979) ==26195== by 0x40CBAD: slurp_symtab (objdump.c:563) ==26195== by 0x40CBAD: dump_bfd (objdump.c:3242) ==26195== by 0x40D6EF: display_object_bfd (objdump.c:3330) ==26195== by 0x40D6EF: display_any_bfd (objdump.c:3404) ==26195== by 0x40F7B2: display_file (objdump.c:3425) ==26195== by 0x40A079: main (objdump.c:3707) ==26195== If you believe this happened as a result of a stack ==26195== overflow in your program's main thread (unlikely but ==26195== possible), you can try to increase the size of the ==26195== main thread stack using the --main-stacksize= flag. ==26195== The main thread stack size used in this run was 8388608. ==26195== ==26195== HEAP SUMMARY: ==26195== in use at exit: 13,247 bytes in 9 blocks ==26195== total heap usage: 21 allocs, 12 frees, 60,119 bytes allocated ==26195== ==26195== LEAK SUMMARY: ==26195== definitely lost: 0 bytes in 0 blocks ==26195== indirectly lost: 0 bytes in 0 blocks ==26195== possibly lost: 0 bytes in 0 blocks ==26195== still reachable: 13,247 bytes in 9 blocks ==26195== suppressed: 0 bytes in 0 blocks ==26195== Rerun with --leak-check=full to see details of leaked memory ==26195== ==26195== For counts of detected and suppressed errors, rerun with: -v ==26195== ERROR SUMMARY: 307 errors from 2 contexts (suppressed: 1 from 1)