==12692== Memcheck, a memory error detector ==12692== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==12692== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==12692== Command: binutils-gdb/binutils/objdump -x 014-66576-0.001:0.1 ==12692== Parent PID: 12685 ==12692== ==12692== Invalid read of size 8 ==12692== at 0x46D3F0: _bfd_elf_print_private_bfd_data (elf.c:1383) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== Address 0x56057e8 is 8 bytes after a block of size 4,064 alloc'd ==12692== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==12692== by 0x4D5CAF: _objalloc_alloc (objalloc.c:159) ==12692== by 0x448BB5: bfd_alloc (opncls.c:952) ==12692== by 0x448C7D: bfd_zalloc (opncls.c:1001) ==12692== by 0x46D72D: _bfd_elf_make_empty_symbol (elf.c:7577) ==12692== by 0x44939D: _bfd_generic_new_section_hook (section.c:799) ==12692== by 0x44920E: bfd_section_init (section.c:823) ==12692== by 0x46F114: _bfd_elf_make_section_from_shdr.part.19 (elf.c:862) ==12692== by 0x46FFB4: _bfd_elf_make_section_from_shdr (elf.c:859) ==12692== by 0x46FFB4: bfd_section_from_shdr (elf.c:2093) ==12692== by 0x46268B: bfd_elf64_object_p (elfcode.h:800) ==12692== by 0x4468A6: bfd_check_format_matches (format.c:305) ==12692== by 0x407EE1: display_object_bfd (objdump.c:3320) ==12692== by 0x407EE1: display_any_bfd (objdump.c:3396) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x5296E07: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Use of uninitialised value of size 8 ==12692== at 0x529649B: _itoa_word (_itoa.c:179) ==12692== by 0x529A56C: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x52964A5: _itoa_word (_itoa.c:179) ==12692== by 0x529A56C: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x529A5B8: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x5296ECF: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x5296F4F: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Use of uninitialised value of size 8 ==12692== at 0x5296441: _itoa_word (_itoa.c:180) ==12692== by 0x529A56C: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Conditional jump or move depends on uninitialised value(s) ==12692== at 0x5296448: _itoa_word (_itoa.c:180) ==12692== by 0x529A56C: vfprintf (vfprintf.c:1648) ==12692== by 0x52A06C6: fprintf (fprintf.c:32) ==12692== by 0x46D417: _bfd_elf_print_private_bfd_data (elf.c:1381) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== ==12692== Invalid read of size 8 ==12692== at 0x46D418: _bfd_elf_print_private_bfd_data (elf.c:1384) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== Address 0x56057f8 is 24 bytes after a block of size 4,064 in arena "client" ==12692== ==12692== Invalid read of size 8 ==12692== at 0x46D421: _bfd_elf_print_private_bfd_data (elf.c:1384) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== Address 0x1038 is not stack'd, malloc'd or (recently) free'd ==12692== ==12692== ==12692== Process terminating with default action of signal 11 (SIGSEGV) ==12692== Access not within mapped region at address 0x1038 ==12692== at 0x46D421: _bfd_elf_print_private_bfd_data (elf.c:1384) ==12692== by 0x4078EE: dump_bfd_private_header (objdump.c:2648) ==12692== by 0x4078EE: dump_bfd (objdump.c:3223) ==12692== by 0x407F1F: display_object_bfd (objdump.c:3322) ==12692== by 0x407F1F: display_any_bfd (objdump.c:3396) ==12692== by 0x409FD2: display_file (objdump.c:3417) ==12692== by 0x4048F9: main (objdump.c:3699) ==12692== If you believe this happened as a result of a stack ==12692== overflow in your program's main thread (unlikely but ==12692== possible), you can try to increase the size of the ==12692== main thread stack using the --main-stacksize= flag. ==12692== The main thread stack size used in this run was 8388608. ==12692== ==12692== HEAP SUMMARY: ==12692== in use at exit: 52,876 bytes in 20 blocks ==12692== total heap usage: 34 allocs, 14 frees, 90,414 bytes allocated ==12692== ==12692== LEAK SUMMARY: ==12692== definitely lost: 0 bytes in 0 blocks ==12692== indirectly lost: 0 bytes in 0 blocks ==12692== possibly lost: 0 bytes in 0 blocks ==12692== still reachable: 52,876 bytes in 20 blocks ==12692== suppressed: 0 bytes in 0 blocks ==12692== Rerun with --leak-check=full to see details of leaked memory ==12692== ==12692== For counts of detected and suppressed errors, rerun with: -v ==12692== Use --track-origins=yes to see where uninitialised values come from ==12692== ERROR SUMMARY: 17 errors from 11 contexts (suppressed: 1 from 1)