==20560== Memcheck, a memory error detector ==20560== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==20560== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==20560== Command: binutils-gdb/binutils/objdump -afphxgGWtTrRw --special-syms 002-87578-0.001:0.1 ==20560== Parent PID: 2685 ==20560== ==20560== Invalid read of size 1 ==20560== at 0x4474F0: bfd_getl32 (libbfd.c:620) ==20560== by 0x4080F7: print_section_stabs (objdump.c:2511) ==20560== by 0x4080F7: find_stabs_section (objdump.c:2583) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x5610ffd is 1 bytes after a block of size 2,012 alloc'd ==20560== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==20560== by 0x4D6237: xmalloc (xmalloc.c:147) ==20560== by 0x405253: read_section_stabs (objdump.c:2444) ==20560== by 0x40801B: find_stabs_section (objdump.c:2580) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== ==20560== Invalid read of size 1 ==20560== at 0x4474F4: bfd_getl32 (libbfd.c:621) ==20560== by 0x4080F7: print_section_stabs (objdump.c:2511) ==20560== by 0x4080F7: find_stabs_section (objdump.c:2583) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x5610ffe is 2 bytes after a block of size 2,012 alloc'd ==20560== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==20560== by 0x4D6237: xmalloc (xmalloc.c:147) ==20560== by 0x405253: read_section_stabs (objdump.c:2444) ==20560== by 0x40801B: find_stabs_section (objdump.c:2580) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== ==20560== Invalid read of size 1 ==20560== at 0x4474F8: bfd_getl32 (libbfd.c:619) ==20560== by 0x4080F7: print_section_stabs (objdump.c:2511) ==20560== by 0x4080F7: find_stabs_section (objdump.c:2583) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x5610ffc is 0 bytes after a block of size 2,012 alloc'd ==20560== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==20560== by 0x4D6237: xmalloc (xmalloc.c:147) ==20560== by 0x405253: read_section_stabs (objdump.c:2444) ==20560== by 0x40801B: find_stabs_section (objdump.c:2580) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== ==20560== Invalid read of size 1 ==20560== at 0x447506: bfd_getl32 (libbfd.c:622) ==20560== by 0x4080F7: print_section_stabs (objdump.c:2511) ==20560== by 0x4080F7: find_stabs_section (objdump.c:2583) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x5610fff is 3 bytes after a block of size 2,012 alloc'd ==20560== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==20560== by 0x4D6237: xmalloc (xmalloc.c:147) ==20560== by 0x405253: read_section_stabs (objdump.c:2444) ==20560== by 0x40801B: find_stabs_section (objdump.c:2580) ==20560== by 0x44996B: bfd_map_over_sections (section.c:1354) ==20560== by 0x405201: dump_stabs_section (objdump.c:2597) ==20560== by 0x40774B: dump_stabs (objdump.c:2608) ==20560== by 0x40774B: dump_bfd (objdump.c:3257) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== ==20560== Invalid read of size 1 ==20560== at 0x41D9E2: read_section_stabs_debugging_info (rddbg.c:201) ==20560== by 0x41D9E2: read_debugging_info (rddbg.c:56) ==20560== by 0x4079B2: dump_bfd (objdump.c:3271) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x56118ff is 1 bytes before a block of size 7,020 alloc'd ==20560== at 0x4C27C20: malloc (vg_replace_malloc.c:296) ==20560== by 0x4D6237: xmalloc (xmalloc.c:147) ==20560== by 0x41D8A0: read_section_stabs_debugging_info (rddbg.c:142) ==20560== by 0x41D8A0: read_debugging_info (rddbg.c:56) ==20560== by 0x4079B2: dump_bfd (objdump.c:3271) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== ==20560== Invalid read of size 1 ==20560== at 0x4273FA: parse_stab_string (stabs.c:857) ==20560== by 0x4273FA: parse_stab (stabs.c:651) ==20560== by 0x41DA20: read_section_stabs_debugging_info (rddbg.c:227) ==20560== by 0x41DA20: read_debugging_info (rddbg.c:56) ==20560== by 0x4079B2: dump_bfd (objdump.c:3271) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==20560== ==20560== ==20560== Process terminating with default action of signal 11 (SIGSEGV) ==20560== Access not within mapped region at address 0x0 ==20560== at 0x4273FA: parse_stab_string (stabs.c:857) ==20560== by 0x4273FA: parse_stab (stabs.c:651) ==20560== by 0x41DA20: read_section_stabs_debugging_info (rddbg.c:227) ==20560== by 0x41DA20: read_debugging_info (rddbg.c:56) ==20560== by 0x4079B2: dump_bfd (objdump.c:3271) ==20560== by 0x407F1F: display_object_bfd (objdump.c:3322) ==20560== by 0x407F1F: display_any_bfd (objdump.c:3396) ==20560== by 0x409FD2: display_file (objdump.c:3417) ==20560== by 0x4048F9: main (objdump.c:3699) ==20560== If you believe this happened as a result of a stack ==20560== overflow in your program's main thread (unlikely but ==20560== possible), you can try to increase the size of the ==20560== main thread stack using the --main-stacksize= flag. ==20560== The main thread stack size used in this run was 8388608. ==20560== ==20560== HEAP SUMMARY: ==20560== in use at exit: 56,264 bytes in 82 blocks ==20560== total heap usage: 229 allocs, 147 frees, 110,373 bytes allocated ==20560== ==20560== LEAK SUMMARY: ==20560== definitely lost: 16 bytes in 2 blocks ==20560== indirectly lost: 136 bytes in 1 blocks ==20560== possibly lost: 0 bytes in 0 blocks ==20560== still reachable: 56,112 bytes in 79 blocks ==20560== suppressed: 0 bytes in 0 blocks ==20560== Rerun with --leak-check=full to see details of leaked memory ==20560== ==20560== For counts of detected and suppressed errors, rerun with: -v ==20560== ERROR SUMMARY: 139 errors from 6 contexts (suppressed: 1 from 1)