==15390== Memcheck, a memory error detector ==15390== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==15390== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==15390== Command: binutils-gdb/binutils/objdump -afphxgGWtTrRw --special-syms 078-63256-0.001:0.1 ==15390== Parent PID: 9683 ==15390== ==15390== Invalid write of size 4 ==15390== at 0x4447EC: _bfd_coff_read_string_table (coffgen.c:1698) ==15390== by 0x445157: _bfd_coff_internal_syment_name (coffgen.c:462) ==15390== by 0x4A48FD: _bfd_pei_swap_sym_in (peigen.c:150) ==15390== by 0x4452B0: coff_get_normalized_symtab (coffgen.c:1786) ==15390== by 0x4A0025: coff_slurp_symbol_table.part.5 (coffcode.h:4679) ==15390== by 0x443404: coff_get_symtab_upper_bound (coffgen.c:409) ==15390== by 0x4073CE: slurp_symtab (objdump.c:563) ==15390== by 0x4073CE: dump_bfd (objdump.c:3234) ==15390== by 0x407F1F: display_object_bfd (objdump.c:3322) ==15390== by 0x407F1F: display_any_bfd (objdump.c:3396) ==15390== by 0x409FD2: display_file (objdump.c:3417) ==15390== by 0x4048F9: main (objdump.c:3699) ==15390== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==15390== ==15390== ==15390== Process terminating with default action of signal 11 (SIGSEGV) ==15390== Access not within mapped region at address 0x0 ==15390== at 0x4447EC: _bfd_coff_read_string_table (coffgen.c:1698) ==15390== by 0x445157: _bfd_coff_internal_syment_name (coffgen.c:462) ==15390== by 0x4A48FD: _bfd_pei_swap_sym_in (peigen.c:150) ==15390== by 0x4452B0: coff_get_normalized_symtab (coffgen.c:1786) ==15390== by 0x4A0025: coff_slurp_symbol_table.part.5 (coffcode.h:4679) ==15390== by 0x443404: coff_get_symtab_upper_bound (coffgen.c:409) ==15390== by 0x4073CE: slurp_symtab (objdump.c:563) ==15390== by 0x4073CE: dump_bfd (objdump.c:3234) ==15390== by 0x407F1F: display_object_bfd (objdump.c:3322) ==15390== by 0x407F1F: display_any_bfd (objdump.c:3396) ==15390== by 0x409FD2: display_file (objdump.c:3417) ==15390== by 0x4048F9: main (objdump.c:3699) ==15390== If you believe this happened as a result of a stack ==15390== overflow in your program's main thread (unlikely but ==15390== possible), you can try to increase the size of the ==15390== main thread stack using the --main-stacksize= flag. ==15390== The main thread stack size used in this run was 8388608. ==15390== ==15390== HEAP SUMMARY: ==15390== in use at exit: 43,600 bytes in 10 blocks ==15390== total heap usage: 30 allocs, 20 frees, 253,924 bytes allocated ==15390== ==15390== LEAK SUMMARY: ==15390== definitely lost: 0 bytes in 0 blocks ==15390== indirectly lost: 0 bytes in 0 blocks ==15390== possibly lost: 0 bytes in 0 blocks ==15390== still reachable: 43,600 bytes in 10 blocks ==15390== suppressed: 0 bytes in 0 blocks ==15390== Rerun with --leak-check=full to see details of leaked memory ==15390== ==15390== For counts of detected and suppressed errors, rerun with: -v ==15390== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 1 from 1)