==8152== Memcheck, a memory error detector ==8152== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==8152== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==8152== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 027-135133-0.005 ==8152== Parent PID: 8461 ==8152== ==8152== Use of uninitialised value of size 8 ==8152== at 0x41873B: display_debug_frames (dwarf.c:5469) ==8152== by 0x40A2DC: dump_dwarf_section (objdump.c:2368) ==8152== by 0x44A23B: bfd_map_over_sections (section.c:1354) ==8152== by 0x405DF3: dump_dwarf (objdump.c:2426) ==8152== by 0x40774B: dump_bfd (objdump.c:3263) ==8152== by 0x407F3F: display_object_bfd (objdump.c:3330) ==8152== by 0x407F3F: display_any_bfd (objdump.c:3404) ==8152== by 0x40A002: display_file (objdump.c:3425) ==8152== by 0x4048F9: main (objdump.c:3707) ==8152== ==8152== Invalid write of size 8 ==8152== at 0x41873B: display_debug_frames (dwarf.c:5469) ==8152== by 0x40A2DC: dump_dwarf_section (objdump.c:2368) ==8152== by 0x44A23B: bfd_map_over_sections (section.c:1354) ==8152== by 0x405DF3: dump_dwarf (objdump.c:2426) ==8152== by 0x40774B: dump_bfd (objdump.c:3263) ==8152== by 0x407F3F: display_object_bfd (objdump.c:3330) ==8152== by 0x407F3F: display_any_bfd (objdump.c:3404) ==8152== by 0x40A002: display_file (objdump.c:3425) ==8152== by 0x4048F9: main (objdump.c:3707) ==8152== Address 0x7 is not stack'd, malloc'd or (recently) free'd ==8152== ==8152== ==8152== Process terminating with default action of signal 11 (SIGSEGV) ==8152== Access not within mapped region at address 0x7 ==8152== at 0x41873B: display_debug_frames (dwarf.c:5469) ==8152== by 0x40A2DC: dump_dwarf_section (objdump.c:2368) ==8152== by 0x44A23B: bfd_map_over_sections (section.c:1354) ==8152== by 0x405DF3: dump_dwarf (objdump.c:2426) ==8152== by 0x40774B: dump_bfd (objdump.c:3263) ==8152== by 0x407F3F: display_object_bfd (objdump.c:3330) ==8152== by 0x407F3F: display_any_bfd (objdump.c:3404) ==8152== by 0x40A002: display_file (objdump.c:3425) ==8152== by 0x4048F9: main (objdump.c:3707) ==8152== If you believe this happened as a result of a stack ==8152== overflow in your program's main thread (unlikely but ==8152== possible), you can try to increase the size of the ==8152== main thread stack using the --main-stacksize= flag. ==8152== The main thread stack size used in this run was 8388608. ==8152== ==8152== HEAP SUMMARY: ==8152== in use at exit: 39,029 bytes in 19 blocks ==8152== total heap usage: 33 allocs, 14 frees, 76,509 bytes allocated ==8152== ==8152== LEAK SUMMARY: ==8152== definitely lost: 0 bytes in 0 blocks ==8152== indirectly lost: 0 bytes in 0 blocks ==8152== possibly lost: 0 bytes in 0 blocks ==8152== still reachable: 39,029 bytes in 19 blocks ==8152== suppressed: 0 bytes in 0 blocks ==8152== Rerun with --leak-check=full to see details of leaked memory ==8152== ==8152== For counts of detected and suppressed errors, rerun with: -v ==8152== Use --track-origins=yes to see where uninitialised values come from ==8152== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 1 from 1)