==8232== Memcheck, a memory error detector ==8232== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==8232== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==8232== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 002-10146-0.004 ==8232== Parent PID: 2719 ==8232== ==8232== Warning: set address range perms: large range [0x85fb040, 0x285fb060) (undefined) ==8232== Warning: set address range perms: large range [0x85fb028, 0x285fb078) (noaccess) ==8232== Invalid read of size 1 ==8232== at 0x434E60: byte_get_little_endian (elfcomm.c:149) ==8232== by 0x40BB0A: process_cu_tu_index (dwarf.c:6523) ==8232== by 0x40C5B3: load_cu_tu_indexes.part.12 (dwarf.c:6745) ==8232== by 0x413D9C: load_cu_tu_indexes (dwarf.c:2598) ==8232== by 0x413D9C: load_debug_info (dwarf.c:2605) ==8232== by 0x4146E0: display_debug_loc (dwarf.c:4441) ==8232== by 0x40A2DC: dump_dwarf_section (objdump.c:2368) ==8232== by 0x44A07B: bfd_map_over_sections (section.c:1354) ==8232== by 0x405DF3: dump_dwarf (objdump.c:2426) ==8232== by 0x40774B: dump_bfd (objdump.c:3263) ==8232== by 0x407F3F: display_object_bfd (objdump.c:3330) ==8232== by 0x407F3F: display_any_bfd (objdump.c:3404) ==8232== by 0x40A002: display_file (objdump.c:3425) ==8232== by 0x4048F9: main (objdump.c:3707) ==8232== Address 0x1 is not stack'd, malloc'd or (recently) free'd ==8232== ==8232== ==8232== Process terminating with default action of signal 11 (SIGSEGV) ==8232== Access not within mapped region at address 0x1 ==8232== at 0x434E60: byte_get_little_endian (elfcomm.c:149) ==8232== by 0x40BB0A: process_cu_tu_index (dwarf.c:6523) ==8232== by 0x40C5B3: load_cu_tu_indexes.part.12 (dwarf.c:6745) ==8232== by 0x413D9C: load_cu_tu_indexes (dwarf.c:2598) ==8232== by 0x413D9C: load_debug_info (dwarf.c:2605) ==8232== by 0x4146E0: display_debug_loc (dwarf.c:4441) ==8232== by 0x40A2DC: dump_dwarf_section (objdump.c:2368) ==8232== by 0x44A07B: bfd_map_over_sections (section.c:1354) ==8232== by 0x405DF3: dump_dwarf (objdump.c:2426) ==8232== by 0x40774B: dump_bfd (objdump.c:3263) ==8232== by 0x407F3F: display_object_bfd (objdump.c:3330) ==8232== by 0x407F3F: display_any_bfd (objdump.c:3404) ==8232== by 0x40A002: display_file (objdump.c:3425) ==8232== by 0x4048F9: main (objdump.c:3707) ==8232== If you believe this happened as a result of a stack ==8232== overflow in your program's main thread (unlikely but ==8232== possible), you can try to increase the size of the ==8232== main thread stack using the --main-stacksize= flag. ==8232== The main thread stack size used in this run was 8388608. ==8232== ==8232== HEAP SUMMARY: ==8232== in use at exit: 142,111 bytes in 26 blocks ==8232== total heap usage: 61 allocs, 35 frees, 831,056,497 bytes allocated ==8232== ==8232== LEAK SUMMARY: ==8232== definitely lost: 0 bytes in 0 blocks ==8232== indirectly lost: 0 bytes in 0 blocks ==8232== possibly lost: 0 bytes in 0 blocks ==8232== still reachable: 142,111 bytes in 26 blocks ==8232== suppressed: 0 bytes in 0 blocks ==8232== Rerun with --leak-check=full to see details of leaked memory ==8232== ==8232== For counts of detected and suppressed errors, rerun with: -v ==8232== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 1 from 1)