==25690== Memcheck, a memory error detector ==25690== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==25690== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==25690== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms 084-58274-0.004 ==25690== Parent PID: 19518 ==25690== ==25690== Invalid write of size 4 ==25690== at 0x444C0C: _bfd_coff_read_string_table (coffgen.c:1718) ==25690== by 0x445577: _bfd_coff_internal_syment_name (coffgen.c:462) ==25690== by 0x4A509D: _bfd_pei_swap_sym_in (peigen.c:150) ==25690== by 0x4A1857: handle_COMDAT (coffcode.h:932) ==25690== by 0x4A1857: styp_to_sec_flags (coffcode.h:1288) ==25690== by 0x444F44: make_a_section_from_file (coffgen.c:129) ==25690== by 0x444F44: coff_real_object_p (coffgen.c:293) ==25690== by 0x4A210E: pe_bfd_object_p (peicode.h:1349) ==25690== by 0x446FA6: bfd_check_format_matches (format.c:305) ==25690== by 0x407F01: display_object_bfd (objdump.c:3328) ==25690== by 0x407F01: display_any_bfd (objdump.c:3404) ==25690== by 0x40A002: display_file (objdump.c:3425) ==25690== by 0x4048F9: main (objdump.c:3707) ==25690== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==25690== ==25690== ==25690== Process terminating with default action of signal 11 (SIGSEGV) ==25690== Access not within mapped region at address 0x0 ==25690== at 0x444C0C: _bfd_coff_read_string_table (coffgen.c:1718) ==25690== by 0x445577: _bfd_coff_internal_syment_name (coffgen.c:462) ==25690== by 0x4A509D: _bfd_pei_swap_sym_in (peigen.c:150) ==25690== by 0x4A1857: handle_COMDAT (coffcode.h:932) ==25690== by 0x4A1857: styp_to_sec_flags (coffcode.h:1288) ==25690== by 0x444F44: make_a_section_from_file (coffgen.c:129) ==25690== by 0x444F44: coff_real_object_p (coffgen.c:293) ==25690== by 0x4A210E: pe_bfd_object_p (peicode.h:1349) ==25690== by 0x446FA6: bfd_check_format_matches (format.c:305) ==25690== by 0x407F01: display_object_bfd (objdump.c:3328) ==25690== by 0x407F01: display_any_bfd (objdump.c:3404) ==25690== by 0x40A002: display_file (objdump.c:3425) ==25690== by 0x4048F9: main (objdump.c:3707) ==25690== If you believe this happened as a result of a stack ==25690== overflow in your program's main thread (unlikely but ==25690== possible), you can try to increase the size of the ==25690== main thread stack using the --main-stacksize= flag. ==25690== The main thread stack size used in this run was 8388608. ==25690== ==25690== HEAP SUMMARY: ==25690== in use at exit: 14,560 bytes in 10 blocks ==25690== total heap usage: 13 allocs, 3 frees, 14,626 bytes allocated ==25690== ==25690== LEAK SUMMARY: ==25690== definitely lost: 0 bytes in 0 blocks ==25690== indirectly lost: 0 bytes in 0 blocks ==25690== possibly lost: 0 bytes in 0 blocks ==25690== still reachable: 14,560 bytes in 10 blocks ==25690== suppressed: 0 bytes in 0 blocks ==25690== Rerun with --leak-check=full to see details of leaked memory ==25690== ==25690== For counts of detected and suppressed errors, rerun with: -v ==25690== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 1 from 1)