==22963== Memcheck, a memory error detector ==22963== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==22963== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==22963== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms samples/02ff5ada ==22963== Parent PID: 22957 ==22963== ==22963== Warning: set address range perms: large range [0x59fd040, 0x159fd060) (undefined) ==22963== Warning: set address range perms: large range [0x59fd028, 0x159fd078) (noaccess) ==22963== Invalid read of size 1 ==22963== at 0x4359FD: byte_get_little_endian (elfcomm.c:151) ==22963== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==22963== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== Address 0x59b600f is 0 bytes after a block of size 8,383 alloc'd ==22963== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==22963== by 0x448952: bfd_malloc (libbfd.c:184) ==22963== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==22963== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==22963== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== ==22963== Invalid read of size 1 ==22963== at 0x4359E0: byte_get_little_endian (elfcomm.c:149) ==22963== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==22963== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== Address 0x59b6011 is 2 bytes after a block of size 8,383 alloc'd ==22963== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==22963== by 0x448952: bfd_malloc (libbfd.c:184) ==22963== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==22963== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==22963== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== ==22963== Invalid read of size 1 ==22963== at 0x4359EC: byte_get_little_endian (elfcomm.c:150) ==22963== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==22963== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== Address 0x59b6012 is 3 bytes after a block of size 8,383 alloc'd ==22963== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==22963== by 0x448952: bfd_malloc (libbfd.c:184) ==22963== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==22963== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==22963== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== ==22963== Invalid read of size 1 ==22963== at 0x4359F7: byte_get_little_endian (elfcomm.c:148) ==22963== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==22963== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== Address 0x59b6010 is 1 bytes after a block of size 8,383 alloc'd ==22963== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==22963== by 0x448952: bfd_malloc (libbfd.c:184) ==22963== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==22963== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==22963== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== ==22963== ==22963== Process terminating with default action of signal 11 (SIGSEGV) ==22963== Access not within mapped region at address 0x59FD001 ==22963== at 0x4359E0: byte_get_little_endian (elfcomm.c:149) ==22963== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==22963== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==22963== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==22963== by 0x406881: dump_dwarf (objdump.c:2459) ==22963== by 0x40797C: dump_bfd (objdump.c:3296) ==22963== by 0x408147: display_object_bfd (objdump.c:3363) ==22963== by 0x408147: display_any_bfd (objdump.c:3445) ==22963== by 0x40A0C2: display_file (objdump.c:3466) ==22963== by 0x404AB9: main (objdump.c:3748) ==22963== If you believe this happened as a result of a stack ==22963== overflow in your program's main thread (unlikely but ==22963== possible), you can try to increase the size of the ==22963== main thread stack using the --main-stacksize= flag. ==22963== The main thread stack size used in this run was 8388608. ==22963== ==22963== HEAP SUMMARY: ==22963== in use at exit: 58,670 bytes in 42 blocks ==22963== total heap usage: 236 allocs, 194 frees, 372,985,870 bytes allocated ==22963== ==22963== LEAK SUMMARY: ==22963== definitely lost: 0 bytes in 0 blocks ==22963== indirectly lost: 0 bytes in 0 blocks ==22963== possibly lost: 0 bytes in 0 blocks ==22963== still reachable: 58,670 bytes in 42 blocks ==22963== suppressed: 0 bytes in 0 blocks ==22963== Rerun with --leak-check=full to see details of leaked memory ==22963== ==22963== For counts of detected and suppressed errors, rerun with: -v ==22963== ERROR SUMMARY: 290802 errors from 4 contexts (suppressed: 0 from 0)