==23266== Memcheck, a memory error detector ==23266== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==23266== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==23266== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms samples/04cec030 ==23266== Parent PID: 22957 ==23266== ==23266== Invalid read of size 1 ==23266== at 0x4359FD: byte_get_little_endian (elfcomm.c:151) ==23266== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==23266== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== Address 0x5919c1f is 0 bytes after a block of size 8,383 alloc'd ==23266== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==23266== by 0x448952: bfd_malloc (libbfd.c:184) ==23266== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==23266== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==23266== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== ==23266== Invalid read of size 1 ==23266== at 0x4359E0: byte_get_little_endian (elfcomm.c:149) ==23266== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==23266== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== Address 0x5919c21 is 2 bytes after a block of size 8,383 alloc'd ==23266== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==23266== by 0x448952: bfd_malloc (libbfd.c:184) ==23266== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==23266== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==23266== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== ==23266== Invalid read of size 1 ==23266== at 0x4359EC: byte_get_little_endian (elfcomm.c:150) ==23266== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==23266== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== Address 0x5919c22 is 3 bytes after a block of size 8,383 alloc'd ==23266== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==23266== by 0x448952: bfd_malloc (libbfd.c:184) ==23266== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==23266== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==23266== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== ==23266== Invalid read of size 1 ==23266== at 0x4359F7: byte_get_little_endian (elfcomm.c:148) ==23266== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==23266== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== Address 0x5919c20 is 1 bytes after a block of size 8,383 alloc'd ==23266== at 0x4C28C20: malloc (vg_replace_malloc.c:296) ==23266== by 0x448952: bfd_malloc (libbfd.c:184) ==23266== by 0x459677: bfd_get_full_section_contents (compress.c:186) ==23266== by 0x40A215: load_specific_debug_section (objdump.c:2284) ==23266== by 0x40A404: dump_dwarf_section (objdump.c:2398) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== ==23266== ==23266== Process terminating with default action of signal 11 (SIGSEGV) ==23266== Access not within mapped region at address 0x59FD001 ==23266== at 0x4359E0: byte_get_little_endian (elfcomm.c:149) ==23266== by 0x40AFF6: display_gdb_index (dwarf.c:6620) ==23266== by 0x40A426: dump_dwarf_section (objdump.c:2401) ==23266== by 0x44B0AB: bfd_map_over_sections (section.c:1354) ==23266== by 0x406881: dump_dwarf (objdump.c:2459) ==23266== by 0x40797C: dump_bfd (objdump.c:3296) ==23266== by 0x408147: display_object_bfd (objdump.c:3363) ==23266== by 0x408147: display_any_bfd (objdump.c:3445) ==23266== by 0x40A0C2: display_file (objdump.c:3466) ==23266== by 0x404AB9: main (objdump.c:3748) ==23266== If you believe this happened as a result of a stack ==23266== overflow in your program's main thread (unlikely but ==23266== possible), you can try to increase the size of the ==23266== main thread stack using the --main-stacksize= flag. ==23266== The main thread stack size used in this run was 8388608. ==23266== ==23266== HEAP SUMMARY: ==23266== in use at exit: 65,142 bytes in 129 blocks ==23266== total heap usage: 325 allocs, 196 frees, 34,712,066 bytes allocated ==23266== ==23266== LEAK SUMMARY: ==23266== definitely lost: 0 bytes in 0 blocks ==23266== indirectly lost: 0 bytes in 0 blocks ==23266== possibly lost: 0 bytes in 0 blocks ==23266== still reachable: 65,142 bytes in 129 blocks ==23266== suppressed: 0 bytes in 0 blocks ==23266== Rerun with --leak-check=full to see details of leaked memory ==23266== ==23266== For counts of detected and suppressed errors, rerun with: -v ==23266== ERROR SUMMARY: 930786 errors from 4 contexts (suppressed: 0 from 0)