==10319== Memcheck, a memory error detector ==10319== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==10319== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==10319== Command: binutils-gdb/binutils/objdump -afphxgGtTrRwW --special-syms samples/b371e70a ==10319== Parent PID: 10318 ==10319== ==10319== Invalid read of size 4 ==10319== at 0x57ABCC: elf64_aarch64_bfd_reloc_from_type (elfnn-aarch64.c:1434) ==10319== by 0x57BE75: elf64_aarch64_howto_from_type.part.5 (elfnn-aarch64.c:1504) ==10319== by 0x57BEB5: elf64_aarch64_howto_from_type (elfnn-aarch64.c:1501) ==10319== by 0x57BEB5: elf64_aarch64_info_to_howto (elfnn-aarch64.c:1521) ==10319== by 0x50ECDD: elf_slurp_reloc_table_from_section.isra.5 (elfcode.h:1460) ==10319== by 0x50EFD6: bfd_elf64_slurp_reloc_table (elfcode.h:1539) ==10319== by 0x51B515: _bfd_elf_canonicalize_reloc (elf.c:7180) ==10319== by 0x40E37C: dump_relocs_in_section (objdump.c:3153) ==10319== by 0x50019B: bfd_map_over_sections (section.c:1354) ==10319== by 0x40D59D: dump_relocs (objdump.c:3175) ==10319== by 0x40D59D: dump_bfd (objdump.c:3301) ==10319== by 0x40DF27: display_object_bfd (objdump.c:3364) ==10319== by 0x40DF27: display_any_bfd (objdump.c:3446) ==10319== by 0x40FEA2: display_file (objdump.c:3467) ==10319== by 0x40A849: main (objdump.c:3749) ==10319== Address 0x1870aac is not stack'd, malloc'd or (recently) free'd ==10319== ==10319== ==10319== Process terminating with default action of signal 11 (SIGSEGV) ==10319== Access not within mapped region at address 0x1870AAC ==10319== at 0x57ABCC: elf64_aarch64_bfd_reloc_from_type (elfnn-aarch64.c:1434) ==10319== by 0x57BE75: elf64_aarch64_howto_from_type.part.5 (elfnn-aarch64.c:1504) ==10319== by 0x57BEB5: elf64_aarch64_howto_from_type (elfnn-aarch64.c:1501) ==10319== by 0x57BEB5: elf64_aarch64_info_to_howto (elfnn-aarch64.c:1521) ==10319== by 0x50ECDD: elf_slurp_reloc_table_from_section.isra.5 (elfcode.h:1460) ==10319== by 0x50EFD6: bfd_elf64_slurp_reloc_table (elfcode.h:1539) ==10319== by 0x51B515: _bfd_elf_canonicalize_reloc (elf.c:7180) ==10319== by 0x40E37C: dump_relocs_in_section (objdump.c:3153) ==10319== by 0x50019B: bfd_map_over_sections (section.c:1354) ==10319== by 0x40D59D: dump_relocs (objdump.c:3175) ==10319== by 0x40D59D: dump_bfd (objdump.c:3301) ==10319== by 0x40DF27: display_object_bfd (objdump.c:3364) ==10319== by 0x40DF27: display_any_bfd (objdump.c:3446) ==10319== by 0x40FEA2: display_file (objdump.c:3467) ==10319== by 0x40A849: main (objdump.c:3749) ==10319== If you believe this happened as a result of a stack ==10319== overflow in your program's main thread (unlikely but ==10319== possible), you can try to increase the size of the ==10319== main thread stack using the --main-stacksize= flag. ==10319== The main thread stack size used in this run was 8388608. ==10319== ==10319== HEAP SUMMARY: ==10319== in use at exit: 17,419 bytes in 19 blocks ==10319== total heap usage: 51 allocs, 32 frees, 132,041 bytes allocated ==10319== ==10319== LEAK SUMMARY: ==10319== definitely lost: 0 bytes in 0 blocks ==10319== indirectly lost: 0 bytes in 0 blocks ==10319== possibly lost: 0 bytes in 0 blocks ==10319== still reachable: 17,419 bytes in 19 blocks ==10319== suppressed: 0 bytes in 0 blocks ==10319== Rerun with --leak-check=full to see details of leaked memory ==10319== ==10319== For counts of detected and suppressed errors, rerun with: -v ==10319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)