================================================================= ==6718==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000002b6c318 at pc 0x0000013a9631 bp 0x7fffffffde70 sp 0x7fffffffde68 READ of size 4 at 0x000002b6c318 thread T0 #0 0x13a9630 in sh_elf_set_mach_from_flags /home/neat/testing-elf/binutils-gdb/bfd/elf32-sh.c:6350:7 #1 0x13a9630 in sh_elf_object_p /home/neat/testing-elf/binutils-gdb/bfd/elf32-sh.c:6514 #2 0xabd7ef in bfd_elf32_object_p /home/neat/testing-elf/binutils-gdb/bfd/./elfcode.h:817:13 #3 0x947351 in bfd_check_format_matches /home/neat/testing-elf/binutils-gdb/bfd/format.c:311:14 #4 0x516289 in display_object_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3602:7 #5 0x516289 in display_any_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3693 #6 0x5158dc in display_file /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3714:3 #7 0x5158dc in main /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:4016 #8 0x7ffff6f12b44 in __libc_start_main /build/glibc-KShDyh/glibc-2.19/csu/libc-start.c:287 #9 0x41d5fb in _start (/home/neat/testing-elf/binutils-gdb/binutils/objdump+0x41d5fb) 0x000002b6c318 is located 40 bytes to the left of global variable '' defined in 'elf32-sh.c:6374:3' (0x2b6c340) of size 11 '' is ascii string 'elf32-sh.c' 0x000002b6c318 is located 20 bytes to the right of global variable 'sh_ef_bfd_table' defined in 'elf32-sh.c:6340:21' (0x2b6c2a0) of size 100 SUMMARY: AddressSanitizer: global-buffer-overflow /home/neat/testing-elf/binutils-gdb/bfd/elf32-sh.c:6350:7 in sh_elf_set_mach_from_flags Shadow bytes around the buggy address: 0x000080565810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080565820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080565830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080565840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080565850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x000080565860: 04 f9 f9[f9]f9 f9 f9 f9 00 03 f9 f9 f9 f9 f9 f9 0x000080565870: 00 01 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x000080565880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080565890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805658a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805658b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==6718==ABORTING