/home/neat/testing-elf/binutils-gdb/binutils/objdump: Reading section failed because: File truncated ================================================================= ==5030==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000002910ee4 at pc 0x000000909b70 bp 0x7fffffffd510 sp 0x7fffffffd508 READ of size 4 at 0x000002910ee4 thread T0 #0 0x909b6f in rx_disp /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc #1 0x909b6f in rx_decode_opcode /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc:288 #2 0x813ec8 in print_insn_rx /home/neat/testing-elf/binutils-gdb/opcodes/rx-dis.c:123:8 #3 0x523117 in disassemble_bytes /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:1864:17 #4 0x523117 in disassemble_section /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:2309 #5 0x955da7 in bfd_map_over_sections /home/neat/testing-elf/binutils-gdb/bfd/section.c:1395:5 #6 0x518d74 in disassemble_data /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:2445:3 #7 0x518d74 in dump_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3547 #8 0x5162b1 in display_any_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c #9 0x5158dc in display_file /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3714:3 #10 0x5158dc in main /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:4016 #11 0x7ffff6f12b44 in __libc_start_main /build/glibc-KShDyh/glibc-2.19/csu/libc-start.c:287 #12 0x41d5fb in _start (/home/neat/testing-elf/binutils-gdb/binutils/objdump+0x41d5fb) 0x000002910ee4 is located 0 bytes to the right of global variable 'PSCALE' defined in 'rx-decode.opc:89:12' (0x2910ec0) of size 36 SUMMARY: AddressSanitizer: global-buffer-overflow /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc in rx_disp Shadow bytes around the buggy address: 0x00008051a180: 00 00 03 f9 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 0x00008051a190: 00 00 04 f9 f9 f9 f9 f9 00 07 f9 f9 f9 f9 f9 f9 0x00008051a1a0: 00 07 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 0x00008051a1b0: 00 07 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 0x00008051a1c0: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 =>0x00008051a1d0: 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00[04]f9 f9 f9 0x00008051a1e0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x00008051a1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008051a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008051a210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008051a220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5030==ABORTING