aboutsummaryrefslogtreecommitdiff
path: root/elf_sections.txt
blob: b46a55f52de2a18d3bff787bde304dd230ae32e3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
There are 26 section headers, starting at offset 0x133308:

Section Headers:
  [Nr] Name              Type            Address          Off    Size   ES Flg Lk Inf Al
  [ 0]                   NULL            0000000000000000 000000 000000 00      0   0  0
  [ 1] .boot_rodata      PROGBITS        0000000000100000 001000 0000f7 00   A  0   0  8
  [ 2] .boot_text        PROGBITS        0000000000101000 002000 0001ae 00  AX  0   0 16
  [ 3] .boot_bss         NOBITS          0000000000102000 0021ae 104000 00  WA  0   0 4096
  [ 4] .boot_data        PROGBITS        0000000000206000 003000 000004 00  WA  0   0  1
  [ 5] .init             PROGBITS        0000000000207000 004000 000010 00  AX  0   0  1
  [ 6] .fini             PROGBITS        0000000000208000 005000 00000b 00  AX  0   0  1
  [ 7] .text             PROGBITS        0000000000209000 006000 00ced0 00  AX  0   0 32
  [ 8] .user_text        PROGBITS        0000000000216000 013000 00016c 00  AX  0   0  1
  [ 9] .rodata           PROGBITS        0000000000217000 014000 000bc3 00   A  0   0 16
  [10] .ctors            PROGBITS        0000000000218000 015000 000010 00  WA  0   0  8
  [11] .dtors            PROGBITS        0000000000219000 016000 000010 00  WA  0   0  8
  [12] .bss              NOBITS          000000000021a000 016010 0004a0 00  WA  0   0 32
  [13] .data             PROGBITS        000000000021b000 018000 000010 00  WA  0   0  8
  [14] .debug_line       PROGBITS        0000000000000000 018010 00e784 00      0   0  1
  [15] .debug_line_str   PROGBITS        0000000000000000 026794 00256f 01  MS  0   0  1
  [16] .debug_info       PROGBITS        0000000000000000 028d03 063564 00      0   0  1
  [17] .debug_abbrev     PROGBITS        0000000000000000 08c267 00f2ae 00      0   0  1
  [18] .debug_aranges    PROGBITS        0000000000000000 09b520 0031b0 00      0   0 16
  [19] .debug_str        PROGBITS        0000000000000000 09e6d0 0441b3 01  MS  0   0  1
  [20] .debug_rnglists   PROGBITS        0000000000000000 0e2883 001f06 00      0   0  1
  [21] .debug_macro      PROGBITS        0000000000000000 0e4789 03471b 00      0   0  1
  [22] .debug_loclists   PROGBITS        0000000000000000 118ea4 00030f 00      0   0  1
  [23] .symtab           SYMTAB          0000000000000000 1191b8 005448 18     24 816  8
  [24] .strtab           STRTAB          0000000000000000 11e600 014c03 00      0   0  1
  [25] .shstrtab         STRTAB          0000000000000000 133203 000103 00      0   0  1
Key to Flags:
  W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
  L (link order), O (extra OS processing required), G (group), T (TLS),
  C (compressed), x (unknown), o (OS specific), E (exclude),
  D (mbind), l (large), p (processor specific)

Elf file type is EXEC (Executable file)
Entry point 0x101061
There are 6 program headers, starting at offset 64

Program Headers:
  Type           Offset   VirtAddr           PhysAddr           FileSiz  MemSiz   Flg Align
  LOAD           0x001000 0x0000000000100000 0x0000000000100000 0x0000f7 0x0000f7 R   0x1000
  LOAD           0x002000 0x0000000000101000 0x0000000000101000 0x0001ae 0x105000 R E 0x1000
  LOAD           0x003000 0x0000000000206000 0x0000000000206000 0x000004 0x000004 RW  0x1000
  LOAD           0x004000 0x0000000000207000 0x0000000000207000 0x00f16c 0x00f16c R E 0x1000
  LOAD           0x015000 0x0000000000218000 0x0000000000218000 0x003010 0x003010 RW  0x1000
  LOAD           0x014000 0x0000000000217000 0x0000000000217000 0x000bc3 0x000bc3 R   0x1000

 Section to Segment mapping:
  Segment Sections...
   00     .boot_rodata 
   01     .boot_text .boot_bss 
   02     .boot_data 
   03     .init .fini .text .user_text 
   04     .ctors .dtors .bss .data 
   05     .rodata