Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- There are 11 section headers, starting at offset 0x10d38:
- Section Headers:
- [Nr] Name Type Address Offset
- Size EntSize Flags Link Info Align
- [ 0] NULL 0000000000000000 00000000
- 0000000000000000 0000000000000000 0 0 0
- [ 1] .text PROGBITS ffffffff80080000 00001000
- 000000000000be48 0000000000000000 AX 0 0 16
- [ 2] .rodata PROGBITS ffffffff8008c000 0000d000
- 0000000000000360 0000000000000000 A 0 0 8
- [ 3] .data PROGBITS ffffffff8008d000 0000e000
- 00000000000001d0 0000000000000000 WA 0 0 16
- [ 4] drivers PROGBITS ffffffff8008d1d0 0000e1d0
- 0000000000000060 0000000000000000 WA 0 0 8
- [ 5] modules PROGBITS ffffffff8008d230 0000e230
- 0000000000000080 0000000000000000 WA 0 0 8
- [ 6] .bss NOBITS ffffffff8008d2b0 0000e2b0
- 0000000000001818 0000000000000000 WA 0 0 16
- [ 7] .comment PROGBITS 0000000000000000 0000e2b0
- 0000000000000012 0000000000000001 MS 0 0 1
- [ 8] .symtab SYMTAB 0000000000000000 0000e2c8
- 0000000000001d58 0000000000000018 9 121 8
- [ 9] .strtab STRTAB 0000000000000000 00010020
- 0000000000000cc5 0000000000000000 0 0 1
- [10] .shstrtab STRTAB 0000000000000000 00010ce5
- 000000000000004d 0000000000000000 0 0 1
- Key to Flags:
- W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
- L (link order), O (extra OS processing required), G (group), T (TLS),
- C (compressed), x (unknown), o (OS specific), E (exclude),
- p (processor specific)
- Elf file type is EXEC (Executable file)
- Entry point 0xffffffff80080000
- There are 7 program headers, starting at offset 64
- Program Headers:
- Type Offset VirtAddr PhysAddr
- FileSiz MemSiz Flags Align
- LOAD 0x0000000000001000 0xffffffff80080000 0x0000000000080000
- 0x000000000000be48 0x000000000000be48 R E 0x1000
- LOAD 0x000000000000d000 0xffffffff8008c000 0x000000000008c000
- 0x0000000000000360 0x0000000000000360 R 0x1000
- LOAD 0x00000000000001c8 0x0000000000000000 0x0000000000000000
- 0x0000000000000000 0x0000000000000000 R 0x1000
- LOAD 0x000000000000e000 0xffffffff8008d000 0x000000000008d000
- 0x00000000000002b0 0x0000000000001ac8 RW 0x1000
- LOAD 0x00000000000001c8 0x0000000000000000 0x0000000000000000
- 0x0000000000000000 0x0000000000000000 RW 0x1000
- LOAD 0x00000000000001c8 0x0000000000000000 0x0000000000000000
- 0x0000000000000000 0x0000000000000000 RWE 0x1000
- NOTE 0x0000000000000000 0x0000000000000000 0x0000000000000000
- 0x0000000000000000 0x0000000000000000 0x8
- Section to Segment mapping:
- Segment Sections...
- 00 .text
- 01 .rodata
- 02
- 03 .data drivers modules .bss
- 04
- 05
- 06
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement