upx/src/stub/tmp/amd64-linux.elf-fold.map
John Reiser 3403b87cb7 More Control Flow Integrity (Intel)
More ENDBRxx for CALL *%RDX for 'getbit'.
amd64: LEA xxx(%rip),%reg and STRCON section,
    instead of CALL; .asciz "..."; POP %reg
(Not for PE due to WINDOWS_BACK binary compatibility.)
i386 string constants still use call-.asciz-pop because no (%rip)
	modified:   ../misc/testsuite/upx_testsuite_1-expected_sha256sums.sh
	modified:   p_lx_elf.cpp
	modified:   stub/src/amd64-linux.elf-entry.S
	modified:   stub/src/amd64-linux.elf-main2.c
	modified:   stub/src/amd64-linux.elf-so_entry.S
	modified:   stub/src/amd64-linux.shlib-init.S
	modified:   stub/src/amd64-win64.pe.S
	modified:   stub/src/i386-linux.elf-entry.S
	modified:   stub/src/i386-linux.elf-so_entry.S
	modified:   stub/src/upxfd_android.c
           plus generated *.h *.map *.dump
2024-09-20 14:48:30 -07:00

85 lines
3.6 KiB
Plaintext
Vendored
Generated

Memory Configuration
Name Origin Length Attributes
*default* 0x0000000000000000 0xffffffffffffffff
Linker script and memory map
0x000000000010004c . = ((0x100000 + SIZEOF_HEADERS) + 0xc)
.text 0x0000000000000000 0x9a2
.text 0x0000000000000000 0x164 tmp/amd64-linux.elf-fold.o
0x000000000000015c get_page_mask
.text 0x0000000000000164 0x0 tmp/amd64-expand.o
.text 0x0000000000000164 0x83e tmp/amd64-linux.elf-main2.o
0x00000000000002b9 underlay
0x000000000000086d upx_main
.data 0x0000000000000000 0x0
.data 0x0000000000000000 0x0 tmp/amd64-linux.elf-fold.o
.data 0x0000000000000000 0x0 tmp/amd64-expand.o
.data 0x0000000000000000 0x0 tmp/amd64-linux.elf-main2.o
.bss 0x0000000000000000 0x0
.bss 0x0000000000000000 0x0 tmp/amd64-linux.elf-fold.o
.bss 0x0000000000000000 0x0 tmp/amd64-expand.o
.bss 0x0000000000000000 0x0 tmp/amd64-linux.elf-main2.o
LOAD tmp/amd64-linux.elf-fold.o
LOAD tmp/amd64-expand.o
LOAD tmp/amd64-linux.elf-main2.o
OUTPUT(tmp/amd64-linux.elf-fold.bin elf64-x86-64)
SYSCALLS 0x0000000000000000 0xbf
SYSCALLS 0x0000000000000000 0xbf tmp/amd64-linux.elf-fold.o
0x000000000000004a Pmap
0x000000000000009b munmap
0x00000000000000ab ftruncate
0x000000000000005b mmap
0x00000000000000b7 write
0x00000000000000bb read
0x0000000000000011 upxfd_create
0x0000000000000000 my_bkpt
0x0000000000000076 Pprotect
0x00000000000000b7 Pwrite
0x000000000000008b Punmap
0x000000000000009f exit
0x00000000000000a3 brk
0x00000000000000af open
0x00000000000000b3 mprotect
0x00000000000000a7 close
EXP_HEAD 0x0000000000000000 0xe9
EXP_HEAD 0x0000000000000000 0xe9 tmp/amd64-expand.o
0x0000000000000000 f_expand
NRV2E 0x0000000000000000 0xe8
NRV2E 0x0000000000000000 0xe8 tmp/amd64-expand.o
NRV2D 0x0000000000000000 0xdb
NRV2D 0x0000000000000000 0xdb tmp/amd64-expand.o
NRV2B 0x0000000000000000 0xc4
NRV2B 0x0000000000000000 0xc4 tmp/amd64-expand.o
LZMA_DAISY 0x0000000000000000 0xa
LZMA_DAISY 0x0000000000000000 0xa tmp/amd64-expand.o
LZMA_ELF00 0x0000000000000000 0x65
LZMA_ELF00 0x0000000000000000 0x65 tmp/amd64-expand.o
LZMA_DEC10 0x0000000000000000 0x9f7
LZMA_DEC10 0x0000000000000000 0x9f7 tmp/amd64-expand.o
LZMA_DEC20 0x0000000000000000 0x9f7
LZMA_DEC20 0x0000000000000000 0x9f7 tmp/amd64-expand.o
LZMA_DEC30 0x0000000000000000 0x19
LZMA_DEC30 0x0000000000000000 0x19 tmp/amd64-expand.o
EXP_TAIL 0x0000000000000000 0x14
EXP_TAIL 0x0000000000000000 0x14 tmp/amd64-expand.o
STRCON 0x0000000000000000 0x8
STRCON 0x0000000000000000 0x8 tmp/amd64-linux.elf-main2.o