upx/src/stub/tmp/arm64-linux.elf-fold.map
John Reiser 52400e2561 /proc/self/exe now is optional
... for the benefit of 'unshare', 'chroot', etc.
If not present, then upx run-time stub unmaps all pages of original main program.
https://github.com/upx/upx/issues/721

	modified:   stub/src/amd64-linux.elf-entry.S
	modified:   stub/src/amd64-linux.elf-fold.S
	modified:   stub/src/arm.v4a-linux.elf-entry.S
	modified:   stub/src/arm.v4a-linux.elf-fold.S
	modified:   stub/src/arm64-linux.elf-entry.S
	modified:   stub/src/arm64-linux.elf-fold.S
	modified:   stub/src/i386-linux.elf-fold.S
	modified:   stub/src/mipsel.r3000-linux.elf-fold.S
	modified:   stub/src/powerpc-linux.elf-fold.S
	modified:   stub/src/powerpc64le-linux.elf-fold.S
	modified:   ../misc/testsuite/upx_testsuite_1-expected_sha256sums.sh

           ... plus all associaed *.h, *.map, *.dump in stub/
2023-10-30 08:23:52 -07:00

53 lines
2.2 KiB
Plaintext
Vendored
Generated

Memory Configuration
Name Origin Length Attributes
*default* 0x0000000000000000 0xffffffffffffffff
Linker script and memory map
0x00000000001000bc . = ((0x100000 + SIZEOF_HEADERS) + 0xc)
.text 0x00000000001000bc 0xa58
*(.text)
.text 0x00000000001000bc 0x29c tmp/arm64-linux.elf-fold.o
0x0000000000100274 my_bkpt
0x000000000010027c exit
0x0000000000100284 read
0x0000000000100290 write
0x000000000010029c close
0x00000000001002a8 getpid
0x00000000001002b4 brk
0x00000000001002c0 munmap
0x00000000001002cc Pprotect
0x00000000001002cc mprotect
0x00000000001002e4 mmap_privanon
0x00000000001002f4 mmap
0x000000000010030c unlink
0x0000000000100320 readlink
0x0000000000100328 open
0x0000000000100344 __clear_cache
.text 0x0000000000100358 0x7bc tmp/arm64-linux.elf-main.o
0x00000000001009ac upx_main
*(.data)
.data 0x0000000000100b14 0x0 tmp/arm64-linux.elf-fold.o
.data 0x0000000000100b14 0x0 tmp/arm64-linux.elf-main.o
.iplt 0x0000000000100b14 0x0
.iplt 0x0000000000100b14 0x0 tmp/arm64-linux.elf-fold.o
.rela.dyn 0x0000000000100b18 0x0
.rela.iplt 0x0000000000100b18 0x0 tmp/arm64-linux.elf-fold.o
.data
LOAD tmp/arm64-linux.elf-fold.o
LOAD tmp/arm64-linux.elf-main.o
OUTPUT(tmp/arm64-linux.elf-fold.bin elf64-littleaarch64)
.igot.plt 0x0000000000100b18 0x0
.igot.plt 0x0000000000100b18 0x0 tmp/arm64-linux.elf-fold.o
.bss 0x0000000000100b14 0x0
.bss 0x0000000000100b14 0x0 tmp/arm64-linux.elf-fold.o
.bss 0x0000000000100b14 0x0 tmp/arm64-linux.elf-main.o