upx/src/stub/tmp/i386-linux.elf-fold.map
John Reiser 70f1ab8cb7 Nice message for ancient Linux lacking memfd_create
... or O_TMPFILE for recovery using /dev/shm
https://github.com/upx/upx/issues/889
	modified:   stub/src/upxfd_linux.c
	modified:   ../misc/testsuite/upx_testsuite_1-expected_sha256sums.sh
           plus generated  .h  .map  .dump
2025-03-02 11:46:17 -08:00

104 lines
4.4 KiB
Plaintext
Vendored
Generated

Memory Configuration
Name Origin Length Attributes
*default* 0x0000000000000000 0xffffffffffffffff
Linker script and memory map
.text 0x0000000000000000 0x9b6
.text 0x0000000000000000 0x191 tmp/i386-linux.elf-fold.o
0x0000000000000008 get_page_mask
0x0000000000000015 get_upxfn_path
*fill* 0x0000000000000191 0x3 00
.text 0x0000000000000194 0x0 tmp/i386-linux.elf-help_umf.o
.text 0x0000000000000194 0x0 tmp/i386-expand.o
.text 0x0000000000000194 0x822 tmp/i386-linux.elf-main2.o
0x00000000000002ec underlay
0x0000000000000862 upx_main
HUMF_A 0x0000000000000000 0x5
HUMF_A 0x0000000000000000 0x5 tmp/i386-linux.elf-help_umf.o
HUMF_L 0x0000000000000000 0x5
HUMF_L 0x0000000000000000 0x5 tmp/i386-linux.elf-help_umf.o
UMF_ANDROID 0x0000000000000000 0x4bf
UMF_ANDROID 0x0000000000000000 0x4bf tmp/i386-linux.elf-upxfd_android.o
0x0000000000000000 upx_mmap_and_fd_android
UMF_LINUX 0x0000000000000000 0x11f
UMF_LINUX 0x0000000000000000 0x11f tmp/i386-linux.elf-upxfd_linux.o
0x0000000000000000 upx_mmap_and_fd_linux
.data 0x0000000000000000 0x0
.data 0x0000000000000000 0x0 tmp/i386-linux.elf-fold.o
.data 0x0000000000000000 0x0 tmp/i386-linux.elf-help_umf.o
.data 0x0000000000000000 0x0 tmp/i386-expand.o
.data 0x0000000000000000 0x0 tmp/i386-linux.elf-main2.o
.bss 0x0000000000000000 0x0
.bss 0x0000000000000000 0x0 tmp/i386-linux.elf-fold.o
.bss 0x0000000000000000 0x0 tmp/i386-linux.elf-help_umf.o
.bss 0x0000000000000000 0x0 tmp/i386-expand.o
.bss 0x0000000000000000 0x0 tmp/i386-linux.elf-main2.o
TARGET(elf32-i386)
0x0000000000000034 . = SIZEOF_HEADERS
LOAD tmp/i386-linux.elf-fold.o
LOAD tmp/i386-linux.elf-help_umf.o
LOAD tmp/i386-linux.elf-upxfd_android.o
LOAD tmp/i386-linux.elf-upxfd_linux.o
LOAD tmp/i386-expand.o
LOAD tmp/i386-linux.elf-main2.o
OUTPUT(tmp/i386-linux.elf-fold.bin elf32-i386)
SYSCALLS 0x0000000000000000 0x100
SYSCALLS 0x0000000000000000 0x100 tmp/i386-linux.elf-fold.o
0x00000000000000d2 memcpy
0x000000000000002b Psync
0x00000000000000e8 mempcpy
0x0000000000000056 mmap
0x0000000000000099 uname
0x00000000000000be memset
0x00000000000000fe my_bkpt
0x0000000000000000 Pprotect
0x0000000000000085 stat
0x00000000000000aa mkdir
EXP_HEAD 0x0000000000000000 0x10b
EXP_HEAD 0x0000000000000000 0x10b tmp/i386-expand.o
0x0000000000000067 f_expand
0x0000000000000097 __clear_cache
EXP_TAIL 0x0000000000000000 0x10
EXP_TAIL 0x0000000000000000 0x10 tmp/i386-expand.o
0x0000000000000010 upx_mmap_and_fd
NRV2E 0x0000000000000000 0xd4
NRV2E 0x0000000000000000 0xd4 tmp/i386-expand.o
NRV2D 0x0000000000000000 0xc8
NRV2D 0x0000000000000000 0xc8 tmp/i386-expand.o
NRV2B 0x0000000000000000 0xb4
NRV2B 0x0000000000000000 0xb4 tmp/i386-expand.o
LZMA_DAISY 0x0000000000000000 0xc
LZMA_DAISY 0x0000000000000000 0xc tmp/i386-expand.o
LZMA_DEC00 0x0000000000000000 0x36
LZMA_DEC00 0x0000000000000000 0x36 tmp/i386-expand.o
LZMA_ELF00 0x0000000000000000 0x48
LZMA_ELF00 0x0000000000000000 0x48 tmp/i386-expand.o
LZMA_DEC10 0x0000000000000000 0xb3e
LZMA_DEC10 0x0000000000000000 0xb3e tmp/i386-expand.o
LZMA_DEC20 0x0000000000000000 0xb3e
LZMA_DEC20 0x0000000000000000 0xb3e tmp/i386-expand.o
LZMA_DEC30 0x0000000000000000 0x20
LZMA_DEC30 0x0000000000000000 0x20 tmp/i386-expand.o