Mail Archives: djgpp/2002/06/07/00:15:30
From: | NoEmailAds AT execpc DOT com (Chris Giese)
|
Newsgroups: | comp.os.msdos.djgpp
|
Subject: | COFF section flags
|
Date: | Fri, 07 Jun 2002 03:32:04 GMT
|
Organization: | PROPULSION GROUP
|
X-Newsreader: | Forte Free Agent 1.11/32.235
|
Lines: | 17
|
Message-ID: | <3d00299c$0$3573$272ea4a1@news.execpc.com>
|
NNTP-Posting-Host: | 6c51f382.news.execpc.com
|
X-Trace: | DXC=G7o8`U^n:JNEngXT\kAlgMH AT OeEe<m4?O0ICGTaT\BlM=EV;d7?Dn`MPeAM;FFe7aOhA;042eB`HNV?2`8L\Q0AC
|
X-Complaints-To: | abuse AT execpc DOT com
|
To: | djgpp AT delorie DOT com
|
DJ-Gateway: | from newsgroup comp.os.msdos.djgpp
|
Reply-To: | djgpp AT delorie DOT com
|
Hi,
These are the only COFF section flags that seem to be documented:
0x0020 STYP_TEXT
0x0040 STYP_DATA
0x0080 STYP_BSS
However, if I use objdump -h, I see what appear to be more
flag values: CONTENTS, ALLOC, LOAD, DEBUGGING
Are these actually stored in the section 'flags' field?
If so, to which bits do they correspond?
--
geezer@ | http://www.execpc.com/~geezer
execpc.com | http://www.execpc.com/~geezer/osd
- Raw text -