| delorie.com/archives/browse.cgi | search |
| From: | eplmst AT lu DOT erisoft DOT se (Martin Stromberg) |
| Newsgroups: | comp.os.msdos.djgpp |
| Subject: | Re: COFF section flags |
| Date: | 7 Jun 2002 06:22:21 GMT |
| Organization: | Ericsson Erisoft AB, Sweden |
| Lines: | 18 |
| Message-ID: | <adpjet$cu2$1@antares.lu.erisoft.se> |
| References: | <3d00299c$0$3573$272ea4a1 AT news DOT execpc DOT com> |
| NNTP-Posting-Host: | lws256.lu.erisoft.se |
| X-Newsreader: | TIN [version 1.2 PL2] |
| To: | djgpp AT delorie DOT com |
| DJ-Gateway: | from newsgroup comp.os.msdos.djgpp |
| Reply-To: | djgpp AT delorie DOT com |
Chris Giese (NoEmailAds AT execpc DOT com) wrote: : These are the only COFF section flags that seem to be documented: : 0x0020 STYP_TEXT : 0x0040 STYP_DATA : 0x0080 STYP_BSS : However, if I use objdump -h, I see what appear to be more : flag values: CONTENTS, ALLOC, LOAD, DEBUGGING : Are these actually stored in the section 'flags' field? : If so, to which bits do they correspond? Why don't you examine objdump's source? Right, MartinS
| webmaster | delorie software privacy |
| Copyright © 2019 by DJ Delorie | Updated Jul 2019 |