delorie.com/archives/browse.cgi | search |
From: | eplmst AT lu DOT erisoft DOT se (Martin Stromberg) |
Newsgroups: | comp.os.msdos.djgpp |
Subject: | Re: COFF section flags |
Date: | 7 Jun 2002 06:22:21 GMT |
Organization: | Ericsson Erisoft AB, Sweden |
Lines: | 18 |
Message-ID: | <adpjet$cu2$1@antares.lu.erisoft.se> |
References: | <3d00299c$0$3573$272ea4a1 AT news DOT execpc DOT com> |
NNTP-Posting-Host: | lws256.lu.erisoft.se |
X-Newsreader: | TIN [version 1.2 PL2] |
To: | djgpp AT delorie DOT com |
DJ-Gateway: | from newsgroup comp.os.msdos.djgpp |
Reply-To: | djgpp AT delorie DOT com |
Chris Giese (NoEmailAds AT execpc DOT com) wrote: : These are the only COFF section flags that seem to be documented: : 0x0020 STYP_TEXT : 0x0040 STYP_DATA : 0x0080 STYP_BSS : However, if I use objdump -h, I see what appear to be more : flag values: CONTENTS, ALLOC, LOAD, DEBUGGING : Are these actually stored in the section 'flags' field? : If so, to which bits do they correspond? Why don't you examine objdump's source? Right, MartinS
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |