search for: testfunction2

Displaying 4 results from an estimated 4 matches for "testfunction2".

2019 Jan 28
4
lld write wrong symbol value in .data section if enable -pie
...section '.rela.data' at offset 0x5b7e8 contains 41 entries: Offset Info Type Sym. Value Sym. Name + Addend ... ... 000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0 000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0 3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons $ readelf -x2 HelloWorld.dll Hex dump of section '.data': NOTE: This section has relocations against it, but these have NOT been applied to this dump. ... ... 0x00005030 0000...
2011 Jul 23
6
Rails 3.1 CoffeeScript not working
I convert my old JS files into CoffeeScript, In my public controller I used this functions $(''#events a'').lightBox() $(document).ready -> $("#slider").easySlider auto: true, continuous: true they load inside application.js like this (function() { $(''#events a'').lightBox(); $(document).ready(function() {
2019 Jan 29
3
lld write wrong symbol value in .data section if enable -pie
...tion section '.rela.data' at offset 0x5b7e8 contains 41 entries: Offset Info Type Sym. Value Sym. Name + Addend … … 000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0 000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0 3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons $ readelf -x2 HelloWorld.dll Hex dump of section '.data': NOTE: This section has relocations against it, but these have NOT been applied to this dump. … … 0x00005030 00000000...
2019 Jan 29
2
lld write wrong symbol value in .data section if enable -pie
...tion section '.rela.data' at offset 0x5b7e8 contains 41 entries: Offset Info Type Sym. Value Sym. Name + Addend … … 000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0 000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0 3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons $ readelf -x2 HelloWorld.dll Hex dump of section '.data': NOTE: This section has relocations against it, but these have NOT been applied to this dump. … … 0x00005030 00000000...