Displaying 4 results from an estimated 4 matches for "testfunction2".
2019 Jan 28
4
lld write wrong symbol value in .data section if enable -pie
...section '.rela.data' at offset 0x5b7e8 contains 41 entries:
Offset Info Type Sym. Value Sym. Name + Addend
... ...
000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0
000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0
3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons
$ readelf -x2 HelloWorld.dll
Hex dump of section '.data':
NOTE: This section has relocations against it, but these have NOT been applied to this dump.
... ...
0x00005030 0000...
2011 Jul 23
6
Rails 3.1 CoffeeScript not working
I convert my old JS files into CoffeeScript, In my public controller I
used this functions
$(''#events a'').lightBox()
$(document).ready ->
$("#slider").easySlider
auto: true,
continuous: true
they load inside application.js like this
(function() {
$(''#events a'').lightBox();
$(document).ready(function() {
2019 Jan 29
3
lld write wrong symbol value in .data section if enable -pie
...tion section '.rela.data' at offset 0x5b7e8 contains 41 entries:
Offset Info Type Sym. Value Sym. Name + Addend
… …
000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0
000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0
3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons
$ readelf -x2 HelloWorld.dll
Hex dump of section '.data':
NOTE: This section has relocations against it, but these have NOT been applied to this dump.
… …
0x00005030 00000000...
2019 Jan 29
2
lld write wrong symbol value in .data section if enable -pie
...tion section '.rela.data' at offset 0x5b7e8 contains 41 entries:
Offset Info Type Sym. Value Sym. Name + Addend
… …
000000005040 00d600000001 R_X86_64_64 0000000000003130 TestFunction1 + 0
000000005048 00d700000001 R_X86_64_64 0000000000003150 TestFunction2 + 0
3. Next, I check the symbol values in .data section which are targeted by above R_X86_64_64 relocatons
$ readelf -x2 HelloWorld.dll
Hex dump of section '.data':
NOTE: This section has relocations against it, but these have NOT been applied to this dump.
… …
0x00005030 00000000...