From 651fc300a4087f6ccaa7d17c0d581e6ddd313a48 Mon Sep 17 00:00:00 2001 From: Kartik Agaram Date: Fri, 6 Mar 2020 12:28:57 -0800 Subject: 6084 --- html/012elf.cc.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'html/012elf.cc.html') diff --git a/html/012elf.cc.html b/html/012elf.cc.html index 2b8d8236..cb370731 100644 --- a/html/012elf.cc.html +++ b/html/012elf.cc.html @@ -169,7 +169,7 @@ if ('onhashchange' in window) { 108 uint32_t p_type = u32_in(&elf_contents[offset]); 109 trace(90, "load") << "program header at offset " << offset << ": type " << p_type << end(); 110 if (p_type != 1) { -111 trace(90, "load") << "ignoring segment at offset " << offset << " of non PT_LOAD type " << p_type << " (see http://refspecs.linuxbase.org/elf/elf.pdf)" << end(); +111 trace(90, "load") << "ignoring segment at offset " << offset << " of non PT_LOAD type " << p_type << " (see http://refspecs.linuxbase.org/elf/elf.pdf)" << end(); 112 return; 113 } 114 uint32_t p_offset = u32_in(&elf_contents[offset + 4]); @@ -179,7 +179,7 @@ if ('onhashchange' in window) { 118 uint32_t p_filesz = u32_in(&elf_contents[offset + 16]); 119 uint32_t p_memsz = u32_in(&elf_contents[offset + 20]); 120 if (p_filesz != p_memsz) -121 raise << "Can't yet handle segments where p_filesz != p_memsz (see http://refspecs.linuxbase.org/elf/elf.pdf)\n" << die(); +121 raise << "Can't yet handle segments where p_filesz != p_memsz (see http://refspecs.linuxbase.org/elf/elf.pdf)\n" << die(); 122 123 if (p_offset + p_filesz > size) 124 raise << "Invalid binary; segment at offset " << offset << " is too large: wants to end at " << p_offset+p_filesz << " but the file ends at " << size << '\n' << die(); -- cgit 1.4.1-2-gfad0