Home / Companies / Cloudflare / Blog / Post Details
Content Deep Dive

How to execute an object file: Part 2

Blog post from Cloudflare

Post Details
Company
Date Published
Author
Ignat Korchagin
Word Count
4,323
Language
English
Hacker News Points
4
Summary

In this post, we have continued our exploration of dynamic linking by implementing a basic loader program that can execute functions from an ELF object file. We started by adding some more complexity to the imported code and then extended our loader program to handle constant data and global variables dependencies. Finally, we successfully executed all the imported functions including those with references to external libraries. The complete source code for this post is available on GitHub. In the next post, we will look into importing and executing object code with references to external libraries. Stay tuned!