File: jump-table.s

package info (click to toggle)
llvm-toolchain-11 1%3A11.0.1-2
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 995,808 kB
  • sloc: cpp: 4,767,656; ansic: 760,916; asm: 477,436; python: 170,940; objc: 69,804; lisp: 29,914; sh: 23,855; f90: 18,173; pascal: 7,551; perl: 7,471; ml: 5,603; awk: 3,489; makefile: 2,573; xml: 915; cs: 573; fortran: 503; javascript: 452
file content (59 lines) | stat: -rw-r--r-- 1,458 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
// RUN: llvm-mc < %s -triple=aarch64-none-linux-gnu -filetype=obj | llvm-readobj -r | FileCheck %s

	.file	"<stdin>"
	.text
	.globl	test_jumptable
	.type	test_jumptable,@function
test_jumptable:                         // @test_jumptable
	.cfi_startproc
// %bb.0:
	ubfx	w1, w0, #0, #32
	cmp w0, #4
	b.hi .LBB0_3
// %bb.1:
	adrp	x0, .LJTI0_0
	add	x0, x0, #:lo12:.LJTI0_0
	ldr	x0, [x0, x1, lsl #3]
	br	x0
.LBB0_2:                                // %lbl1
	movz	x0, #1
	ret
.LBB0_3:                                // %def
	mov	 x0, xzr
	ret
.LBB0_4:                                // %lbl2
	movz	x0, #2
	ret
.LBB0_5:                                // %lbl3
	movz	x0, #4
	ret
.LBB0_6:                                // %lbl4
	movz	x0, #8
	ret
.Ltmp0:
	.size	test_jumptable, .Ltmp0-test_jumptable
	.cfi_endproc
	.section	.rodata,"a",@progbits
	.align	3
.LJTI0_0:
	.xword	.LBB0_2
	.xword	.LBB0_4
	.xword	.LBB0_5
	.xword	.LBB0_3
	.xword	.LBB0_6



// First make sure we get a page/lo12 pair in .text to pick up the jump-table

// CHECK:      Relocations [
// CHECK:        Section ({{[0-9]+}}) .rela.text {
// CHECK-NEXT:     0x{{[0-9,A-F]+}} R_AARCH64_ADR_PREL_PG_HI21 .rodata
// CHECK-NEXT:     0x{{[0-9,A-F]+}} R_AARCH64_ADD_ABS_LO12_NC .rodata
// CHECK:        }

// Also check the targets in .rodata are relocated
// CHECK:        Section ({{[0-9]+}}) .rela.rodata {
// CHECK-NEXT:     0x{{[0-9,A-F]+}} R_AARCH64_ABS64 .text
// CHECK:        }
// CHECK:      ]