File: bb-addr-map.test

package info (click to toggle)
llvm-toolchain-14 1%3A14.0.6-12
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 1,496,180 kB
  • sloc: cpp: 5,593,972; ansic: 986,872; asm: 585,869; python: 184,223; objc: 72,530; lisp: 31,119; f90: 27,793; javascript: 9,780; pascal: 9,762; sh: 9,482; perl: 7,468; ml: 5,432; awk: 3,523; makefile: 2,538; xml: 953; cs: 573; fortran: 567
file content (147 lines) | stat: -rw-r--r-- 4,546 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
## This test checks how we handle the --bb-addr-map option.

# Check 64-bit:
# RUN: yaml2obj %s -DBITS=64 -DADDR=0x999999999 -o %t1.x64.o
# RUN: llvm-readobj %t1.x64.o --bb-addr-map 2>&1 | FileCheck %s -DADDR=0x999999999 -DFILE=%t1.x64.o --check-prefix=LLVM

# RUN: llvm-readelf %t1.x64.o --bb-addr-map | FileCheck %s --check-prefix=GNU

## Check 32-bit:
# RUN: yaml2obj %s -DBITS=32 -o %t1.x32.o
# RUN: llvm-readobj %t1.x32.o --bb-addr-map 2>&1 | FileCheck -DADDR=0x11111 %s -DFILE=%t1.x32.o --check-prefix=LLVM
# RUN: llvm-readelf %t1.x32.o --bb-addr-map | FileCheck %s --check-prefix=GNU

## Check that a malformed section can be handled.
# RUN: yaml2obj %s -DBITS=32 -DSIZE=4 -o %t2.o
# RUN: llvm-readobj %t2.o --bb-addr-map 2>&1 | FileCheck %s -DOFFSET=0x00000004 -DFILE=%t2.o --check-prefix=TRUNCATED

# LLVM:      BBAddrMap [
# LLVM-NEXT:   Function {
# LLVM-NEXT:     At: [[ADDR]]
# LLVM-NEXT: warning: '[[FILE]]': could not identify function symbol for address ([[ADDR]]) in SHT_LLVM_BB_ADDR_MAP section with index 3
# LLVM-NEXT:     Name: <?>
# LLVM-NEXT:     BB entries [
# LLVM-NEXT:       {
# LLVM-NEXT:         Offset: 0x0
# LLVM-NEXT:         Size: 0x1
# LLVM-NEXT:         HasReturn: No
# LLVM-NEXT:         HasTailCall: Yes
# LLVM-NEXT:         IsEHPad: No
# LLVM-NEXT:         CanFallThrough: No
# LLVM-NEXT:       }
# LLVM-NEXT:       {
# LLVM-NEXT:         Offset: 0x3
# LLVM-NEXT:         Size: 0x4
# LLVM-NEXT:         HasReturn: Yes
# LLVM-NEXT:         HasTailCall: No
# LLVM-NEXT:         IsEHPad: Yes
# LLVM-NEXT:         CanFallThrough: No
# LLVM-NEXT:       }
# LLVM-NEXT:     ]
# LLVM-NEXT:   }
# LLVM-NEXT:   Function {
# LLVM-NEXT:     At: 0x22222
# LLVM-NEXT:     Name: foo
# LLVM-NEXT:     BB entries [
# LLVM-NEXT:       {
# LLVM-NEXT:         Offset: 0x6
# LLVM-NEXT:         Size: 0x7
# LLVM-NEXT:         HasReturn: No
# LLVM-NEXT:         HasTailCall: No
# LLVM-NEXT:         IsEHPad: No
# LLVM-NEXT:         CanFallThrough: Yes
# LLVM-NEXT:       }
# LLVM-NEXT:     ]
# LLVM-NEXT:   }
# LLVM-NEXT: ]
# LLVM-NEXT: BBAddrMap [
# LLVM-NEXT:   Function {
# LLVM-NEXT:     At: 0x33333
# LLVM-NEXT:     Name: bar
# LLVM-NEXT:     BB entries [
# LLVM-NEXT:       {
# LLVM-NEXT:         Offset: 0x9
# LLVM-NEXT:         Size: 0xA
# LLVM-NEXT:         HasReturn: Yes
# LLVM-NEXT:         HasTailCall: Yes
# LLVM-NEXT:         IsEHPad: No
# LLVM-NEXT:         CanFallThrough: Yes
# LLVM-NEXT:       }
# LLVM-NEXT:     ]
# LLVM-NEXT:   }
# LLVM-NEXT: ]

# GNU: GNUStyle::printBBAddrMaps not implemented

# TRUNCATED:      BBAddrMap [
# TRUNCATED-NEXT:   warning: '[[FILE]]': unable to dump SHT_LLVM_BB_ADDR_MAP section with index 3: unable to decode LEB128 at offset [[OFFSET]]: malformed uleb128, extends past end
# TRUNCATED-NEXT: ]
## Check that the other valid section is properly dumped.
# TRUNCATED-NEXT: BBAddrMap [
# TRUNCATED-NEXT:   Function {
# TRUNCATED-NEXT:     At: 0x33333
# TRUNCATED-NEXT:     Name: bar
# TRUNCATED-NEXT:     BB entries [
# TRUNCATED-NEXT:       {
# TRUNCATED-NEXT:         Offset: 0x9
# TRUNCATED-NEXT:         Size: 0xA
# TRUNCATED-NEXT:         HasReturn: Yes
# TRUNCATED-NEXT:         HasTailCall: Yes
# TRUNCATED-NEXT:         IsEHPad: No
# TRUNCATED-NEXT:         CanFallThrough: Yes
# TRUNCATED-NEXT:       }
# TRUNCATED-NEXT:     ]
# TRUNCATED-NEXT:   }
# TRUNCATED-NEXT: ]

--- !ELF
FileHeader:
  Class: ELFCLASS[[BITS]]
  Data:  ELFDATA2LSB
  Type:  ET_EXEC
Sections:
  - Name:   .text
    Type:   SHT_PROGBITS
    Flags:  [SHF_ALLOC]
  - Name:   .text.bar
    Type:   SHT_PROGBITS
    Flags:  [SHF_ALLOC]
  - Name:   bb_addr_map_1
    Type:   SHT_LLVM_BB_ADDR_MAP
    ShSize: [[SIZE=<none>]]
    Link:   .text
    Entries:
      - Address: [[ADDR=0x11111]]
        BBEntries:
          - AddressOffset: 0x0
            Size:          0x1
            Metadata:      0xF0000002
          - AddressOffset: 0x3
            Size:          0x4
            Metadata:      0x5
      - Address: 0x22222
        BBEntries:
          - AddressOffset: 0x6
            Size:          0x7
            Metadata:      0x8
  - Name:   dummy_section
    Type:   SHT_PROGBITS
    Size:   16
  - Name:   bb_addr_map_2
    Type:   SHT_LLVM_BB_ADDR_MAP
    Link:   .text.bar
    Entries:
      - Address: 0x33333
        BBEntries:
          - AddressOffset: 0x9
            Size:          0xa
            Metadata:      0xb
Symbols:
  - Name:    foo
    Section: .text
    Type:    STT_FUNC
    Value:   0x22222
  - Name:    bar
    Section: .text.bar
    Type:    STT_FUNC
    Value:   0x33333