File: pack-dyn-relocs-loop.s

package info (click to toggle)
llvm-toolchain-16 1%3A16.0.6-15~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 1,634,792 kB
  • sloc: cpp: 6,179,261; ansic: 1,216,205; asm: 741,319; python: 196,614; objc: 75,325; f90: 49,640; lisp: 32,396; pascal: 12,286; sh: 9,394; perl: 7,442; ml: 5,494; awk: 3,523; makefile: 2,723; javascript: 1,206; xml: 886; fortran: 581; cs: 573
file content (66 lines) | stat: -rw-r--r-- 1,802 bytes parent folder | download | duplicates (21)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
// REQUIRES: arm, aarch64

// RUN: llvm-mc -filetype=obj -triple=aarch64-none-linux-android %s -o %t.o
// RUN: ld.lld -shared %t.o -o %t.so --pack-dyn-relocs=android -z norelro -z separate-code
// RUN: llvm-readobj -S %t.so | FileCheck %s

// This test is making sure the Android packed relocation support doesn't
// cause an infinite loop due to the size of the section oscillating
// (because the size of the section impacts the layout of the following
// sections).

// This test is very sensitive to the exact section sizes and offsets,
// so check that they don't change.
// CHECK:         Name: .rela.dyn (33)
// CHECK-NEXT:    Type: SHT_ANDROID_RELA (0x60000002)
// CHECK-NEXT:    Flags [ (0x2)
// CHECK-NEXT:      SHF_ALLOC (0x2)
// CHECK-NEXT:    ]
// CHECK-NEXT:    Address: 0x1D8
// CHECK-NEXT:    Offset: 0x1D8
// CHECK-NEXT:    Size: 21

// CHECK:         Name: x (43)
// CHECK-NEXT:    Type: SHT_PROGBITS (0x1)
// CHECK-NEXT:    Flags [ (0x2)
// CHECK-NEXT:      SHF_ALLOC (0x2)
// CHECK-NEXT:    ]
// CHECK-NEXT:    Address: 0x1ED
// CHECK-NEXT:    Offset: 0x1ED
// CHECK-NEXT:    Size: 65036

// CHECK:         Name: barr (45)
// CHECK-NEXT:    Type: SHT_PROGBITS (0x1)
// CHECK-NEXT:    Flags [ (0x2)
// CHECK-NEXT:      SHF_ALLOC (0x2)
// CHECK-NEXT:    ]
// CHECK-NEXT:    Address: 0xFFFA
// CHECK-NEXT:    Offset: 0xFFFA
// CHECK-NEXT:    Size: 0

// CHECK:         Name: foo (62)
// CHECK-NEXT:    Type: SHT_PROGBITS (0x1)
// CHECK-NEXT:    Flags [ (0x3)
// CHECK-NEXT:      SHF_ALLOC (0x2)
// CHECK-NEXT:      SHF_WRITE (0x1)
// CHECK-NEXT:    ]
// CHECK-NEXT:    Address: 0x10004
// CHECK-NEXT:    Offset: 0x10004
// CHECK-NEXT:    Size: 24


.data
.long 0

.section foo,"aw"
foof:
.quad foof
.quad bar-53
.quad bar

.section x,"a"
.zero 65036

.section barr,"a"
.p2align 1
bar: