forked from OSchip/llvm-project
49 lines
1.4 KiB
ArmAsm
49 lines
1.4 KiB
ArmAsm
// REQUIRES: x86
|
|
// RUN: llvm-mc -filetype=obj -triple=x86_64-unknown-linux %s -o %t.o
|
|
// RUN: llvm-mc -filetype=obj -triple=x86_64-unknown-linux %p/Inputs/undef-with-plt-addr.s -o %t2.o
|
|
// RUN: ld.lld %t2.o -o %t2.so -shared -soname=so
|
|
// RUN: ld.lld %t.o %t2.so -o %t3
|
|
// RUN: llvm-readobj --symbols -S -r %t3 | FileCheck %s
|
|
|
|
// Test that -z nocopyreloc doesn't prevent the plt hack.
|
|
// RUN: ld.lld %t.o %t2.so -o %t3 -z nocopyreloc
|
|
|
|
.globl _start
|
|
_start:
|
|
movabsq $set_data, %rax
|
|
|
|
.data
|
|
.quad foo
|
|
// Test that set_data has an address in the .plt, but foo is not
|
|
|
|
// CHECK: Name: .plt
|
|
// CHECK-NEXT: Type: SHT_PROGBITS
|
|
// CHECK-NEXT: Flags [
|
|
// CHECK-NEXT: SHF_ALLOC
|
|
// CHECK-NEXT: SHF_EXECINSTR
|
|
// CHECK-NEXT: ]
|
|
// CHECK-NEXT: Address: 0x2012E0
|
|
|
|
// CHECK: Section ({{.*}}) .rela.dyn {
|
|
// CHECK-NEXT: 0x203400 R_X86_64_64 foo 0x0
|
|
// CHECK-NEXT: }
|
|
// CHECK-NEXT: Section ({{.*}}) .rela.plt {
|
|
// CHECK-NEXT: 0x203420 R_X86_64_JUMP_SLOT set_data 0x0
|
|
// CHECK-NEXT: }
|
|
|
|
// CHECK: Name: set_data
|
|
// CHECK-NEXT: Value: 0x2012F0
|
|
// CHECK-NEXT: Size: 0
|
|
// CHECK-NEXT: Binding: Global
|
|
// CHECK-NEXT: Type: Function
|
|
// CHECK-NEXT: Other: 0
|
|
// CHECK-NEXT: Section: Undefined
|
|
|
|
// CHECK: Name: foo
|
|
// CHECK-NEXT: Value: 0x0
|
|
// CHECK-NEXT: Size: 0
|
|
// CHECK-NEXT: Binding: Global
|
|
// CHECK-NEXT: Type: Function
|
|
// CHECK-NEXT: Other: 0
|
|
// CHECK-NEXT: Section: Undefined
|