// RUN: llvm-mc -filetype=obj -triple i386-pc-linux-gnu %s -o - | elf-dump | FileCheck %s // Test that we produce the correct relocation types and that the relocations // correctly point to the section or the symbol. // CHECK: # Relocation 0x00000000 // CHECK-NEXT: (('r_offset', 0x00000002) // CHECK-NEXT: ('r_sym', 0x00000001) // CHECK-NEXT: ('r_type', 0x00000009) // CHECK-NEXT: ), // CHECK-NEXT: # Relocation 0x00000001 // CHECK-NEXT: (('r_offset', // CHECK-NEXT: ('r_sym', // CHECK-NEXT: ('r_type', 0x00000004) // CHECK-NEXT: ), // CHECK-NEXT: # Relocation 0x00000002 // CHECK-NEXT: (('r_offset', // CHECK-NEXT: ('r_sym', // CHECK-NEXT: ('r_type', 0x0000000a) // CHECK-NEXT: ), // Relocation 3 (bar3@GOTOFF) is done with symbol 7 (bss) // CHECK-NEXT: # Relocation 0x00000003 // CHECK-NEXT: (('r_offset', // CHECK-NEXT: ('r_sym', 0x00000007 // CHECK-NEXT: ('r_type', // CHECK-NEXT: ), // Relocation 4 (bar2@GOT) is of type R_386_GOT32 // CHECK-NEXT: # Relocation 0x00000004 // CHECK-NEXT: (('r_offset', // CHECK-NEXT: ('r_sym', // CHECK-NEXT: ('r_type', 0x00000003 // CHECK-NEXT: ), // Relocation 5 (foo@TLSGD) is of type R_386_TLS_GD // CHECK-NEXT: # Relocation 0x00000005 // CHECK-NEXT: (('r_offset', 0x00000020) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000012) // CHECK-NEXT: ), // Relocation 6 ($foo@TPOFF) is of type R_386_TLS_LE_32 // CHECK-NEXT: # Relocation 0x00000006 // CHECK-NEXT: (('r_offset', 0x00000025) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000022) // CHECK-NEXT: ), // Relocation 7 (foo@INDNTPOFF) is of type R_386_TLS_IE // CHECK-NEXT: # Relocation 0x00000007 // CHECK-NEXT: (('r_offset', 0x0000002b) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x0000000f) // CHECK-NEXT: ), // Relocation 8 (foo@NTPOFF) is of type R_386_TLS_LE // CHECK-NEXT: # Relocation 0x00000008 // CHECK-NEXT: (('r_offset', 0x00000031) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000011) // CHECK-NEXT: ), // Relocation 9 (foo@GOTNTPOFF) is of type R_386_TLS_GOTIE // CHECK-NEXT: # Relocation 0x00000009 // CHECK-NEXT: (('r_offset', 0x00000037) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000010) // CHECK-NEXT: ), // Relocation 10 (foo@TLSLDM) is of type R_386_TLS_LDM // CHECK-NEXT: # Relocation 0x0000000a // CHECK-NEXT: (('r_offset', 0x0000003d) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000013) // CHECK-NEXT: ), // Relocation 11 (foo@DTPOFF) is of type R_386_TLS_LDO_32 // CHECK-NEXT: # Relocation 0x0000000b // CHECK-NEXT: (('r_offset', 0x00000043) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000020) // CHECK-NEXT: ), // Relocation 12 (calll 4096) is of type R_386_PC32 // CHECK-NEXT: # Relocation 0x0000000c // CHECK-NEXT: (('r_offset', 0x00000048) // CHECK-NEXT: ('r_sym', 0x00000000) // CHECK-NEXT: ('r_type', 0x00000002) // CHECK-NEXT: ), // Relocation 13 (zed@GOT) is of type R_386_GOT32 and uses the symbol // CHECK-NEXT: # Relocation 0x0000000d // CHECK-NEXT: (('r_offset', 0x0000004e) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000003) // CHECK-NEXT: ), // Relocation 14 (zed@GOTOFF) is of type R_386_GOTOFF and uses the symbol // CHECK-NEXT: # Relocation 0x0000000e // CHECK-NEXT: (('r_offset', 0x00000054) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000009) // CHECK-NEXT: ), // Relocation 15 (zed@INDNTPOFF) is of type R_386_TLS_IE and uses the symbol // CHECK-NEXT: # Relocation 0x0000000f // CHECK-NEXT: (('r_offset', 0x0000005a) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x0000000f) // CHECK-NEXT: ), // Relocation 16 (zed@NTPOFF) is of type R_386_TLS_LE and uses the symbol // CHECK-NEXT: # Relocation 0x00000010 // CHECK-NEXT: (('r_offset', 0x00000060) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000011) // CHECK-NEXT: ), // Relocation 17 (zed@GOTNTPOFF) is of type R_386_TLS_GOTIE and uses the symbol // CHECK-NEXT: # Relocation 0x00000011 // CHECK-NEXT: (('r_offset', 0x00000066) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000010) // CHECK-NEXT: ), // Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol // CHECK-NEXT: # Relocation 0x00000012 // CHECK-NEXT: (('r_offset', 0x0000006b) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000004) // CHECK-NEXT: ), // Relocation 19 (zed@TLSGD) is of type R_386_TLS_GD and uses the symbol // CHECK-NEXT: # Relocation 0x00000013 // CHECK-NEXT: (('r_offset', 0x00000071) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000012) // CHECK-NEXT: ), // Relocation 20 (zed@TLSLDM) is of type R_386_TLS_LDM and uses the symbol // CHECK-NEXT: # Relocation 0x00000014 // CHECK-NEXT: (('r_offset', 0x00000077) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000013) // CHECK-NEXT: ), // Relocation 21 (zed@TPOFF) is of type R_386_TLS_LE_32 and uses the symbol // CHECK-NEXT:# Relocation 0x00000015 // CHECK-NEXT: (('r_offset', 0x0000007d) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000022) // CHECK-NEXT: ), // Relocation 22 (zed@DTPOFF) is of type R_386_TLS_LDO_32 and uses the symbol // CHECK-NEXT: Relocation 0x00000016 // CHECK-NEXT: (('r_offset', 0x00000083) // CHECK-NEXT: ('r_sym', 0x00000004) // CHECK-NEXT: ('r_type', 0x00000020) // CHECK-NEXT: ), // Relocation 23 ($bar) is of type R_386_32 and uses the section // CHECK-NEXT: Relocation 0x00000017 // CHECK-NEXT: (('r_offset', // CHECK-NEXT: ('r_sym', // CHECK-NEXT: ('r_type', 0x00000001) // CHECK-NEXT: ), // Relocation 24 (foo@GOTTPOFF(%edx)) is of type R_386_TLS_IE_32 and uses the // symbol // CHECK-NEXT: Relocation 0x00000018 // CHECK-NEXT: (('r_offset', 0x0000008e) // CHECK-NEXT: ('r_sym', 0x0000000d) // CHECK-NEXT: ('r_type', 0x00000021) // CHECK-NEXT: ), // Section 4 is bss // CHECK: # Section 0x00000004 // CHECK-NEXT: (('sh_name', 0x0000000b) # '.bss' // CHECK: # Symbol 0x00000001 // CHECK-NEXT: (('st_name', 0x00000005) # '.Lfoo' // Symbol 4 is zed // CHECK: # Symbol 0x00000004 // CHECK-NEXT: (('st_name', 0x00000035) # 'zed' // CHECK-NEXT: ('st_value', 0x00000000) // CHECK-NEXT: ('st_size', 0x00000000) // CHECK-NEXT: ('st_bind', 0x00000000) // CHECK-NEXT: ('st_type', 0x00000006) // CHECK-NEXT: ('st_other', 0x00000000) // CHECK-NEXT: ('st_shndx', 0x00000005) // Symbol 7 is section 4 // CHECK: # Symbol 0x00000007 // CHECK-NEXT: (('st_name', 0x00000000) # '' // CHECK-NEXT: ('st_value', 0x00000000) // CHECK-NEXT: ('st_size', 0x00000000) // CHECK-NEXT: ('st_bind', 0x00000000) // CHECK-NEXT: ('st_type', 0x00000003) // CHECK-NEXT: ('st_other', 0x00000000) // CHECK-NEXT: ('st_shndx', 0x00000004) .text bar: leal .Lfoo@GOTOFF(%ebx), %eax .global bar2 bar2: calll bar2@PLT addl $_GLOBAL_OFFSET_TABLE_, %ebx movb bar3@GOTOFF(%ebx), %al .type bar3,@object .local bar3 .comm bar3,1,1 movl bar2j@GOT(%eax), %eax leal foo@TLSGD(, %ebx,1), %eax movl $foo@TPOFF, %edx movl foo@INDNTPOFF, %ecx addl foo@NTPOFF(%eax), %eax addl foo@GOTNTPOFF(%ebx), %ecx leal foo@TLSLDM(%ebx), %eax leal foo@DTPOFF(%eax), %edx calll 4096 movl zed@GOT(%eax), %eax movl zed@GOTOFF(%eax), %eax movl zed@INDNTPOFF(%eax), %eax movl zed@NTPOFF(%eax), %eax movl zed@GOTNTPOFF(%eax), %eax call zed@PLT movl zed@TLSGD(%eax), %eax movl zed@TLSLDM(%eax), %eax movl zed@TPOFF(%eax), %eax movl zed@DTPOFF(%eax), %eax pushl $bar addl foo@GOTTPOFF(%edx), %eax .section zedsec,"awT",@progbits zed: .long 0 .section .rodata.str1.16,"aMS",@progbits,1 .Lfoo: .asciz "bool llvm::llvm_start_multithreaded()"