1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple i386-pc-linux-gnu %s -relax-relocations=false -o - | llvm-readobj -r | FileCheck %s --check-prefix=CHECK --check-prefix=I386 2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple i386-pc-elfiamcu %s -relax-relocations=false -o - | llvm-readobj -r | FileCheck %s --check-prefix=CHECK --check-prefix=IAMCU 3*9880d681SAndroid Build Coastguard Worker 4*9880d681SAndroid Build Coastguard Worker// Test that we produce the correct relocation types and that the relocations 5*9880d681SAndroid Build Coastguard Worker// correctly point to the section or the symbol. 6*9880d681SAndroid Build Coastguard Worker 7*9880d681SAndroid Build Coastguard Worker// IAMCU: Format: ELF32-iamcu 8*9880d681SAndroid Build Coastguard Worker// I386: Format: ELF32-i386 9*9880d681SAndroid Build Coastguard Worker// CHECK: Relocations [ 10*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Section {{.*}} .rel.text { 11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x2 R_386_GOTOFF .Lfoo 0x0 12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x{{[^ ]+}} R_386_PLT32 bar2 0x0 13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x{{[^ ]+}} R_386_GOTPC _GLOBAL_OFFSET_TABLE_ 0x0 14*9880d681SAndroid Build Coastguard Worker// Relocation 3 (bar3@GOTOFF) is done with symbol 7 (bss) 15*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x{{[^ ]+}} R_386_GOTOFF .bss 0x0 16*9880d681SAndroid Build Coastguard Worker// Relocation 4 (bar2@GOT) is of type R_386_GOT32 17*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x{{[^ ]+}} R_386_GOT32 bar2j 0x0 18*9880d681SAndroid Build Coastguard Worker 19*9880d681SAndroid Build Coastguard Worker// Relocation 5 (foo@TLSGD) is of type R_386_TLS_GD 20*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x20 R_386_TLS_GD foo 0x0 21*9880d681SAndroid Build Coastguard Worker// Relocation 6 ($foo@TPOFF) is of type R_386_TLS_LE_32 22*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x25 R_386_TLS_LE_32 foo 0x0 23*9880d681SAndroid Build Coastguard Worker// Relocation 7 (foo@INDNTPOFF) is of type R_386_TLS_IE 24*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x2B R_386_TLS_IE foo 0x0 25*9880d681SAndroid Build Coastguard Worker// Relocation 8 (foo@NTPOFF) is of type R_386_TLS_LE 26*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x31 R_386_TLS_LE foo 0x0 27*9880d681SAndroid Build Coastguard Worker// Relocation 9 (foo@GOTNTPOFF) is of type R_386_TLS_GOTIE 28*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x37 R_386_TLS_GOTIE foo 0x0 29*9880d681SAndroid Build Coastguard Worker// Relocation 10 (foo@TLSLDM) is of type R_386_TLS_LDM 30*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x3D R_386_TLS_LDM foo 0x0 31*9880d681SAndroid Build Coastguard Worker// Relocation 11 (foo@DTPOFF) is of type R_386_TLS_LDO_32 32*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x43 R_386_TLS_LDO_32 foo 0x0 33*9880d681SAndroid Build Coastguard Worker// Relocation 12 (calll 4096) is of type R_386_PC32 34*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x48 R_386_PC32 - 0x0 35*9880d681SAndroid Build Coastguard Worker// Relocation 13 (zed@GOT) is of type R_386_GOT32 and uses the symbol 36*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x4E R_386_GOT32 zed 0x0 37*9880d681SAndroid Build Coastguard Worker// Relocation 14 (zed@GOTOFF) is of type R_386_GOTOFF and uses the symbol 38*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x54 R_386_GOTOFF zed 0x0 39*9880d681SAndroid Build Coastguard Worker// Relocation 15 (zed@INDNTPOFF) is of type R_386_TLS_IE and uses the symbol 40*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x5A R_386_TLS_IE zed 0x0 41*9880d681SAndroid Build Coastguard Worker// Relocation 16 (zed@NTPOFF) is of type R_386_TLS_LE and uses the symbol 42*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x60 R_386_TLS_LE zed 0x0 43*9880d681SAndroid Build Coastguard Worker// Relocation 17 (zed@GOTNTPOFF) is of type R_386_TLS_GOTIE and uses the symbol 44*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x66 R_386_TLS_GOTIE zed 0x0 45*9880d681SAndroid Build Coastguard Worker// Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol 46*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x6B R_386_PLT32 zed 0x0 47*9880d681SAndroid Build Coastguard Worker// Relocation 19 (zed@TLSGD) is of type R_386_TLS_GD and uses the symbol 48*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x71 R_386_TLS_GD zed 0x0 49*9880d681SAndroid Build Coastguard Worker// Relocation 20 (zed@TLSLDM) is of type R_386_TLS_LDM and uses the symbol 50*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x77 R_386_TLS_LDM zed 0x0 51*9880d681SAndroid Build Coastguard Worker// Relocation 21 (zed@TPOFF) is of type R_386_TLS_LE_32 and uses the symbol 52*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x7D R_386_TLS_LE_32 zed 0x0 53*9880d681SAndroid Build Coastguard Worker// Relocation 22 (zed@DTPOFF) is of type R_386_TLS_LDO_32 and uses the symbol 54*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x83 R_386_TLS_LDO_32 zed 0x0 55*9880d681SAndroid Build Coastguard Worker// Relocation 23 ($bar) is of type R_386_32 and uses the section 56*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x{{[^ ]+}} R_386_32 .text 0x0 57*9880d681SAndroid Build Coastguard Worker// Relocation 24 (foo@GOTTPOFF(%edx)) is of type R_386_TLS_IE_32 and uses the 58*9880d681SAndroid Build Coastguard Worker// symbol 59*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x8E R_386_TLS_IE_32 foo 0x0 60*9880d681SAndroid Build Coastguard Worker// Relocation 25 (_GLOBAL_OFFSET_TABLE_-bar2) is of type R_386_GOTPC. 61*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x94 R_386_GOTPC _GLOBAL_OFFSET_TABLE_ 0x0 62*9880d681SAndroid Build Coastguard Worker// Relocation 26 (und_symbol-bar2) is of type R_386_PC32 63*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x9A R_386_PC32 und_symbol 0x0 64*9880d681SAndroid Build Coastguard Worker// Relocation 27 (und_symbol-bar2) is of type R_386_PC16 65*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0x9E R_386_PC16 und_symbol 0x0 66*9880d681SAndroid Build Coastguard Worker// Relocation 28 (und_symbol-bar2) is of type R_386_PC8 67*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xA0 R_386_PC8 und_symbol 0x0 68*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xA3 R_386_GOTOFF und_symbol 0x0 69*9880d681SAndroid Build Coastguard Worker// Relocation 29 (zed@PLT) is of type R_386_PLT32 and uses the symbol 70*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xA9 R_386_PLT32 zed 0x0 71*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xAF R_386_PC32 tr_start 0x0 72*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xB3 R_386_16 foo 0x0 73*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: 0xB5 R_386_8 foo 0x0 74*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: } 75*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: ] 76*9880d681SAndroid Build Coastguard Worker 77*9880d681SAndroid Build Coastguard Worker .text 78*9880d681SAndroid Build Coastguard Workerbar: 79*9880d681SAndroid Build Coastguard Worker leal .Lfoo@GOTOFF(%ebx), %eax 80*9880d681SAndroid Build Coastguard Worker 81*9880d681SAndroid Build Coastguard Worker .global bar2 82*9880d681SAndroid Build Coastguard Workerbar2: 83*9880d681SAndroid Build Coastguard Worker calll bar2@PLT 84*9880d681SAndroid Build Coastguard Worker addl $_GLOBAL_OFFSET_TABLE_, %ebx 85*9880d681SAndroid Build Coastguard Worker movb bar3@GOTOFF(%ebx), %al 86*9880d681SAndroid Build Coastguard Worker 87*9880d681SAndroid Build Coastguard Worker .type bar3,@object 88*9880d681SAndroid Build Coastguard Worker .local bar3 89*9880d681SAndroid Build Coastguard Worker .comm bar3,1,1 90*9880d681SAndroid Build Coastguard Worker 91*9880d681SAndroid Build Coastguard Worker movl bar2j@GOT(%eax), %eax 92*9880d681SAndroid Build Coastguard Worker 93*9880d681SAndroid Build Coastguard Worker leal foo@TLSGD(, %ebx,1), %eax 94*9880d681SAndroid Build Coastguard Worker movl $foo@TPOFF, %edx 95*9880d681SAndroid Build Coastguard Worker movl foo@INDNTPOFF, %ecx 96*9880d681SAndroid Build Coastguard Worker addl foo@NTPOFF(%eax), %eax 97*9880d681SAndroid Build Coastguard Worker addl foo@GOTNTPOFF(%ebx), %ecx 98*9880d681SAndroid Build Coastguard Worker leal foo@TLSLDM(%ebx), %eax 99*9880d681SAndroid Build Coastguard Worker leal foo@DTPOFF(%eax), %edx 100*9880d681SAndroid Build Coastguard Worker calll 4096 101*9880d681SAndroid Build Coastguard Worker movl zed@GOT(%eax), %eax 102*9880d681SAndroid Build Coastguard Worker movl zed@GOTOFF(%eax), %eax 103*9880d681SAndroid Build Coastguard Worker movl zed@INDNTPOFF(%eax), %eax 104*9880d681SAndroid Build Coastguard Worker movl zed@NTPOFF(%eax), %eax 105*9880d681SAndroid Build Coastguard Worker movl zed@GOTNTPOFF(%eax), %eax 106*9880d681SAndroid Build Coastguard Worker call zed@PLT 107*9880d681SAndroid Build Coastguard Worker movl zed@TLSGD(%eax), %eax 108*9880d681SAndroid Build Coastguard Worker movl zed@TLSLDM(%eax), %eax 109*9880d681SAndroid Build Coastguard Worker movl zed@TPOFF(%eax), %eax 110*9880d681SAndroid Build Coastguard Worker movl zed@DTPOFF(%eax), %eax 111*9880d681SAndroid Build Coastguard Worker pushl $bar 112*9880d681SAndroid Build Coastguard Worker addl foo@GOTTPOFF(%edx), %eax 113*9880d681SAndroid Build Coastguard Worker subl _GLOBAL_OFFSET_TABLE_-bar2, %ebx 114*9880d681SAndroid Build Coastguard Worker leal und_symbol-bar2(%edx),%ecx 115*9880d681SAndroid Build Coastguard Worker .word und_symbol-bar2 116*9880d681SAndroid Build Coastguard Worker .byte und_symbol-bar2 117*9880d681SAndroid Build Coastguard Worker 118*9880d681SAndroid Build Coastguard Worker leal 1 + und_symbol@GOTOFF, %edi 119*9880d681SAndroid Build Coastguard Worker movl zed@PLT(%eax), %eax 120*9880d681SAndroid Build Coastguard Worker 121*9880d681SAndroid Build Coastguard Worker .code64 122*9880d681SAndroid Build Coastguard Worker jmpq *tr_start(%rip) 123*9880d681SAndroid Build Coastguard Worker 124*9880d681SAndroid Build Coastguard Worker .word foo 125*9880d681SAndroid Build Coastguard Worker .byte foo 126*9880d681SAndroid Build Coastguard Worker 127*9880d681SAndroid Build Coastguard Worker .section zedsec,"awT",@progbits 128*9880d681SAndroid Build Coastguard Workerzed: 129*9880d681SAndroid Build Coastguard Worker .long 0 130*9880d681SAndroid Build Coastguard Worker 131*9880d681SAndroid Build Coastguard Worker .section .rodata.str1.16,"aMS",@progbits,1 132*9880d681SAndroid Build Coastguard Worker.Lfoo: 133*9880d681SAndroid Build Coastguard Worker .asciz "bool llvm::llvm_start_multithreaded()" 134