xref: /aosp_15_r20/external/llvm/test/MC/ELF/relocation-386.s (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple i386-pc-linux-gnu %s -relax-relocations=false -o - | llvm-readobj -r  | FileCheck  %s --check-prefix=CHECK --check-prefix=I386
2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple i386-pc-elfiamcu %s -relax-relocations=false  -o - | llvm-readobj -r  | FileCheck  %s --check-prefix=CHECK --check-prefix=IAMCU
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Worker// Test that we produce the correct relocation types and that the relocations
5*9880d681SAndroid Build Coastguard Worker// correctly point to the section or the symbol.
6*9880d681SAndroid Build Coastguard Worker
7*9880d681SAndroid Build Coastguard Worker// IAMCU: Format: ELF32-iamcu
8*9880d681SAndroid Build Coastguard Worker// I386: Format: ELF32-i386
9*9880d681SAndroid Build Coastguard Worker// CHECK:      Relocations [
10*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   Section {{.*}} .rel.text {
11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x2          R_386_GOTOFF     .Lfoo 0x0
12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x{{[^ ]+}}  R_386_PLT32      bar2 0x0
13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x{{[^ ]+}}  R_386_GOTPC      _GLOBAL_OFFSET_TABLE_ 0x0
14*9880d681SAndroid Build Coastguard Worker// Relocation 3 (bar3@GOTOFF) is done with symbol 7 (bss)
15*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x{{[^ ]+}}  R_386_GOTOFF     .bss 0x0
16*9880d681SAndroid Build Coastguard Worker// Relocation 4 (bar2@GOT) is of type R_386_GOT32
17*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x{{[^ ]+}}  R_386_GOT32      bar2j 0x0
18*9880d681SAndroid Build Coastguard Worker
19*9880d681SAndroid Build Coastguard Worker// Relocation 5 (foo@TLSGD) is of type R_386_TLS_GD
20*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x20         R_386_TLS_GD     foo 0x0
21*9880d681SAndroid Build Coastguard Worker// Relocation 6 ($foo@TPOFF) is of type R_386_TLS_LE_32
22*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x25         R_386_TLS_LE_32  foo 0x0
23*9880d681SAndroid Build Coastguard Worker// Relocation 7 (foo@INDNTPOFF) is of type R_386_TLS_IE
24*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x2B         R_386_TLS_IE     foo 0x0
25*9880d681SAndroid Build Coastguard Worker// Relocation 8 (foo@NTPOFF) is of type R_386_TLS_LE
26*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x31         R_386_TLS_LE     foo 0x0
27*9880d681SAndroid Build Coastguard Worker// Relocation 9 (foo@GOTNTPOFF) is of type R_386_TLS_GOTIE
28*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x37         R_386_TLS_GOTIE  foo 0x0
29*9880d681SAndroid Build Coastguard Worker// Relocation 10 (foo@TLSLDM) is of type R_386_TLS_LDM
30*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x3D         R_386_TLS_LDM    foo 0x0
31*9880d681SAndroid Build Coastguard Worker// Relocation 11 (foo@DTPOFF) is of type R_386_TLS_LDO_32
32*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x43         R_386_TLS_LDO_32 foo 0x0
33*9880d681SAndroid Build Coastguard Worker// Relocation 12 (calll 4096) is of type R_386_PC32
34*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x48         R_386_PC32       - 0x0
35*9880d681SAndroid Build Coastguard Worker// Relocation 13 (zed@GOT) is of type R_386_GOT32 and uses the symbol
36*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x4E         R_386_GOT32      zed 0x0
37*9880d681SAndroid Build Coastguard Worker// Relocation 14 (zed@GOTOFF) is of type R_386_GOTOFF and uses the symbol
38*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x54         R_386_GOTOFF     zed 0x0
39*9880d681SAndroid Build Coastguard Worker// Relocation 15 (zed@INDNTPOFF) is of type R_386_TLS_IE and uses the symbol
40*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x5A         R_386_TLS_IE     zed 0x0
41*9880d681SAndroid Build Coastguard Worker// Relocation 16 (zed@NTPOFF) is of type R_386_TLS_LE and uses the symbol
42*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x60         R_386_TLS_LE     zed 0x0
43*9880d681SAndroid Build Coastguard Worker// Relocation 17 (zed@GOTNTPOFF) is of type R_386_TLS_GOTIE and uses the symbol
44*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x66         R_386_TLS_GOTIE  zed 0x0
45*9880d681SAndroid Build Coastguard Worker// Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol
46*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x6B         R_386_PLT32      zed 0x0
47*9880d681SAndroid Build Coastguard Worker// Relocation 19 (zed@TLSGD) is of type R_386_TLS_GD and uses the symbol
48*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x71         R_386_TLS_GD     zed 0x0
49*9880d681SAndroid Build Coastguard Worker// Relocation 20 (zed@TLSLDM) is of type R_386_TLS_LDM and uses the symbol
50*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x77         R_386_TLS_LDM    zed 0x0
51*9880d681SAndroid Build Coastguard Worker// Relocation 21 (zed@TPOFF) is of type R_386_TLS_LE_32 and uses the symbol
52*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x7D         R_386_TLS_LE_32  zed 0x0
53*9880d681SAndroid Build Coastguard Worker// Relocation 22 (zed@DTPOFF) is of type R_386_TLS_LDO_32 and uses the symbol
54*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x83         R_386_TLS_LDO_32 zed 0x0
55*9880d681SAndroid Build Coastguard Worker// Relocation 23 ($bar) is of type R_386_32 and uses the section
56*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x{{[^ ]+}}  R_386_32         .text 0x0
57*9880d681SAndroid Build Coastguard Worker// Relocation 24 (foo@GOTTPOFF(%edx)) is of type R_386_TLS_IE_32 and uses the
58*9880d681SAndroid Build Coastguard Worker// symbol
59*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x8E         R_386_TLS_IE_32  foo 0x0
60*9880d681SAndroid Build Coastguard Worker// Relocation 25 (_GLOBAL_OFFSET_TABLE_-bar2) is of type R_386_GOTPC.
61*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x94         R_386_GOTPC      _GLOBAL_OFFSET_TABLE_ 0x0
62*9880d681SAndroid Build Coastguard Worker// Relocation 26 (und_symbol-bar2) is of type R_386_PC32
63*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x9A         R_386_PC32       und_symbol 0x0
64*9880d681SAndroid Build Coastguard Worker// Relocation 27 (und_symbol-bar2) is of type R_386_PC16
65*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x9E         R_386_PC16       und_symbol 0x0
66*9880d681SAndroid Build Coastguard Worker// Relocation 28 (und_symbol-bar2) is of type R_386_PC8
67*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xA0         R_386_PC8        und_symbol 0x0
68*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xA3         R_386_GOTOFF     und_symbol 0x0
69*9880d681SAndroid Build Coastguard Worker// Relocation 29 (zed@PLT) is of type R_386_PLT32 and uses the symbol
70*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xA9         R_386_PLT32      zed 0x0
71*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xAF         R_386_PC32       tr_start 0x0
72*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xB3         R_386_16         foo      0x0
73*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0xB5         R_386_8          foo      0x0
74*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   }
75*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: ]
76*9880d681SAndroid Build Coastguard Worker
77*9880d681SAndroid Build Coastguard Worker        .text
78*9880d681SAndroid Build Coastguard Workerbar:
79*9880d681SAndroid Build Coastguard Worker	leal	.Lfoo@GOTOFF(%ebx), %eax
80*9880d681SAndroid Build Coastguard Worker
81*9880d681SAndroid Build Coastguard Worker        .global bar2
82*9880d681SAndroid Build Coastguard Workerbar2:
83*9880d681SAndroid Build Coastguard Worker	calll	bar2@PLT
84*9880d681SAndroid Build Coastguard Worker	addl	$_GLOBAL_OFFSET_TABLE_, %ebx
85*9880d681SAndroid Build Coastguard Worker	movb	bar3@GOTOFF(%ebx), %al
86*9880d681SAndroid Build Coastguard Worker
87*9880d681SAndroid Build Coastguard Worker	.type	bar3,@object
88*9880d681SAndroid Build Coastguard Worker	.local	bar3
89*9880d681SAndroid Build Coastguard Worker	.comm	bar3,1,1
90*9880d681SAndroid Build Coastguard Worker
91*9880d681SAndroid Build Coastguard Worker        movl	bar2j@GOT(%eax), %eax
92*9880d681SAndroid Build Coastguard Worker
93*9880d681SAndroid Build Coastguard Worker        leal foo@TLSGD(, %ebx,1), %eax
94*9880d681SAndroid Build Coastguard Worker        movl $foo@TPOFF, %edx
95*9880d681SAndroid Build Coastguard Worker        movl foo@INDNTPOFF, %ecx
96*9880d681SAndroid Build Coastguard Worker        addl foo@NTPOFF(%eax), %eax
97*9880d681SAndroid Build Coastguard Worker        addl foo@GOTNTPOFF(%ebx), %ecx
98*9880d681SAndroid Build Coastguard Worker        leal foo@TLSLDM(%ebx), %eax
99*9880d681SAndroid Build Coastguard Worker        leal foo@DTPOFF(%eax), %edx
100*9880d681SAndroid Build Coastguard Worker        calll 4096
101*9880d681SAndroid Build Coastguard Worker        movl zed@GOT(%eax), %eax
102*9880d681SAndroid Build Coastguard Worker        movl zed@GOTOFF(%eax), %eax
103*9880d681SAndroid Build Coastguard Worker        movl zed@INDNTPOFF(%eax), %eax
104*9880d681SAndroid Build Coastguard Worker        movl zed@NTPOFF(%eax), %eax
105*9880d681SAndroid Build Coastguard Worker        movl zed@GOTNTPOFF(%eax), %eax
106*9880d681SAndroid Build Coastguard Worker        call zed@PLT
107*9880d681SAndroid Build Coastguard Worker        movl zed@TLSGD(%eax), %eax
108*9880d681SAndroid Build Coastguard Worker        movl zed@TLSLDM(%eax), %eax
109*9880d681SAndroid Build Coastguard Worker        movl zed@TPOFF(%eax), %eax
110*9880d681SAndroid Build Coastguard Worker        movl zed@DTPOFF(%eax), %eax
111*9880d681SAndroid Build Coastguard Worker        pushl $bar
112*9880d681SAndroid Build Coastguard Worker        addl foo@GOTTPOFF(%edx), %eax
113*9880d681SAndroid Build Coastguard Worker        subl    _GLOBAL_OFFSET_TABLE_-bar2, %ebx
114*9880d681SAndroid Build Coastguard Worker        leal und_symbol-bar2(%edx),%ecx
115*9880d681SAndroid Build Coastguard Worker        .word und_symbol-bar2
116*9880d681SAndroid Build Coastguard Worker        .byte und_symbol-bar2
117*9880d681SAndroid Build Coastguard Worker
118*9880d681SAndroid Build Coastguard Worker        leal 1 + und_symbol@GOTOFF, %edi
119*9880d681SAndroid Build Coastguard Worker        movl zed@PLT(%eax), %eax
120*9880d681SAndroid Build Coastguard Worker
121*9880d681SAndroid Build Coastguard Worker        .code64
122*9880d681SAndroid Build Coastguard Worker        jmpq *tr_start(%rip)
123*9880d681SAndroid Build Coastguard Worker
124*9880d681SAndroid Build Coastguard Worker        .word foo
125*9880d681SAndroid Build Coastguard Worker        .byte foo
126*9880d681SAndroid Build Coastguard Worker
127*9880d681SAndroid Build Coastguard Worker        .section        zedsec,"awT",@progbits
128*9880d681SAndroid Build Coastguard Workerzed:
129*9880d681SAndroid Build Coastguard Worker        .long 0
130*9880d681SAndroid Build Coastguard Worker
131*9880d681SAndroid Build Coastguard Worker        .section	.rodata.str1.16,"aMS",@progbits,1
132*9880d681SAndroid Build Coastguard Worker.Lfoo:
133*9880d681SAndroid Build Coastguard Worker	.asciz	 "bool llvm::llvm_start_multithreaded()"
134