Run DCE after a LoopFlatten test to reduce spurious output [nfc]
[llvm-project.git] / llvm / test / MC / ELF / relocation-386.s
blobdd252f5ff74cb272a4f2d76649c8a3b62ce55c1c
1 // RUN: llvm-mc -filetype=obj -triple i386-pc-linux-gnu %s -relax-relocations=false -o - | llvm-readobj -r - | FileCheck %s --check-prefix=CHECK --check-prefix=I386
2 // RUN: llvm-mc -filetype=obj -triple i386-pc-elfiamcu %s -relax-relocations=false -o - | llvm-readobj -r - | FileCheck %s --check-prefix=CHECK --check-prefix=IAMCU
3 // RUN: not llvm-mc -filetype=obj -triple=i686 --defsym ERR=1 %s -o /dev/null 2>&1 | FileCheck %s --check-prefix=ERR --implicit-check-not=error:
5 // Test that we produce the correct relocation types and that the relocations
6 // correctly point to the section or the symbol.
8 // IAMCU: Format: elf32-iamcu
9 // I386: Format: elf32-i386
10 // CHECK: Relocations [
11 // CHECK-NEXT: Section {{.*}} .rel.text {
12 /// Do not use STT_SECTION symbol for R_386_GOTOFF to work around a gold<2.34 bug
13 /// https://sourceware.org/bugzilla/show_bug.cgi?id=16794
14 // I386-NEXT: 0x2 R_386_GOTOFF .Lfoo
15 // IAMCU-NEXT: 0x2 R_386_GOTOFF .rodata.str1.1
16 // CHECK-NEXT: 0x{{[^ ]+}} R_386_PLT32 bar2
17 // CHECK-NEXT: 0x{{[^ ]+}} R_386_GOTPC _GLOBAL_OFFSET_TABLE_
18 // Relocation 3 (bar3@GOTOFF) is done with symbol 7 (bss)
19 // CHECK-NEXT: 0x{{[^ ]+}} R_386_GOTOFF .bss
20 // Relocation 4 (bar2@GOT) is of type R_386_GOT32
21 // CHECK-NEXT: 0x{{[^ ]+}} R_386_GOT32 bar2j
23 // Relocation 5 (foo@TLSGD) is of type R_386_TLS_GD
24 // CHECK-NEXT: 0x20 R_386_TLS_GD foo
25 // Relocation 6 ($foo@TPOFF) is of type R_386_TLS_LE_32
26 // CHECK-NEXT: 0x25 R_386_TLS_LE_32 foo
27 // Relocation 7 (foo@INDNTPOFF) is of type R_386_TLS_IE
28 // CHECK-NEXT: 0x2B R_386_TLS_IE foo
29 // Relocation 8 (foo@NTPOFF) is of type R_386_TLS_LE
30 // CHECK-NEXT: 0x31 R_386_TLS_LE foo
31 // Relocation 9 (foo@GOTNTPOFF) is of type R_386_TLS_GOTIE
32 // CHECK-NEXT: 0x37 R_386_TLS_GOTIE foo
33 // Relocation 10 (foo@TLSLDM) is of type R_386_TLS_LDM
34 // CHECK-NEXT: 0x3D R_386_TLS_LDM foo
35 // Relocation 11 (foo@DTPOFF) is of type R_386_TLS_LDO_32
36 // CHECK-NEXT: 0x43 R_386_TLS_LDO_32 foo
37 // Relocation 12 (calll 4096) is of type R_386_PC32
38 // CHECK-NEXT: 0x48 R_386_PC32 -
39 // Relocation 13 (zed@GOT) is of type R_386_GOT32 and uses the symbol
40 // CHECK-NEXT: 0x4E R_386_GOT32 zed
41 // Relocation 14 (zed@GOTOFF) is of type R_386_GOTOFF and uses the symbol
42 // CHECK-NEXT: 0x54 R_386_GOTOFF zed
43 // Relocation 15 (zed@INDNTPOFF) is of type R_386_TLS_IE and uses the symbol
44 // CHECK-NEXT: 0x5A R_386_TLS_IE zed
45 // Relocation 16 (zed@NTPOFF) is of type R_386_TLS_LE and uses the symbol
46 // CHECK-NEXT: 0x60 R_386_TLS_LE zed
47 // Relocation 17 (zed@GOTNTPOFF) is of type R_386_TLS_GOTIE and uses the symbol
48 // CHECK-NEXT: 0x66 R_386_TLS_GOTIE zed
49 // Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol
50 // CHECK-NEXT: 0x6B R_386_PLT32 zed
51 // Relocation 19 (zed@TLSGD) is of type R_386_TLS_GD and uses the symbol
52 // CHECK-NEXT: 0x71 R_386_TLS_GD zed
53 // Relocation 20 (zed@TLSLDM) is of type R_386_TLS_LDM and uses the symbol
54 // CHECK-NEXT: 0x77 R_386_TLS_LDM zed
55 // Relocation 21 (zed@TPOFF) is of type R_386_TLS_LE_32 and uses the symbol
56 // CHECK-NEXT: 0x7D R_386_TLS_LE_32 zed
57 // Relocation 22 (zed@DTPOFF) is of type R_386_TLS_LDO_32 and uses the symbol
58 // CHECK-NEXT: 0x83 R_386_TLS_LDO_32 zed
59 // Relocation 23 ($bar) is of type R_386_32 and uses the section
60 // CHECK-NEXT: 0x{{[^ ]+}} R_386_32 .text
61 // Relocation 24 (foo@GOTTPOFF(%edx)) is of type R_386_TLS_IE_32 and uses the
62 // symbol
63 // CHECK-NEXT: 0x8E R_386_TLS_IE_32 foo
64 // Relocation 25 (_GLOBAL_OFFSET_TABLE_-bar2) is of type R_386_GOTPC.
65 // CHECK-NEXT: 0x94 R_386_GOTPC _GLOBAL_OFFSET_TABLE_
66 // Relocation 26 (und_symbol-bar2) is of type R_386_PC32
67 // CHECK-NEXT: 0x9A R_386_PC32 und_symbol
68 // Relocation 27 (und_symbol-bar2) is of type R_386_PC16
69 // CHECK-NEXT: 0x9E R_386_PC16 und_symbol
70 // Relocation 28 (und_symbol-bar2) is of type R_386_PC8
71 // CHECK-NEXT: 0xA0 R_386_PC8 und_symbol
72 // CHECK-NEXT: 0xA3 R_386_GOTOFF und_symbol
73 // Relocation 29 (zed@PLT) is of type R_386_PLT32 and uses the symbol
74 // CHECK-NEXT: 0xA9 R_386_PLT32 zed
75 // CHECK-NEXT: 0xAF R_386_PC32 tr_start
76 // CHECK-NEXT: 0xB3 R_386_16 foo
77 // CHECK-NEXT: 0xB5 R_386_8 foo
78 // CHECK-NEXT: }
79 // CHECK-NEXT: ]
81 .text
82 bar:
83 leal .Lfoo@GOTOFF(%ebx), %eax
85 .global bar2
86 bar2:
87 calll bar2@PLT
88 addl $_GLOBAL_OFFSET_TABLE_, %ebx
89 movb bar3@GOTOFF(%ebx), %al
91 .type bar3,@object
92 .local bar3
93 .comm bar3,1,1
95 movl bar2j@GOT(%eax), %eax
97 leal foo@TLSGD(, %ebx,1), %eax
98 movl $foo@TPOFF, %edx
99 movl foo@INDNTPOFF, %ecx
100 addl foo@NTPOFF(%eax), %eax
101 addl foo@GOTNTPOFF(%ebx), %ecx
102 leal foo@TLSLDM(%ebx), %eax
103 leal foo@DTPOFF(%eax), %edx
104 calll 4096
105 movl zed@GOT(%eax), %eax
106 movl zed@GOTOFF(%eax), %eax
107 movl zed@INDNTPOFF(%eax), %eax
108 movl zed@NTPOFF(%eax), %eax
109 movl zed@GOTNTPOFF(%eax), %eax
110 call zed@PLT
111 movl zed@TLSGD(%eax), %eax
112 movl zed@TLSLDM(%eax), %eax
113 movl zed@TPOFF(%eax), %eax
114 movl zed@DTPOFF(%eax), %eax
115 pushl $bar
116 addl foo@GOTTPOFF(%edx), %eax
117 subl _GLOBAL_OFFSET_TABLE_-bar2, %ebx
118 leal und_symbol-bar2(%edx),%ecx
119 .word und_symbol-bar2
120 .byte und_symbol-bar2
122 leal 1 + und_symbol@GOTOFF, %edi
123 movl zed@PLT(%eax), %eax
125 .code64
126 jmpq *tr_start(%rip)
128 .word foo
129 .byte foo
131 .ifdef ERR
132 // ERR: [[#@LINE+1]]:7: error: unsupported relocation type
133 .quad foo@GOT
134 // ERR: [[#@LINE+1]]:8: error: unsupported relocation type
135 .short foo@GOTOFF
136 // ERR: [[#@LINE+1]]:7: error: unsupported relocation type
137 .dc.w foo@TPOFF
138 // ERR: [[#@LINE+1]]:7: error: unsupported relocation type
139 .dc.w foo@INDNTPOFF
140 // ERR: [[#@LINE+1]]:7: error: unsupported relocation type
141 .dc.w foo@NTPOFF
142 .endif
144 .section zedsec,"awT",@progbits
145 zed:
146 .long 0
148 .section .rodata.str1.16,"aMS",@progbits,1
149 .Lfoo:
150 .asciz "bool llvm::llvm_start_multithreaded()"