xref: /aosp_15_r20/external/llvm/test/tools/llvm-readobj/gnu-phdrs.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker#Source :
2*9880d681SAndroid Build Coastguard Worker#__thread int a = 1;
3*9880d681SAndroid Build Coastguard Worker#__thread int b;
4*9880d681SAndroid Build Coastguard Worker#
5*9880d681SAndroid Build Coastguard Worker#int main () {
6*9880d681SAndroid Build Coastguard Worker#  b = 2;
7*9880d681SAndroid Build Coastguard Worker#  throw (a + b) ;
8*9880d681SAndroid Build Coastguard Worker#  return 0;
9*9880d681SAndroid Build Coastguard Worker#}
10*9880d681SAndroid Build Coastguard Worker# compiled as clang++ source.cpp
11*9880d681SAndroid Build Coastguard Worker# and  clang++ -m32 source.cpp
12*9880d681SAndroid Build Coastguard Worker
13*9880d681SAndroid Build Coastguard WorkerRUN: llvm-readobj -program-headers %p/Inputs/phdrs-elf.exe-i386 --elf-output-style=GNU \
14*9880d681SAndroid Build Coastguard WorkerRUN:   | FileCheck %s -check-prefix ELF32
15*9880d681SAndroid Build Coastguard WorkerRUN: llvm-readobj -program-headers %p/Inputs/phdrs-elf.exe-x86_64 \
16*9880d681SAndroid Build Coastguard WorkerRUN:  --elf-output-style=GNU | FileCheck %s -check-prefix ELF64
17*9880d681SAndroid Build Coastguard Worker
18*9880d681SAndroid Build Coastguard WorkerELF32: Elf file type is EXEC (Executable file)
19*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: Entry point 0x8048460
20*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: There are 10 program headers, starting at offset 52
21*9880d681SAndroid Build Coastguard Worker
22*9880d681SAndroid Build Coastguard WorkerELF32: Program Headers:
23*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
24*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   PHDR           0x000034 0x08048034 0x08048034 0x00140 0x00140 R E 0x4
25*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   INTERP         0x000174 0x08048174 0x08048174 0x00013 0x00013 R   0x1
26*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:       [Requesting program interpreter: /lib/ld-linux.so.2]
27*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   LOAD           0x000000 0x08048000 0x08048000 0x006d0 0x006d0 R E 0x1000
28*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   LOAD           0x000ef0 0x08049ef0 0x08049ef0 0x00128 0x00140 RW  0x1000
29*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   DYNAMIC        0x000f08 0x08049f08 0x08049f08 0x000e8 0x000e8 RW  0x4
30*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   NOTE           0x000188 0x08048188 0x08048188 0x00044 0x00044 R   0x4
31*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   TLS            0x000ef0 0x08049ef0 0x08049ef0 0x00004 0x00008 R   0x4
32*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   GNU_EH_FRAME   0x000640 0x08048640 0x08048640 0x0001c 0x0001c R   0x4
33*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   GNU_STACK      0x000000 0x00000000 0x00000000 0x00000 0x00000 RW  0x4
34*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   GNU_RELRO      0x000ef0 0x08049ef0 0x08049ef0 0x00110 0x00110 R   0x1
35*9880d681SAndroid Build Coastguard Worker
36*9880d681SAndroid Build Coastguard WorkerELF32:  Section to Segment mapping:
37*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:   Segment Sections...
38*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    00
39*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    01     .interp
40*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    02     .interp .note.ABI-tag .note.gnu.build-id .hash .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.dyn .rel.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame
41*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    03     .tdata .ctors .dtors .jcr .dynamic .got .got.plt .data .bss
42*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    04     .dynamic
43*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    05     .note.ABI-tag .note.gnu.build-id
44*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    06     .tdata .tbss
45*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    07     .eh_frame_hdr
46*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    08
47*9880d681SAndroid Build Coastguard WorkerELF32-NEXT:    09     .tdata .ctors .dtors .jcr .dynamic .got
48*9880d681SAndroid Build Coastguard Worker
49*9880d681SAndroid Build Coastguard WorkerELF64: Elf file type is EXEC (Executable file)
50*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: Entry point 0x400610
51*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: There are 10 program headers, starting at offset 64
52*9880d681SAndroid Build Coastguard Worker
53*9880d681SAndroid Build Coastguard WorkerELF64: Program Headers:
54*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   Type           Offset   VirtAddr           PhysAddr           FileSiz  MemSiz   Flg Align
55*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   PHDR           0x000040 0x0000000000400040 0x0000000000400040 0x000230 0x000230 R E 0x8
56*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   INTERP         0x000270 0x0000000000400270 0x0000000000400270 0x00001c 0x00001c R   0x1
57*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:       [Requesting program interpreter: /lib64/ld-linux-x86-64.so.2]
58*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   LOAD           0x000000 0x0000000000400000 0x0000000000400000 0x000924 0x000924 R E 0x200000
59*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   LOAD           0x000db4 0x0000000000600db4 0x0000000000600db4 0x000274 0x0002a4 RW  0x200000
60*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   DYNAMIC        0x000dd0 0x0000000000600dd0 0x0000000000600dd0 0x000210 0x000210 RW  0x8
61*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   NOTE           0x00028c 0x000000000040028c 0x000000000040028c 0x000044 0x000044 R   0x4
62*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   TLS            0x000db4 0x0000000000600db4 0x0000000000600db4 0x000004 0x000008 R   0x4
63*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   GNU_EH_FRAME   0x00083c 0x000000000040083c 0x000000000040083c 0x00002c 0x00002c R   0x4
64*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   GNU_STACK      0x000000 0x0000000000000000 0x0000000000000000 0x000000 0x000000 RW  0x8
65*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   GNU_RELRO      0x000db4 0x0000000000600db4 0x0000000000600db4 0x00024c 0x00024c R   0x1
66*9880d681SAndroid Build Coastguard Worker
67*9880d681SAndroid Build Coastguard WorkerELF64:  Section to Segment mapping:
68*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:   Segment Sections...
69*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    00
70*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    01     .interp
71*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    02     .interp .note.ABI-tag .note.gnu.build-id .hash .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rela.dyn .rela.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame
72*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    03     .tdata .init_array .fini_array .jcr .dynamic .got .got.plt .data .bss
73*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    04     .dynamic
74*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    05     .note.ABI-tag .note.gnu.build-id
75*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    06     .tdata .tbss
76*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    07     .eh_frame_hdr
77*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    08
78*9880d681SAndroid Build Coastguard WorkerELF64-NEXT:    09     .tdata .init_array .fini_array .jcr .dynamic .got
79