1*9880d681SAndroid Build Coastguard Worker#Source : 2*9880d681SAndroid Build Coastguard Worker#__thread int a = 1; 3*9880d681SAndroid Build Coastguard Worker#__thread int b; 4*9880d681SAndroid Build Coastguard Worker# 5*9880d681SAndroid Build Coastguard Worker#int main () { 6*9880d681SAndroid Build Coastguard Worker# b = 2; 7*9880d681SAndroid Build Coastguard Worker# throw (a + b) ; 8*9880d681SAndroid Build Coastguard Worker# return 0; 9*9880d681SAndroid Build Coastguard Worker#} 10*9880d681SAndroid Build Coastguard Worker# compiled as clang++ source.cpp 11*9880d681SAndroid Build Coastguard Worker# and clang++ -m32 source.cpp 12*9880d681SAndroid Build Coastguard Worker 13*9880d681SAndroid Build Coastguard WorkerRUN: llvm-readobj -program-headers %p/Inputs/phdrs-elf.exe-i386 --elf-output-style=GNU \ 14*9880d681SAndroid Build Coastguard WorkerRUN: | FileCheck %s -check-prefix ELF32 15*9880d681SAndroid Build Coastguard WorkerRUN: llvm-readobj -program-headers %p/Inputs/phdrs-elf.exe-x86_64 \ 16*9880d681SAndroid Build Coastguard WorkerRUN: --elf-output-style=GNU | FileCheck %s -check-prefix ELF64 17*9880d681SAndroid Build Coastguard Worker 18*9880d681SAndroid Build Coastguard WorkerELF32: Elf file type is EXEC (Executable file) 19*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: Entry point 0x8048460 20*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: There are 10 program headers, starting at offset 52 21*9880d681SAndroid Build Coastguard Worker 22*9880d681SAndroid Build Coastguard WorkerELF32: Program Headers: 23*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align 24*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: PHDR 0x000034 0x08048034 0x08048034 0x00140 0x00140 R E 0x4 25*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: INTERP 0x000174 0x08048174 0x08048174 0x00013 0x00013 R 0x1 26*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: [Requesting program interpreter: /lib/ld-linux.so.2] 27*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: LOAD 0x000000 0x08048000 0x08048000 0x006d0 0x006d0 R E 0x1000 28*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: LOAD 0x000ef0 0x08049ef0 0x08049ef0 0x00128 0x00140 RW 0x1000 29*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: DYNAMIC 0x000f08 0x08049f08 0x08049f08 0x000e8 0x000e8 RW 0x4 30*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: NOTE 0x000188 0x08048188 0x08048188 0x00044 0x00044 R 0x4 31*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: TLS 0x000ef0 0x08049ef0 0x08049ef0 0x00004 0x00008 R 0x4 32*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: GNU_EH_FRAME 0x000640 0x08048640 0x08048640 0x0001c 0x0001c R 0x4 33*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: GNU_STACK 0x000000 0x00000000 0x00000000 0x00000 0x00000 RW 0x4 34*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: GNU_RELRO 0x000ef0 0x08049ef0 0x08049ef0 0x00110 0x00110 R 0x1 35*9880d681SAndroid Build Coastguard Worker 36*9880d681SAndroid Build Coastguard WorkerELF32: Section to Segment mapping: 37*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: Segment Sections... 38*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 00 39*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 01 .interp 40*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 02 .interp .note.ABI-tag .note.gnu.build-id .hash .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.dyn .rel.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame 41*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 03 .tdata .ctors .dtors .jcr .dynamic .got .got.plt .data .bss 42*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 04 .dynamic 43*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 05 .note.ABI-tag .note.gnu.build-id 44*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 06 .tdata .tbss 45*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 07 .eh_frame_hdr 46*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 08 47*9880d681SAndroid Build Coastguard WorkerELF32-NEXT: 09 .tdata .ctors .dtors .jcr .dynamic .got 48*9880d681SAndroid Build Coastguard Worker 49*9880d681SAndroid Build Coastguard WorkerELF64: Elf file type is EXEC (Executable file) 50*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: Entry point 0x400610 51*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: There are 10 program headers, starting at offset 64 52*9880d681SAndroid Build Coastguard Worker 53*9880d681SAndroid Build Coastguard WorkerELF64: Program Headers: 54*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align 55*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: PHDR 0x000040 0x0000000000400040 0x0000000000400040 0x000230 0x000230 R E 0x8 56*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: INTERP 0x000270 0x0000000000400270 0x0000000000400270 0x00001c 0x00001c R 0x1 57*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: [Requesting program interpreter: /lib64/ld-linux-x86-64.so.2] 58*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: LOAD 0x000000 0x0000000000400000 0x0000000000400000 0x000924 0x000924 R E 0x200000 59*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: LOAD 0x000db4 0x0000000000600db4 0x0000000000600db4 0x000274 0x0002a4 RW 0x200000 60*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: DYNAMIC 0x000dd0 0x0000000000600dd0 0x0000000000600dd0 0x000210 0x000210 RW 0x8 61*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: NOTE 0x00028c 0x000000000040028c 0x000000000040028c 0x000044 0x000044 R 0x4 62*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: TLS 0x000db4 0x0000000000600db4 0x0000000000600db4 0x000004 0x000008 R 0x4 63*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: GNU_EH_FRAME 0x00083c 0x000000000040083c 0x000000000040083c 0x00002c 0x00002c R 0x4 64*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: GNU_STACK 0x000000 0x0000000000000000 0x0000000000000000 0x000000 0x000000 RW 0x8 65*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: GNU_RELRO 0x000db4 0x0000000000600db4 0x0000000000600db4 0x00024c 0x00024c R 0x1 66*9880d681SAndroid Build Coastguard Worker 67*9880d681SAndroid Build Coastguard WorkerELF64: Section to Segment mapping: 68*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: Segment Sections... 69*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 00 70*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 01 .interp 71*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 02 .interp .note.ABI-tag .note.gnu.build-id .hash .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rela.dyn .rela.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame 72*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 03 .tdata .init_array .fini_array .jcr .dynamic .got .got.plt .data .bss 73*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 04 .dynamic 74*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 05 .note.ABI-tag .note.gnu.build-id 75*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 06 .tdata .tbss 76*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 07 .eh_frame_hdr 77*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 08 78*9880d681SAndroid Build Coastguard WorkerELF64-NEXT: 09 .tdata .init_array .fini_array .jcr .dynamic .got 79