| // REQUIRES: x86 |
| // RUN: llvm-mc -filetype=obj -triple=x86_64-unknown-linux %s -o %t.o |
| // RUN: llvm-mc -filetype=obj -triple=x86_64-unknown-linux %p/Inputs/undef-with-plt-addr.s -o %t2.o |
| // RUN: ld.lld %t2.o -o %t2.so -shared |
| // RUN: ld.lld %t.o %t2.so -o %t3 |
| // RUN: llvm-readobj -t -s -r %t3 | FileCheck %s |
| |
| // Test that -z nocopyreloc doesn't prevent the plt hack. |
| // RUN: ld.lld %t.o %t2.so -o %t3 -z nocopyreloc |
| |
| .globl _start |
| _start: |
| movabsq $set_data, %rax |
| |
| .data |
| .quad foo |
| // Test that set_data has an address in the .plt, but foo is not |
| |
| // CHECK: Name: .plt |
| // CHECK-NEXT: Type: SHT_PROGBITS |
| // CHECK-NEXT: Flags [ |
| // CHECK-NEXT: SHF_ALLOC |
| // CHECK-NEXT: SHF_EXECINSTR |
| // CHECK-NEXT: ] |
| // CHECK-NEXT: Address: 0x201010 |
| |
| // CHECK: Section ({{.*}}) .rela.dyn { |
| // CHECK-NEXT: 0x202000 R_X86_64_64 foo 0x0 |
| // CHECK-NEXT: } |
| // CHECK-NEXT: Section ({{.*}}) .rela.plt { |
| // CHECK-NEXT: 0x202020 R_X86_64_JUMP_SLOT set_data 0x0 |
| // CHECK-NEXT: } |
| |
| // CHECK: Name: foo |
| // CHECK-NEXT: Value: 0x0 |
| // CHECK-NEXT: Size: 0 |
| // CHECK-NEXT: Binding: Global |
| // CHECK-NEXT: Type: Function |
| // CHECK-NEXT: Other: 0 |
| // CHECK-NEXT: Section: Undefined |
| |
| // CHECK: Name: set_data |
| // CHECK-NEXT: Value: 0x201020 |
| // CHECK-NEXT: Size: 0 |
| // CHECK-NEXT: Binding: Global |
| // CHECK-NEXT: Type: Function |
| // CHECK-NEXT: Other: 0 |
| // CHECK-NEXT: Section: Undefined |