Mercurial > hg > CbC > CbC_llvm
view lld/test/ELF/fill-trap-ppc.s @ 192:d7606dcf6fce
Added tag llvm10 for changeset 0572611fdcc8
author | Shinji KONO <kono@ie.u-ryukyu.ac.jp> |
---|---|
date | Mon, 14 Dec 2020 18:01:34 +0900 |
parents | 1d019706d866 |
children | c4bab56944e8 |
line wrap: on
line source
# REQUIRES: ppc # RUN: llvm-mc -filetype=obj -triple=powerpc64le-linux %s -o %t.o # RUN: ld.lld %t.o -z separate-code -o %t.ppc64le # RUN: llvm-readobj -l %t.ppc64le | FileCheck %s # RUN: od -Ax -t x1 -N16 -j0x10ff0 %t.ppc64le | FileCheck %s -check-prefix=LE # RUN: llvm-mc -filetype=obj -triple=powerpc64-linux %s -o %t.o # RUN: ld.lld %t.o -z separate-code -o %t.ppc64 # RUN: llvm-readobj -l %t.ppc64 | FileCheck %s # RUN: od -Ax -t x1 -N16 -j0x10ff0 %t.ppc64 | FileCheck %s -check-prefix=BE # CHECK: ProgramHeader { # CHECK: Type: PT_LOAD # CHECK: Offset: 0x10000{{$}} # CHECK-NEXT: VirtualAddress: # CHECK-NEXT: PhysicalAddress: # CHECK-NEXT: FileSize: 4096 # CHECK-NEXT: MemSize: # CHECK-NEXT: Flags [ # CHECK-NEXT: PF_R # CHECK-NEXT: PF_X # CHECK-NEXT: ] ## Check that executable page is filled with traps at its end. # LE: 010ff0 08 00 e0 7f 08 00 e0 7f 08 00 e0 7f 08 00 e0 7f # BE: 010ff0 7f e0 00 08 7f e0 00 08 7f e0 00 08 7f e0 00 08 .globl _start _start: nop