• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# RUN: yaml2obj %s -o %t
2# RUN: llvm-objcopy -R .text4 -O binary %t %t2
3# RUN: od -Ax -v -t x1 %t2 | FileCheck %s
4# RUN: wc -c %t2 | FileCheck %s -check-prefix=SIZE
5
6!ELF
7FileHeader:
8  Class:           ELFCLASS64
9  Data:            ELFDATA2LSB
10  Type:            ET_EXEC
11  Machine:         EM_X86_64
12Sections:
13  - Name:            .text
14    Type:            SHT_PROGBITS
15    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
16    Address:         0x1000
17    AddressAlign:    0x1000
18    Content:         "c3c3c3c3"
19    Size:            0x1000
20  - Name:            .text2
21    Type:            SHT_PROGBITS
22    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
23    Address:         0x2000
24    AddressAlign:    0x1000
25    Content:         "DEADBEEF"
26    Size:            0x1000
27  - Name:            .text3
28    Type:            SHT_PROGBITS
29    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
30    Address:         0x3000
31    AddressAlign:    0x1000
32    Content:         "32323232"
33    Size:            0x1000
34  - Name:            .text4
35    Type:            SHT_PROGBITS
36    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
37    Address:         0x4000
38    AddressAlign:    0x1000
39    Content:         "FFFFFFFF"
40    Size:            0x1000
41ProgramHeaders:
42  - Type: PT_LOAD
43    Flags: [ PF_R ]
44    VAddr: 0x1000
45    PAddr: 0x1000
46    Sections:
47      - Section: .text
48      - Section: .text2
49  - Type: PT_LOAD
50    Flags: [ PF_R ]
51    VAddr: 0x3000
52    PAddr: 0x3000
53    Sections:
54      - Section: .text3
55      - Section: .text4
56
57# CHECK: 000000 c3 c3 c3 c3
58# CHECK: 001000 de ad be ef
59# CHECK: 002000 32 32 32 32
60
61# SIZE: 12288
62