parse-eh-frame-x86-anon.yaml
4.74 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
# RUN: ld64.lld -arch i386 -r -print_atoms %s -o %t | FileCheck %s
#
# Test parsing of new __eh_frame (dwarf unwind) section that has no .eh labels
# and no relocations.
#
--- !mach-o
arch: x86
file-type: MH_OBJECT
flags: [ MH_SUBSECTIONS_VIA_SYMBOLS ]
OS: unknown
sections:
- segment: __TEXT
section: __text
type: S_REGULAR
attributes: [ S_ATTR_PURE_INSTRUCTIONS, S_ATTR_SOME_INSTRUCTIONS ]
address: 0x0000000000000000
content: [ 0x55, 0x89, 0xE5, 0x56, 0x83, 0xEC, 0x14, 0xE8,
0x00, 0x00, 0x00, 0x00, 0x5E, 0xC7, 0x04, 0x24,
0x04, 0x00, 0x00, 0x00, 0xE8, 0xE7, 0xFF, 0xFF,
0xFF, 0xC7, 0x00, 0x0A, 0x00, 0x00, 0x00, 0x8B,
0x8E, 0x38, 0x00, 0x00, 0x00, 0x89, 0x4C, 0x24,
0x04, 0x89, 0x04, 0x24, 0xC7, 0x44, 0x24, 0x08,
0x00, 0x00, 0x00, 0x00, 0xE8, 0xC7, 0xFF, 0xFF,
0xFF, 0x55, 0x89, 0xE5, 0x83, 0xEC, 0x08, 0xE8,
0xBC, 0xFF, 0xFF, 0xFF ]
relocations:
- offset: 0x00000040
type: GENERIC_RELOC_VANILLA
length: 2
pc-rel: true
extern: false
symbol: 1
- offset: 0x00000035
type: GENERIC_RELOC_VANILLA
length: 2
pc-rel: true
extern: true
symbol: 4
- offset: 0x00000021
scattered: true
type: GENERIC_RELOC_LOCAL_SECTDIFF
length: 2
pc-rel: false
value: 0x00000044
- offset: 0x00000000
scattered: true
type: GENERIC_RELOC_PAIR
length: 2
pc-rel: false
value: 0x0000000C
- offset: 0x00000015
type: GENERIC_RELOC_VANILLA
length: 2
pc-rel: true
extern: true
symbol: 3
- segment: __IMPORT
section: __pointers
type: S_NON_LAZY_SYMBOL_POINTERS
attributes: [ ]
address: 0x0000000000000044
content: [ 0x00, 0x00, 0x00, 0x00 ]
indirect-syms: [ 5 ]
- segment: __TEXT
section: __eh_frame
type: S_REGULAR
attributes: [ ]
alignment: 2
address: 0x0000000000000048
content: [ 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x01, 0x7A, 0x52, 0x00, 0x01, 0x7C, 0x08, 0x01,
0x10, 0x0C, 0x05, 0x04, 0x88, 0x01, 0x00, 0x00,
0x18, 0x00, 0x00, 0x00, 0x1C, 0x00, 0x00, 0x00,
0x98, 0xFF, 0xFF, 0xFF, 0x39, 0x00, 0x00, 0x00,
0x00, 0x41, 0x0E, 0x08, 0x84, 0x02, 0x42, 0x0D,
0x04, 0x44, 0x86, 0x03, 0x18, 0x00, 0x00, 0x00,
0x38, 0x00, 0x00, 0x00, 0xB5, 0xFF, 0xFF, 0xFF,
0x0B, 0x00, 0x00, 0x00, 0x00, 0x41, 0x0E, 0x08,
0x84, 0x02, 0x42, 0x0D, 0x04, 0x00, 0x00, 0x00 ]
global-symbols:
- name: __Z3barv
type: N_SECT
scope: [ N_EXT ]
sect: 1
value: 0x0000000000000039
- name: __Z3foov
type: N_SECT
scope: [ N_EXT ]
sect: 1
value: 0x0000000000000000
undefined-symbols:
- name: __ZTIi
type: N_UNDF
scope: [ N_EXT ]
value: 0x0000000000000000
- name: ___cxa_allocate_exception
type: N_UNDF
scope: [ N_EXT ]
value: 0x0000000000000000
- name: ___cxa_throw
type: N_UNDF
scope: [ N_EXT ]
value: 0x0000000000000000
...
# CHECK: defined-atoms:
# CHECK: - ref-name: [[CIE:L[L0-9]+]]
# CHECK: type: unwind-cfi
# CHECK: content:
# CHECK: - type: unwind-cfi
# CHECK: content:
# CHECK: references:
# CHECK: - kind: negDelta32
# CHECK: offset: 4
# CHECK: target: [[CIE]]
# CHECK: - kind: delta32
# CHECK: offset: 8
# CHECK: target: __Z3foov
# CHECK: - type: unwind-cfi
# CHECK: content:
# CHECK: references:
# CHECK: - kind: negDelta32
# CHECK: offset: 4
# CHECK: target: [[CIE]]
# CHECK: - kind: delta32
# CHECK: offset: 8
# CHECK: target: __Z3barv