| ## Check that llvm-objdump reports an error when |
| ## .shstrtab has an invalid type. |
| |
| # RUN: yaml2obj %s --docnum=1 -o %t1 |
| # RUN: not llvm-objdump -s %t1 2>&1 | FileCheck %s -DFILE=%t1 --check-prefix=INVALID-SHTYPE |
| |
| # INVALID-SHTYPE: error: '[[FILE]]': invalid sh_type for string table section [index 1]: expected SHT_STRTAB, but got SHT_PROGBITS |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .shstrtab |
| Type: SHT_PROGBITS |
| |
| ## Check that llvm-objdump reports an error when |
| ## .shstrtab has an invalid zero-size. |
| |
| # RUN: yaml2obj %s --docnum=2 -o %t2 |
| # RUN: not llvm-objdump -s %t2 2>&1 | FileCheck %s -DFILE=%t2 --check-prefix=STRTAB-EMPTY |
| |
| # STRTAB-EMPTY: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .shstrtab |
| Type: SHT_STRTAB |
| Size: 0 |
| |
| ## Check that llvm-objdump reports an error when .shstrtab has an invalid |
| ## size that goes past the end of the file. |
| |
| # RUN: not llvm-objdump -s %p/Inputs/invalid-strtab-size.elf 2>&1 \ |
| # RUN: | FileCheck %s -DFILE=%p/Inputs/invalid-strtab-size.elf --check-prefix=INVALID-STRTAB-SIZE |
| |
| # INVALID-STRTAB-SIZE: error: '[[FILE]]': section [index 1] has a sh_offset (0x70) + sh_size (0xffffff) that is greater than the file size (0x218) |
| |
| ## Document that llvm-dwarfdump doesn't reports errors/warnings during relocation resolution |
| ## when instead of SHT_RELA section we have a SHT_REL section in an object. |
| ## In this case it just doesn't try to read relocation addends and assumes they are 0. |
| |
| ## Note: we don't check the output, because the intention of this test is just to check the |
| ## exit code and to document the fact that no warnings are reported. |
| # RUN: yaml2obj %s --docnum=3 -o %t3 |
| # RUN: llvm-dwarfdump -debug-line %t3 2>&1 | FileCheck --implicit-check-not=warning: %s |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .debug_line |
| Type: SHT_PROGBITS |
| ## The exact content does not matter here. We can use any minimal valid debug section |
| ## which is a target for relocation. The idea is to trigger the code that reads the |
| ## relocation's addend during relocation resolution. It should fail if called on |
| ## a non-SHT_RELA section. |
| Content: 380000000200210000000101FB0E0D00010101010000000100000100676C6F62616C2E63707000000000000009020000000000000000130237000101 |
| - Name: .rela.debug_line |
| Type: SHT_REL |
| Info: .debug_line |
| Relocations: |
| - Offset: 0x000000000000002E |
| Type: R_X86_64_64 |
| |
| ## Check that llvm-objdump reports an error when it tries to dump section names |
| ## and .shstrtab is not null-terminated. |
| |
| # RUN: yaml2obj %s --docnum=4 -o %t4 |
| # RUN: not llvm-objdump -s %t4 2>&1 | FileCheck -DFILE=%t4 --check-prefix=SHSTRTAB-NON-TERM %s |
| |
| # SHSTRTAB-NON-TERM: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is non-null terminated |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .shstrtab |
| Type: SHT_STRTAB |
| Content: "11" |
| |
| ## Check that llvm-objdump reports an error when it tries to dump a symbol name and |
| ## .strtab is not null-terminated. |
| |
| # RUN: yaml2obj %s --docnum=5 -o %t5 |
| # RUN: not llvm-objdump --syms %t5 2>&1 | FileCheck --check-prefix=NONULL %s |
| |
| # NONULL: error: {{.*}}: SHT_STRTAB string table section [index 1] is non-null terminated |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .strtab |
| Type: SHT_STRTAB |
| Content: "11" |
| Symbols: |
| - Name: foo |
| |
| ## Check that llvm-readobj reports an error if .symtab has an invalid sh_entsize. |
| |
| # RUN: yaml2obj %s --docnum=6 -o %t6 |
| # RUN: llvm-readobj --symbols %t6 2>&1 | FileCheck -DFILE=%t6 --check-prefix=INVALID-SYM-SIZE %s |
| |
| # INVALID-SYM-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has invalid sh_entsize: expected 24, but got 32 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .symtab |
| Type: SHT_SYMTAB |
| EntSize: 32 |
| Symbols: |
| - Name: foo |
| |
| ## Check that llvm-readobj reports a warning if .dynsym has an invalid sh_entsize. |
| |
| # RUN: yaml2obj %s --docnum=7 -o %t7 |
| # RUN: llvm-readobj --dyn-symbols %t7 2>&1 | FileCheck -DFILE=%t7 --check-prefix=INVALID-DYNSYM-SIZE %s |
| |
| # INVALID-DYNSYM-SIZE: warning: '[[FILE]]': SHT_DYNSYM section with index 1 has invalid size (0x30) or entry size (0x20) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .dynsym |
| Type: SHT_DYNSYM |
| EntSize: 32 |
| DynamicSymbols: |
| - Name: foo |
| |
| ## Check that llvm-readobj reports a warning if .symtab has an invalid sh_link value, |
| ## which is greater than number of sections. |
| |
| # RUN: yaml2obj %s --docnum=8 -o %t8 |
| # RUN: llvm-readobj --symbols %t8 2>&1 | FileCheck -DFILE=%t8 --check-prefix=INVALID-SYMTAB-LINK %s |
| |
| # INVALID-SYMTAB-LINK: warning: '[[FILE]]': unable to get the string table for the SHT_SYMTAB section: invalid section index: 255 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .symtab |
| Type: SHT_SYMTAB |
| Link: 0xFF |
| |
| ## Check that llvm-readobj reports an error when trying to dump sections |
| ## when the e_shentsize field is broken. |
| |
| # RUN: yaml2obj %s --docnum=9 -o %t9 |
| # RUN: not llvm-readobj -S %t9 2>&1 | \ |
| # RUN: FileCheck -DFILE=%t9 --implicit-check-not=warning: --check-prefix=INVALID-SH-ENTSIZE %s |
| |
| # INVALID-SH-ENTSIZE: LoadName: <Not found> |
| # INVALID-SH-ENTSIZE-NEXT: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid e_shentsize in ELF header: 1 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShEntSize: 1 |
| |
| ## Check that llvm-readobj reports a warning if .symtab has sh_size |
| ## that is not a multiple of sh_entsize. |
| |
| # RUN: yaml2obj %s --docnum=10 -o %t10 |
| # RUN: llvm-readobj --symbols %t10 2>&1 | FileCheck -DFILE=%t10 --check-prefix=INVALID-SYMTAB-SIZE %s |
| |
| # INVALID-SYMTAB-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has an invalid sh_size (1) which is not a multiple of its sh_entsize (24) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .symtab |
| Type: SHT_SYMTAB |
| Size: 1 |
| |
| ## Test that llvm-readobj reports an error if SHT_SYMTAB_SHNDX section has |
| ## invalid sh_size which should be: |
| ## sizeof(.symtab_shndx) = (sizeof(.symtab) / entsize(.symtab)) * entsize(.symtab_shndx) |
| |
| # RUN: yaml2obj %s --docnum=11 -o %t11 |
| # RUN: llvm-readobj --symbols %t11 2>&1 | FileCheck --check-prefix=INVALID-XINDEX-SIZE %s |
| |
| # INVALID-XINDEX-SIZE: warning: {{.*}}: SHT_SYMTAB_SHNDX has 2 entries, but the symbol table associated has 1 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .symtab_shndx |
| Type: SHT_SYMTAB_SHNDX |
| Entries: [ 0, 1 ] |
| Link: .symtab |
| Symbols: [] |
| |
| ## Check that llvm-readobj reports a warning when the e_phentsize field is broken. |
| |
| # RUN: llvm-readobj --program-headers %p/Inputs/invalid-e_shnum.elf 2>&1 | \ |
| # RUN: FileCheck -DFILE=%p/Inputs/invalid-e_shnum.elf --check-prefix=INVALID-PH-ENTSIZE %s |
| |
| # INVALID-PH-ENTSIZE: warning: '[[FILE]]': unable to dump program headers: invalid e_phentsize: 12336 |
| |
| ## Check that llvm-readobj reports a warning when we have no SHT_SYMTAB_SHNDX section, |
| ## but have a symbol referencing it. |
| |
| # RUN: llvm-readobj --symbols %p/Inputs/invalid-ext-symtab-index.elf-x86-64 2>&1 | \ |
| # RUN: FileCheck -DFILE=%p/Inputs/invalid-ext-symtab-index.elf-x86-64 --check-prefix=INVALID-EXT-SYMTAB-INDEX %s |
| |
| # INVALID-EXT-SYMTAB-INDEX: warning: '[[FILE]]': found an extended symbol index (0), but unable to locate the extended symbol index table |
| # INVALID-EXT-SYMTAB-INDEX: Section: Reserved (0xFFFF) |
| |
| ## Check that llvm-readobj reports an error if a relocation section |
| ## has a broken sh_offset (past the end of the file). |
| |
| # RUN: yaml2obj %s --docnum=12 -o %t12 |
| # RUN: yaml2obj %s --docnum=13 -o %t13 |
| # RUN: llvm-readobj -r %t12 2>&1 | FileCheck -DFILE=%t12 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_REL %s |
| # RUN: llvm-readobj -r %t13 2>&1 | FileCheck -DFILE=%t13 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_RELA %s |
| |
| # INVALID-RELOC-SH-OFFSET: warning: '[[FILE]]': unable to read relocations from [[TYPE]] section with index 1: section [index 1] has a sh_offset (0x10000) + sh_size (0x0) that is greater than the file size (0x160) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_386 |
| Sections: |
| - Name: .rel |
| Type: SHT_REL |
| ShOffset: 0x10000 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .rela |
| Type: SHT_RELA |
| ShOffset: 0x10000 |
| |
| ## Check that llvm-readobj reports a warning when we try to print section symbols and |
| ## .shstrtab has a broken sh_offset so large that sh_offset + sh_size overflows the platform address size type. |
| |
| # RUN: yaml2obj %s --docnum=14 -o %t14 |
| # RUN: llvm-readobj --symbols %t14 2>&1 | FileCheck -DFILE=%t14 --check-prefix=INVALID-SECTION-SIZE2 %s |
| |
| # INVALID-SECTION-SIZE2: Symbol { |
| # INVALID-SECTION-SIZE2: Name: symbol (1) |
| # INVALID-SECTION-SIZE2-NEXT: Value: 0x123 |
| # INVALID-SECTION-SIZE2-NEXT: Size: 0 |
| # INVALID-SECTION-SIZE2-NEXT: Binding: Local (0x0) |
| # INVALID-SECTION-SIZE2-NEXT: Type: None (0x0) |
| # INVALID-SECTION-SIZE2-NEXT: Other: 0 |
| # INVALID-SECTION-SIZE2-NEXT: warning: '[[FILE]]': section [index 1] has a sh_offset (0xffffffff) + sh_size (0x1b) that cannot be represented |
| # INVALID-SECTION-SIZE2-NEXT: Section: <?> (0x1) |
| # INVALID-SECTION-SIZE2-NEXT: } |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS32 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_386 |
| Sections: |
| - Name: .shstrtab |
| Type: SHT_STRTAB |
| ShOffset: 0xFFFFFFFF |
| Symbols: |
| - Name: symbol |
| Section: .shstrtab |
| Value: 0x123 |
| |
| ## Check that llvm-readobj reports an error when trying to dump sections |
| ## when the e_shnum field is broken (is greater than the actual number of sections). |
| |
| # RUN: yaml2obj %s --docnum=15 -o %t15 |
| # RUN: not llvm-readobj -S %t15 2>&1 | \ |
| # RUN: FileCheck -DFILE=%t15 --implicit-check-not=warning: --check-prefix=INVALID-SECTION-NUM %s |
| |
| # INVALID-SECTION-NUM: LoadName: <Not found> |
| # INVALID-SECTION-NUM-NEXT: error: '[[FILE]]': unable to continue dumping, the file is corrupt: section table goes past the end of file |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShNum: 0xFF |
| |
| ## Check llvm-readobj does not crash on a truncated ELF. |
| |
| ## Create a truncated ELF object with ELFCLASSNONE class using echo. |
| ## 0x7f, 'E', 'L', 'F', ELFCLASS64(2), ELFDATA2LSB(1), |
| ## EV_CURRENT(1), ELFOSABI_LINUX(3), <padding zero bytes>, ET_REL(1), EM_NONE(0) |
| # RUN: echo -e -n "\x7f\x45\x4c\x46\x02\x01\x01\x03\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00" > %t11 |
| # RUN: not llvm-readobj -r %t11 2>&1 | FileCheck --check-prefix=INVALID-BUFFER %s |
| |
| # INVALID-BUFFER: error: {{.*}}': invalid buffer: the size (18) is smaller than an ELF header (64) |
| |
| # RUN: not llvm-readobj %p/Inputs/invalid-coff-header-too-small 2>&1 | FileCheck --check-prefix=COFF-HEADER %s |
| # COFF-HEADER: The file was not recognized as a valid object file |
| |
| ## Check that llvm-readobj reports an error if section name offset |
| ## overflows the section name string table. |
| |
| # RUN: yaml2obj %s --docnum=16 -o %t16 |
| # RUN: llvm-readobj --sections %t16 2>&1 | FileCheck -DFILE=%t16 --check-prefix=BROKEN-SECNAME %s |
| |
| ## BROKEN-SECNAME: warning: '[[FILE]]': unable to get the name of SHT_STRTAB section with index 2: a section [index 2] has an invalid sh_name (0xb) offset which goes past the end of the section name string table |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .shstrtab |
| Type: SHT_STRTAB |
| Size: 1 |
| |
| ## Check that llvm-readobj reports an error if a section has a broken offset |
| ## that goes past the end of the file. |
| |
| # RUN: yaml2obj %s --docnum=17 -o %t17 |
| # RUN: not llvm-readobj --sections --section-data %t17 2>&1 \ |
| # RUN: | FileCheck -DFILE=%t17 --check-prefix=BROKEN-SECSHOFFSET %s |
| |
| # BROKEN-SECSHOFFSET: error: '[[FILE]]': section [index 1] has a sh_offset (0xffff0000) + sh_size (0x0) that is greater than the file size (0x160) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .foo |
| Type: SHT_PROGBITS |
| ShOffset: 0xFFFF0000 |
| |
| ## Check that llvm-readobj reports a warning if symbol name |
| ## offset goes past the end of the symbol string table. |
| |
| # RUN: yaml2obj %s --docnum=18 -o %t18 |
| # RUN: llvm-readobj --symbols %t18 2>&1 | FileCheck -DFILE=%t18 --check-prefix=INVALID-SYM-NAME %s |
| |
| # INVALID-SYM-NAME: warning: '[[FILE]]': st_name (0x1) is past the end of the string table of size 0x1 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .strtab |
| Type: SHT_STRTAB |
| Size: 1 |
| Symbols: |
| - Name: foo |
| |
| ## Version index in .gnu.version overflows the version map. |
| ## Check llvm-readobj reports it. |
| |
| # RUN: yaml2obj %s --docnum=19 -o %t19 |
| # RUN: llvm-readobj --dyn-symbols %t19 2>&1 | FileCheck -DFILE=%t19 --check-prefix=INVALID-VERSION %s |
| |
| # INVALID-VERSION: warning: '[[FILE]]': SHT_GNU_versym section refers to a version index 255 which is missing |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .gnu.version |
| Type: SHT_GNU_versym |
| Entries: [ 0xFF ] |
| DynamicSymbols: |
| - Name: foo |
| |
| ## ELF header contains e_phentsize field with a value != sizeof(Elf_Phdr). |
| ## Check llvm-readobj reports it. |
| |
| # RUN: llvm-readobj -l %p/Inputs/corrupt-invalid-phentsize.elf.x86-64 2>&1 \ |
| # RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-phentsize.elf.x86-64 --check-prefix=PHENTSIZE %s |
| |
| # PHENTSIZE: warning: '[[FILE]]': unable to read program headers to locate the PT_DYNAMIC segment: invalid e_phentsize: 57 |
| |
| ## The dynamic table contains DT_STRTAB with a value that is not in any loadable segment. |
| ## Check llvm-readobj reports it. |
| |
| # RUN: yaml2obj %s --docnum=20 -o %t20 |
| # RUN: llvm-readobj --dynamic-table %t20 2>&1 | FileCheck -DFILE=%t20 --check-prefix=INVALID-DTSTRTAB %s |
| |
| # INVALID-DTSTRTAB: warning: '[[FILE]]': unable to parse DT_STRTAB: virtual address is not in any segment: 0xffff0000 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_EXEC |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .dynamic |
| Type: SHT_DYNAMIC |
| Address: 0x1000 |
| Entries: |
| - Tag: DT_STRTAB |
| Value: 0xFFFF0000 |
| - Tag: DT_NULL |
| Value: 0x0 |
| ProgramHeaders: |
| - Type: PT_LOAD |
| VAddr: 0x1000 |
| FirstSec: .dynamic |
| LastSec: .dynamic |
| |
| ## Check that llvm-readobj reports a warning when a dynamic relocation section |
| ## has sh_entsize field with size != sizeof(Elf_Rela). |
| |
| # RUN: llvm-readobj --dyn-relocations \ |
| # RUN: %p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 2>&1 \ |
| # RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 --check-prefix=RELOC-BROKEN-ENTSIZE %s |
| |
| # RELOC-BROKEN-ENTSIZE: warning: '[[FILE]]': invalid DT_RELASZ value (0x18) or DT_RELAENT value (0x19) |
| |
| ## Check that llvm-readobj reports a warning when .dynamic section has an invalid |
| ## size, which isn't a multiple of the dynamic entry size. |
| |
| # RUN: yaml2obj %s --docnum=21 -o %t21 |
| # RUN: llvm-readobj --dyn-relocations %t21 2>&1 | FileCheck -DFILE=%t21 --check-prefix=DYN-TABLE-SIZE %s |
| |
| # DYN-TABLE-SIZE: warning: '[[FILE]]': SHT_DYNAMIC section with index 1 has invalid size (0x1){{$}} |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_EXEC |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .dynamic |
| Type: SHT_DYNAMIC |
| Content: "00" |
| |
| ## PT_DYNAMIC's p_offset field is so large that p_offset + p_filesz is larger |
| ## than the object size. Check llvm-readobj reports it. |
| |
| # RUN: yaml2obj %s --docnum=22 -o %t22 |
| # RUN: llvm-readobj --dyn-relocations %t22 2>&1 | FileCheck -DFILE=%t22 --check-prefix=DYN-TABLE-PHDR %s |
| |
| # DYN-TABLE-PHDR: warning: '[[FILE]]': PT_DYNAMIC segment offset (0xffff0000) + file size (0x0) exceeds the size of the file (0x150) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_EXEC |
| Machine: EM_X86_64 |
| ProgramHeaders: |
| - Type: PT_DYNAMIC |
| Offset: 0xffff0000 |
| |
| ## PT_DYNAMIC's p_filesz field is so large that p_offset + p_filesz is larger |
| ## than the object size. Check llvm-readobj reports it. |
| |
| # RUN: yaml2obj %s --docnum=23 -o %t23 |
| # RUN: llvm-readobj --dyn-relocations %t23 2>&1 \ |
| # RUN: | FileCheck -DFILE=%t23 --check-prefix=DYN-TABLE-PHDR2 %s |
| |
| # DYN-TABLE-PHDR2: warning: '[[FILE]]': PT_DYNAMIC segment offset (0x78) + file size (0xffff0000) exceeds the size of the file (0x1a8) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_EXEC |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .dynamic |
| Type: SHT_DYNAMIC |
| Entries: |
| - Tag: DT_NULL |
| Value: 0 |
| ProgramHeaders: |
| - Type: PT_DYNAMIC |
| FileSize: 0xffff0000 |
| FirstSec: .dynamic |
| LastSec: .dynamic |
| |
| # RUN: yaml2obj --docnum=24 %s -o %t24 |
| # RUN: not obj2yaml 2>&1 %t24 | FileCheck %s -DFILE=%t24 --check-prefix=INVALID-SHSTRNDX |
| |
| # INVALID-SHSTRNDX: Error reading file: [[FILE]]: section header string table index 255 does not exist |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShStrNdx: 0xFF |
| Sections: |
| - Name: .foo |
| Type: SHT_PROGBITS |
| |
| ## We report an error if the number of sections stored in sh_size |
| ## is greater than UINT64_MAX / sizeof(Elf_Shdr) == 288230376151711743. |
| ## Here we check that do not crash on a border value. |
| |
| # RUN: yaml2obj --docnum=25 %s -o %t25 |
| # RUN: not llvm-readobj -h %t25 2>&1 | FileCheck -DFILE=%t25 --check-prefix=INVALID-SEC-NUM1 %s |
| |
| # INVALID-SEC-NUM1: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid section header table offset (e_shoff = 0x58) or invalid number of sections specified in the first section header's sh_size field (0x3ffffffffffffff) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShNum: 0x0 |
| Sections: |
| - Type: SHT_NULL |
| Size: 288230376151711743 |
| |
| ## See above, but now we test the UINT64_MAX / sizeof(Elf_Shdr) value. |
| ## The error is slightly different in this case. |
| |
| # RUN: yaml2obj --docnum=26 %s -o %t26 |
| # RUN: not llvm-readobj -h %t26 2>&1 | FileCheck -DFILE=%t26 --check-prefix=INVALID-SEC-NUM2 %s |
| |
| # INVALID-SEC-NUM2: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid number of sections specified in the NULL section's sh_size field (288230376151711744) |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShNum: 0x0 |
| Sections: |
| - Type: SHT_NULL |
| Size: 288230376151711744 |
| |
| ## Check the case when SHOff is too large. SHOff + sizeof(Elf_Shdr) overflows the uint64 type. |
| |
| # RUN: yaml2obj --docnum=27 %s -o %t27 |
| # RUN: not llvm-readobj -h %t27 2>&1 | FileCheck -DFILE=%t27 --check-prefix=INVALID-SEC-NUM3 %s |
| |
| # INVALID-SEC-NUM3: error: '[[FILE]]': unable to continue dumping, the file is corrupt: section header table goes past the end of the file: e_shoff = 0xffffffffffffffff |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| EShOff: 0xffffffffffffffff |
| |
| ## Check that llvm-objdump reports an error when it tries to dump a |
| ## symbol name and .strtab is empty. |
| |
| # RUN: yaml2obj %s --docnum=28 -o %t28 |
| # RUN: not llvm-objdump --syms %t28 2>&1 | FileCheck -DFILE=%t28 --check-prefix=STRTAB-EMPTY2 %s |
| |
| # STRTAB-EMPTY2: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .strtab |
| Type: SHT_STRTAB |
| Content: "" |
| Symbols: |
| - Name: foo |
| |
| ## Check that we report a warning if SHT_GNU_versym has invalid |
| ## sh_entsize value (3 instead of 2) when trying to access the entries. |
| |
| # RUN: yaml2obj %s --docnum=29 -o %t29 |
| # RUN: llvm-readobj -V %t29 2>&1 | FileCheck -DFILE=%t29 --check-prefix=INVALID-VER-SHENTSIZE %s |
| |
| # INVALID-VER-SHENTSIZE: warning: '[[FILE]]': cannot read content of SHT_GNU_versym section with index 1: section [index 1] has invalid sh_entsize: expected 2, but got 3 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| OSABI: ELFOSABI_FREEBSD |
| Type: ET_DYN |
| Machine: EM_X86_64 |
| Sections: |
| - Name: .gnu.version |
| Type: SHT_GNU_versym |
| EntSize: 0x0000000000000003 |
| Entries: [ ] |
| ## Needed to trigger creation of .dynsym. |
| DynamicSymbols: |
| - Name: foo |
| Binding: STB_GLOBAL |
| |
| ## Check the case when e_shstrndx == SHN_XINDEX, but null section's sh_link contains |
| ## the index of a section header string table that is larger than the number of the sections. |
| |
| # RUN: yaml2obj --docnum=30 %s -o %t30 |
| # RUN: not llvm-objcopy %t30 2>&1 | FileCheck %s -DFILE=%t30 --check-prefix=INVALID-SHSTRTAB-INDEX |
| |
| # INVALID-SHSTRTAB-INDEX: error: section header string table index 255 does not exist |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_REL |
| Machine: EM_X86_64 |
| ## SHN_XINDEX == 0xffff. |
| EShStrNdx: 0xffff |
| Sections: |
| - Type: SHT_NULL |
| Link: 0xff |
| |
| ## Check the case when the e_phoff field is invalid. |
| # RUN: yaml2obj --docnum=31 %s -o %t31 |
| # RUN: llvm-objdump --private-headers %t31 2>&1 | FileCheck -DFILE=%t31 %s --check-prefix=INVALID-PHOFF |
| |
| # INVALID-PHOFF: warning: '[[FILE]]': program headers are longer than binary of size 280: e_phoff = 0xffffff, e_phnum = 0, e_phentsize = 0 |
| # INVALID-PHOFF-EMPTY: |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS64 |
| Data: ELFDATA2LSB |
| Type: ET_EXEC |
| Machine: EM_X86_64 |
| EPhOff: 0xffffff |