[llvm-bugs] [Bug 13650] llvm-objdump does not give information about .rela.dyn relocations
via llvm-bugs
llvm-bugs at lists.llvm.org
Thu Oct 15 22:15:12 PDT 2015
https://llvm.org/bugs/show_bug.cgi?id=13650
Eric Christopher <echristo at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #2 from Eric Christopher <echristo at gmail.com> ---
Seems to work with llvm-readobj now:
dzur:~/tmp> ~/builds/build-llvm/Debug+Asserts/bin/llvm-readobj -relocations
/bin/true
File: /bin/true
Format: ELF64-x86-64
Arch: x86_64
AddressSize: 64bit
LoadName:
Relocations [
Section (9) .rela.dyn {
0x605FF8 R_X86_64_GLOB_DAT __gmon_start__ 0x0
0x606220 R_X86_64_COPY __progname 0x0
0x606230 R_X86_64_COPY stdout 0x0
0x606238 R_X86_64_COPY __progname_full 0x0
0x606240 R_X86_64_COPY stderr 0x0
}
Section (10) .rela.plt {
0x606018 R_X86_64_JUMP_SLOT __uflow 0x0
0x606020 R_X86_64_JUMP_SLOT getenv 0x0
0x606028 R_X86_64_JUMP_SLOT free 0x0
0x606030 R_X86_64_JUMP_SLOT abort 0x0
0x606038 R_X86_64_JUMP_SLOT __errno_location 0x0
0x606040 R_X86_64_JUMP_SLOT _exit 0x0
0x606048 R_X86_64_JUMP_SLOT strcpy 0x0
0x606050 R_X86_64_JUMP_SLOT __fpending 0x0
0x606058 R_X86_64_JUMP_SLOT textdomain 0x0
0x606060 R_X86_64_JUMP_SLOT fclose 0x0
0x606068 R_X86_64_JUMP_SLOT bindtextdomain 0x0
0x606070 R_X86_64_JUMP_SLOT dcgettext 0x0
0x606078 R_X86_64_JUMP_SLOT __ctype_get_mb_cur_max 0x0
0x606080 R_X86_64_JUMP_SLOT strlen 0x0
0x606088 R_X86_64_JUMP_SLOT __stack_chk_fail 0x0
0x606090 R_X86_64_JUMP_SLOT mbrtowc 0x0
0x606098 R_X86_64_JUMP_SLOT strrchr 0x0
0x6060A0 R_X86_64_JUMP_SLOT lseek 0x0
0x6060A8 R_X86_64_JUMP_SLOT memset 0x0
0x6060B0 R_X86_64_JUMP_SLOT fscanf 0x0
0x6060B8 R_X86_64_JUMP_SLOT close 0x0
0x6060C0 R_X86_64_JUMP_SLOT __libc_start_main 0x0
0x6060C8 R_X86_64_JUMP_SLOT memcmp 0x0
0x6060D0 R_X86_64_JUMP_SLOT fputs_unlocked 0x0
0x6060D8 R_X86_64_JUMP_SLOT calloc 0x0
0x6060E0 R_X86_64_JUMP_SLOT strcmp 0x0
0x6060E8 R_X86_64_JUMP_SLOT __gmon_start__ 0x0
0x6060F0 R_X86_64_JUMP_SLOT memcpy 0x0
0x6060F8 R_X86_64_JUMP_SLOT fileno 0x0
0x606100 R_X86_64_JUMP_SLOT malloc 0x0
0x606108 R_X86_64_JUMP_SLOT fflush 0x0
0x606110 R_X86_64_JUMP_SLOT nl_langinfo 0x0
0x606118 R_X86_64_JUMP_SLOT ungetc 0x0
0x606120 R_X86_64_JUMP_SLOT __freading 0x0
0x606128 R_X86_64_JUMP_SLOT realloc 0x0
0x606130 R_X86_64_JUMP_SLOT fdopen 0x0
0x606138 R_X86_64_JUMP_SLOT setlocale 0x0
0x606140 R_X86_64_JUMP_SLOT __printf_chk 0x0
0x606148 R_X86_64_JUMP_SLOT error 0x0
0x606150 R_X86_64_JUMP_SLOT open 0x0
0x606158 R_X86_64_JUMP_SLOT fseeko 0x0
0x606160 R_X86_64_JUMP_SLOT __cxa_atexit 0x0
0x606168 R_X86_64_JUMP_SLOT exit 0x0
0x606170 R_X86_64_JUMP_SLOT fwrite 0x0
0x606178 R_X86_64_JUMP_SLOT __fprintf_chk 0x0
0x606180 R_X86_64_JUMP_SLOT mbsinit 0x0
0x606188 R_X86_64_JUMP_SLOT iswprint 0x0
0x606190 R_X86_64_JUMP_SLOT __ctype_b_loc 0x0
}
]
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20151016/bae0fc5b/attachment-0001.html>
More information about the llvm-bugs
mailing list