[llvm-bugs] [Bug 13650] llvm-objdump does not give information about .rela.dyn relocations

via llvm-bugs llvm-bugs at lists.llvm.org
Thu Oct 15 22:15:12 PDT 2015


https://llvm.org/bugs/show_bug.cgi?id=13650

Eric Christopher <echristo at gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #2 from Eric Christopher <echristo at gmail.com> ---
Seems to work with llvm-readobj now:

dzur:~/tmp> ~/builds/build-llvm/Debug+Asserts/bin/llvm-readobj -relocations
/bin/true

File: /bin/true
Format: ELF64-x86-64
Arch: x86_64
AddressSize: 64bit
LoadName:
Relocations [
  Section (9) .rela.dyn {
    0x605FF8 R_X86_64_GLOB_DAT __gmon_start__ 0x0
    0x606220 R_X86_64_COPY __progname 0x0
    0x606230 R_X86_64_COPY stdout 0x0
    0x606238 R_X86_64_COPY __progname_full 0x0
    0x606240 R_X86_64_COPY stderr 0x0
  }
  Section (10) .rela.plt {
    0x606018 R_X86_64_JUMP_SLOT __uflow 0x0
    0x606020 R_X86_64_JUMP_SLOT getenv 0x0
    0x606028 R_X86_64_JUMP_SLOT free 0x0
    0x606030 R_X86_64_JUMP_SLOT abort 0x0
    0x606038 R_X86_64_JUMP_SLOT __errno_location 0x0
    0x606040 R_X86_64_JUMP_SLOT _exit 0x0
    0x606048 R_X86_64_JUMP_SLOT strcpy 0x0
    0x606050 R_X86_64_JUMP_SLOT __fpending 0x0
    0x606058 R_X86_64_JUMP_SLOT textdomain 0x0
    0x606060 R_X86_64_JUMP_SLOT fclose 0x0
    0x606068 R_X86_64_JUMP_SLOT bindtextdomain 0x0
    0x606070 R_X86_64_JUMP_SLOT dcgettext 0x0
    0x606078 R_X86_64_JUMP_SLOT __ctype_get_mb_cur_max 0x0
    0x606080 R_X86_64_JUMP_SLOT strlen 0x0
    0x606088 R_X86_64_JUMP_SLOT __stack_chk_fail 0x0
    0x606090 R_X86_64_JUMP_SLOT mbrtowc 0x0
    0x606098 R_X86_64_JUMP_SLOT strrchr 0x0
    0x6060A0 R_X86_64_JUMP_SLOT lseek 0x0
    0x6060A8 R_X86_64_JUMP_SLOT memset 0x0
    0x6060B0 R_X86_64_JUMP_SLOT fscanf 0x0
    0x6060B8 R_X86_64_JUMP_SLOT close 0x0
    0x6060C0 R_X86_64_JUMP_SLOT __libc_start_main 0x0
    0x6060C8 R_X86_64_JUMP_SLOT memcmp 0x0
    0x6060D0 R_X86_64_JUMP_SLOT fputs_unlocked 0x0
    0x6060D8 R_X86_64_JUMP_SLOT calloc 0x0
    0x6060E0 R_X86_64_JUMP_SLOT strcmp 0x0
    0x6060E8 R_X86_64_JUMP_SLOT __gmon_start__ 0x0
    0x6060F0 R_X86_64_JUMP_SLOT memcpy 0x0
    0x6060F8 R_X86_64_JUMP_SLOT fileno 0x0
    0x606100 R_X86_64_JUMP_SLOT malloc 0x0
    0x606108 R_X86_64_JUMP_SLOT fflush 0x0
    0x606110 R_X86_64_JUMP_SLOT nl_langinfo 0x0
    0x606118 R_X86_64_JUMP_SLOT ungetc 0x0
    0x606120 R_X86_64_JUMP_SLOT __freading 0x0
    0x606128 R_X86_64_JUMP_SLOT realloc 0x0
    0x606130 R_X86_64_JUMP_SLOT fdopen 0x0
    0x606138 R_X86_64_JUMP_SLOT setlocale 0x0
    0x606140 R_X86_64_JUMP_SLOT __printf_chk 0x0
    0x606148 R_X86_64_JUMP_SLOT error 0x0
    0x606150 R_X86_64_JUMP_SLOT open 0x0
    0x606158 R_X86_64_JUMP_SLOT fseeko 0x0
    0x606160 R_X86_64_JUMP_SLOT __cxa_atexit 0x0
    0x606168 R_X86_64_JUMP_SLOT exit 0x0
    0x606170 R_X86_64_JUMP_SLOT fwrite 0x0
    0x606178 R_X86_64_JUMP_SLOT __fprintf_chk 0x0
    0x606180 R_X86_64_JUMP_SLOT mbsinit 0x0
    0x606188 R_X86_64_JUMP_SLOT iswprint 0x0
    0x606190 R_X86_64_JUMP_SLOT __ctype_b_loc 0x0
  }
]

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20151016/bae0fc5b/attachment-0001.html>


More information about the llvm-bugs mailing list