[llvm-bugs] [Bug 31196] New: lld -Ttext 0x600 (as used in FreeBSD boot loader) results in 4GB output on i386
via llvm-bugs
llvm-bugs at lists.llvm.org
Mon Nov 28 14:57:40 PST 2016
https://llvm.org/bugs/show_bug.cgi?id=31196
Bug ID: 31196
Summary: lld -Ttext 0x600 (as used in FreeBSD boot loader)
results in 4GB output on i386
Product: lld
Version: unspecified
Hardware: PC
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P
Component: ELF
Assignee: unassignedbugs at nondot.org
Reporter: emaste at freebsd.org
CC: llvm-bugs at lists.llvm.org
Blocks: 23214
Classification: Unclassified
Created attachment 17677
--> https://llvm.org/bugs/attachment.cgi?id=17677&action=edit
reproducer for large output with -Ttext 0x0600
Found while testing the WIP -N support in https://reviews.llvm.org/D26888
The boot0 boot component is linked with the following command line:
ld --eh-frame-hdr -dynamic-linker /libexec/ld-elf.so.1 --hash-style=both
--enable-new-dtags -m elf_i386_fbsd -o boot0 -L/usr/lib32 -Ttext 0x600 -e start
-N -S --oformat binary boot0.o
This produces 4GB output:
% ls -l boot0
-rwxr-xr-x 1 emaste emaste 4294903808 28 Nov 18:01 boot0
Outputting as ELF instead by dropping the --oformat binary:
% /tank/emaste/src/llvm/build-debug/bin/ld.lld --eh-frame-hdr -dynamic-linker
/libexec/ld-elf.so.1 --hash-style=both --enable-new-dtags -m elf_i386_fbsd -o
boot0 -L/usr/lib32 -Ttext 0x600 -e start -N -S boot0.o
lets us see what's going on (note the Off column):
% readelf -S boot0
There are 8 section headers, starting at offset 0xffff0e60:
Section Headers:
[Nr] Name Type Addr Off Size ES Flg Lk Inf
Al
[ 0] NULL 00000000 000000 000000 00 0 0
0
[ 1] .text PROGBITS 00000600 ffff0600 000200 00 AX 0 0
4
[ 2] .data PROGBITS 00000800 ffff0800 000000 00 WA 0 0
4
[ 3] .bss NOBITS 00000800 ffff0800 000000 00 WA 0 0
4
[ 4] .comment PROGBITS 00000000 ffff0800 000055 01 MS 0 0
1
[ 5] .symtab SYMTAB 00000000 ffff0858 0003e0 10 7 61
4
[ 6] .shstrtab STRTAB 00000000 ffff0c38 000035 00 0 0
1
[ 7] .strtab STRTAB 00000000 ffff0c6d 0001f1 00 0 0
1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings)
I (info), L (link order), G (group), x (unknown)
O (extra OS processing required) o (OS specific), p (processor specific)
For reference, here's the output when linked by ld.bfd 2.17.50:
% readelf -S boot0
There are 5 section headers, starting at offset 0x278:
Section Headers:
[Nr] Name Type Addr Off Size ES Flg Lk Inf
Al
[ 0] NULL 00000000 000000 000000 00 0 0
0
[ 1] .text PROGBITS 00000600 000054 000200 00 WAX 0 0
4
[ 2] .shstrtab STRTAB 00000000 000254 000021 00 0 0
1
[ 3] .symtab SYMTAB 00000000 000340 000420 10 4 62
4
[ 4] .strtab STRTAB 00000000 000760 000209 00 0 0
1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings)
I (info), L (link order), G (group), x (unknown)
O (extra OS processing required) o (OS specific), p (processor specific)
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20161128/a4125664/attachment.html>
More information about the llvm-bugs
mailing list