## Check that llvm-objdump reports an error when ## .shstrtab has an invalid type. # RUN: yaml2obj %s --docnum=1 -o %t1 # RUN: not llvm-objdump -s %t1 2>&1 | FileCheck %s -DFILE=%t1 --check-prefix=INVALID-SHTYPE # INVALID-SHTYPE: error: '[[FILE]]': invalid sh_type for string table section [index 1]: expected SHT_STRTAB, but got SHT_PROGBITS --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .shstrtab Type: SHT_PROGBITS ## Check that llvm-objdump reports an error when ## .shstrtab has an invalid zero-size. # RUN: yaml2obj %s --docnum=2 -o %t2 # RUN: not llvm-objdump -s %t2 2>&1 | FileCheck %s -DFILE=%t2 --check-prefix=STRTAB-EMPTY # STRTAB-EMPTY: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .shstrtab Type: SHT_STRTAB Size: 0 ## Check that llvm-objdump reports an error when .shstrtab has an invalid ## size that goes past the end of the file. # RUN: not llvm-objdump -s %p/Inputs/invalid-strtab-size.elf 2>&1 \ # RUN: | FileCheck %s -DFILE=%p/Inputs/invalid-strtab-size.elf --check-prefix=INVALID-STRTAB-SIZE # INVALID-STRTAB-SIZE: error: '[[FILE]]': section [index 1] has a sh_offset (0x70) + sh_size (0xffffff) that is greater than the file size (0x218) ## Document that llvm-dwarfdump doesn't reports errors/warnings during relocation resolution ## when instead of SHT_RELA section we have a SHT_REL section in an object. ## In this case it just doesn't try to read relocation addends and assumes they are 0. ## Note: we don't check the output, because the intention of this test is just to check the ## exit code and to document the fact that no warnings are reported. # RUN: yaml2obj %s --docnum=3 -o %t3 # RUN: llvm-dwarfdump -debug-line %t3 2>&1 | FileCheck --implicit-check-not=warning: %s --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .debug_line Type: SHT_PROGBITS ## The exact content does not matter here. We can use any minimal valid debug section ## which is a target for relocation. The idea is to trigger the code that reads the ## relocation's addend during relocation resolution. It should fail if called on ## a non-SHT_RELA section. Content: 380000000200210000000101FB0E0D00010101010000000100000100676C6F62616C2E63707000000000000009020000000000000000130237000101 - Name: .rela.debug_line Type: SHT_REL Info: .debug_line Relocations: - Offset: 0x000000000000002E Type: R_X86_64_64 ## Check that llvm-objdump reports an error when it tries to dump section names ## and .shstrtab is not null-terminated. # RUN: yaml2obj %s --docnum=4 -o %t4 # RUN: not llvm-objdump -s %t4 2>&1 | FileCheck -DFILE=%t4 --check-prefix=SHSTRTAB-NON-TERM %s # SHSTRTAB-NON-TERM: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is non-null terminated --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .shstrtab Type: SHT_STRTAB Content: "11" ## Check that llvm-objdump reports an error when it tries to dump a symbol name and ## .strtab is not null-terminated. # RUN: yaml2obj %s --docnum=5 -o %t5 # RUN: not llvm-objdump --syms %t5 2>&1 | FileCheck --check-prefix=NONULL %s # NONULL: error: {{.*}}: SHT_STRTAB string table section [index 1] is non-null terminated --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .strtab Type: SHT_STRTAB Content: "11" Symbols: - Name: foo ## Check that llvm-readobj reports an error if .symtab has an invalid sh_entsize. # RUN: yaml2obj %s --docnum=6 -o %t6 # RUN: llvm-readobj --symbols %t6 2>&1 | FileCheck -DFILE=%t6 --check-prefix=INVALID-SYM-SIZE %s # INVALID-SYM-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has invalid sh_entsize: expected 24, but got 32 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .symtab Type: SHT_SYMTAB EntSize: 32 Symbols: - Name: foo ## Check that llvm-readobj reports a warning if .dynsym has an invalid sh_entsize. # RUN: yaml2obj %s --docnum=7 -o %t7 # RUN: llvm-readobj --dyn-symbols %t7 2>&1 | FileCheck -DFILE=%t7 --check-prefix=INVALID-DYNSYM-SIZE %s # INVALID-DYNSYM-SIZE: warning: '[[FILE]]': SHT_DYNSYM section with index 1 has invalid size (0x30) or entry size (0x20) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .dynsym Type: SHT_DYNSYM EntSize: 32 DynamicSymbols: - Name: foo ## Check that llvm-readobj reports a warning if .symtab has an invalid sh_link value, ## which is greater than number of sections. # RUN: yaml2obj %s --docnum=8 -o %t8 # RUN: llvm-readobj --symbols %t8 2>&1 | FileCheck -DFILE=%t8 --check-prefix=INVALID-SYMTAB-LINK %s # INVALID-SYMTAB-LINK: warning: '[[FILE]]': unable to get the string table for the SHT_SYMTAB section: invalid section index: 255 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .symtab Type: SHT_SYMTAB Link: 0xFF ## Check that llvm-readobj reports an error when trying to dump sections ## when the e_shentsize field is broken. # RUN: yaml2obj %s --docnum=9 -o %t9 # RUN: not llvm-readobj -S %t9 2>&1 | \ # RUN: FileCheck -DFILE=%t9 --implicit-check-not=warning: --check-prefix=INVALID-SH-ENTSIZE %s # INVALID-SH-ENTSIZE: LoadName: # INVALID-SH-ENTSIZE-NEXT: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid e_shentsize in ELF header: 1 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShEntSize: 1 ## Check that llvm-readobj reports a warning if .symtab has sh_size ## that is not a multiple of sh_entsize. # RUN: yaml2obj %s --docnum=10 -o %t10 # RUN: llvm-readobj --symbols %t10 2>&1 | FileCheck -DFILE=%t10 --check-prefix=INVALID-SYMTAB-SIZE %s # INVALID-SYMTAB-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has an invalid sh_size (1) which is not a multiple of its sh_entsize (24) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .symtab Type: SHT_SYMTAB Size: 1 ## Test that llvm-readobj reports an error if SHT_SYMTAB_SHNDX section has ## invalid sh_size which should be: ## sizeof(.symtab_shndx) = (sizeof(.symtab) / entsize(.symtab)) * entsize(.symtab_shndx) # RUN: yaml2obj %s --docnum=11 -o %t11 # RUN: llvm-readobj --symbols %t11 2>&1 | FileCheck --check-prefix=INVALID-XINDEX-SIZE %s # INVALID-XINDEX-SIZE: warning: {{.*}}: SHT_SYMTAB_SHNDX has 2 entries, but the symbol table associated has 1 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .symtab_shndx Type: SHT_SYMTAB_SHNDX Entries: [ 0, 1 ] Link: .symtab Symbols: [] ## Check that llvm-readobj reports a warning when the e_phentsize field is broken. # RUN: llvm-readobj --program-headers %p/Inputs/invalid-e_shnum.elf 2>&1 | \ # RUN: FileCheck -DFILE=%p/Inputs/invalid-e_shnum.elf --check-prefix=INVALID-PH-ENTSIZE %s # INVALID-PH-ENTSIZE: warning: '[[FILE]]': unable to dump program headers: invalid e_phentsize: 12336 ## Check that llvm-readobj reports a warning when we have no SHT_SYMTAB_SHNDX section, ## but have a symbol referencing it. # RUN: llvm-readobj --symbols %p/Inputs/invalid-ext-symtab-index.elf-x86-64 2>&1 | \ # RUN: FileCheck -DFILE=%p/Inputs/invalid-ext-symtab-index.elf-x86-64 --check-prefix=INVALID-EXT-SYMTAB-INDEX %s # INVALID-EXT-SYMTAB-INDEX: warning: '[[FILE]]': found an extended symbol index (0), but unable to locate the extended symbol index table # INVALID-EXT-SYMTAB-INDEX: Section: Reserved (0xFFFF) ## Check that llvm-readobj reports an error if a relocation section ## has a broken sh_offset (past the end of the file). # RUN: yaml2obj %s --docnum=12 -o %t12 # RUN: yaml2obj %s --docnum=13 -o %t13 # RUN: llvm-readobj -r %t12 2>&1 | FileCheck -DFILE=%t12 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_REL %s # RUN: llvm-readobj -r %t13 2>&1 | FileCheck -DFILE=%t13 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_RELA %s # INVALID-RELOC-SH-OFFSET: warning: '[[FILE]]': unable to read relocations from [[TYPE]] section with index 1: section [index 1] has a sh_offset (0x10000) + sh_size (0x0) that is greater than the file size (0x160) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_386 Sections: - Name: .rel Type: SHT_REL ShOffset: 0x10000 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .rela Type: SHT_RELA ShOffset: 0x10000 ## Check that llvm-readobj reports a warning when we try to print section symbols and ## .shstrtab has a broken sh_offset so large that sh_offset + sh_size overflows the platform address size type. # RUN: yaml2obj %s --docnum=14 -o %t14 # RUN: llvm-readobj --symbols %t14 2>&1 | FileCheck -DFILE=%t14 --check-prefix=INVALID-SECTION-SIZE2 %s # INVALID-SECTION-SIZE2: Symbol { # INVALID-SECTION-SIZE2: Name: symbol (1) # INVALID-SECTION-SIZE2-NEXT: Value: 0x123 # INVALID-SECTION-SIZE2-NEXT: Size: 0 # INVALID-SECTION-SIZE2-NEXT: Binding: Local (0x0) # INVALID-SECTION-SIZE2-NEXT: Type: None (0x0) # INVALID-SECTION-SIZE2-NEXT: Other: 0 # INVALID-SECTION-SIZE2-NEXT: warning: '[[FILE]]': section [index 1] has a sh_offset (0xffffffff) + sh_size (0x1b) that cannot be represented # INVALID-SECTION-SIZE2-NEXT: Section: (0x1) # INVALID-SECTION-SIZE2-NEXT: } --- !ELF FileHeader: Class: ELFCLASS32 Data: ELFDATA2LSB Type: ET_REL Machine: EM_386 Sections: - Name: .shstrtab Type: SHT_STRTAB ShOffset: 0xFFFFFFFF Symbols: - Name: symbol Section: .shstrtab Value: 0x123 ## Check that llvm-readobj reports an error when trying to dump sections ## when the e_shnum field is broken (is greater than the actual number of sections). # RUN: yaml2obj %s --docnum=15 -o %t15 # RUN: not llvm-readobj -S %t15 2>&1 | \ # RUN: FileCheck -DFILE=%t15 --implicit-check-not=warning: --check-prefix=INVALID-SECTION-NUM %s # INVALID-SECTION-NUM: LoadName: # INVALID-SECTION-NUM-NEXT: error: '[[FILE]]': unable to continue dumping, the file is corrupt: section table goes past the end of file --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShNum: 0xFF ## Check llvm-readobj does not crash on a truncated ELF. ## Create a truncated ELF object with ELFCLASSNONE class using echo. ## 0x7f, 'E', 'L', 'F', ELFCLASS64(2), ELFDATA2LSB(1), ## EV_CURRENT(1), ELFOSABI_LINUX(3), , ET_REL(1), EM_NONE(0) # RUN: echo -e -n "\x7f\x45\x4c\x46\x02\x01\x01\x03\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00" > %t11 # RUN: not llvm-readobj -r %t11 2>&1 | FileCheck --check-prefix=INVALID-BUFFER %s # INVALID-BUFFER: error: {{.*}}': invalid buffer: the size (18) is smaller than an ELF header (64) # RUN: not llvm-readobj %p/Inputs/invalid-coff-header-too-small 2>&1 | FileCheck --check-prefix=COFF-HEADER %s # COFF-HEADER: The file was not recognized as a valid object file ## Check that llvm-readobj reports an error if section name offset ## overflows the section name string table. # RUN: yaml2obj %s --docnum=16 -o %t16 # RUN: llvm-readobj --sections %t16 2>&1 | FileCheck -DFILE=%t16 --check-prefix=BROKEN-SECNAME %s ## BROKEN-SECNAME: warning: '[[FILE]]': unable to get the name of SHT_STRTAB section with index 2: a section [index 2] has an invalid sh_name (0xb) offset which goes past the end of the section name string table --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .shstrtab Type: SHT_STRTAB Size: 1 ## Check that llvm-readobj reports an error if a section has a broken offset ## that goes past the end of the file. # RUN: yaml2obj %s --docnum=17 -o %t17 # RUN: not llvm-readobj --sections --section-data %t17 2>&1 \ # RUN: | FileCheck -DFILE=%t17 --check-prefix=BROKEN-SECSHOFFSET %s # BROKEN-SECSHOFFSET: error: '[[FILE]]': section [index 1] has a sh_offset (0xffff0000) + sh_size (0x0) that is greater than the file size (0x160) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .foo Type: SHT_PROGBITS ShOffset: 0xFFFF0000 ## Check that llvm-readobj reports a warning if symbol name ## offset goes past the end of the symbol string table. # RUN: yaml2obj %s --docnum=18 -o %t18 # RUN: llvm-readobj --symbols %t18 2>&1 | FileCheck -DFILE=%t18 --check-prefix=INVALID-SYM-NAME %s # INVALID-SYM-NAME: warning: '[[FILE]]': st_name (0x1) is past the end of the string table of size 0x1 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 Sections: - Name: .strtab Type: SHT_STRTAB Size: 1 Symbols: - Name: foo ## Version index in .gnu.version overflows the version map. ## Check llvm-readobj reports it. # RUN: yaml2obj %s --docnum=19 -o %t19 # RUN: llvm-readobj -dt %t19 2>&1 | FileCheck -DFILE=%t19 --check-prefix=INVALID-VERSION %s # INVALID-VERSION: warning: '[[FILE]]': SHT_GNU_versym section refers to a version index 255 which is missing --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .gnu.version Type: SHT_GNU_versym Entries: [ 0xFF ] DynamicSymbols: - Name: foo ## ELF header contains e_phentsize field with a value != sizeof(Elf_Phdr). ## Check llvm-readobj reports it. # RUN: llvm-readobj -l %p/Inputs/corrupt-invalid-phentsize.elf.x86-64 2>&1 \ # RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-phentsize.elf.x86-64 --check-prefix=PHENTSIZE %s # PHENTSIZE: warning: '[[FILE]]': unable to read program headers to locate the PT_DYNAMIC segment: invalid e_phentsize: 57 ## The dynamic table contains DT_STRTAB with a value that is not in any loadable segment. ## Check llvm-readobj reports it. # RUN: yaml2obj %s --docnum=20 -o %t20 # RUN: llvm-readobj --dynamic-table %t20 2>&1 | FileCheck -DFILE=%t20 --check-prefix=INVALID-DTSTRTAB %s # INVALID-DTSTRTAB: warning: '[[FILE]]': unable to parse DT_STRTAB: virtual address is not in any segment: 0xffff0000 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 Sections: - Name: .dynamic Type: SHT_DYNAMIC Address: 0x1000 Entries: - Tag: DT_STRTAB Value: 0xFFFF0000 - Tag: DT_NULL Value: 0x0 ProgramHeaders: - Type: PT_LOAD VAddr: 0x1000 FirstSec: .dynamic LastSec: .dynamic ## Check that llvm-readobj reports a warning when a dynamic relocation section ## has sh_entsize field with size != sizeof(Elf_Rela). # RUN: llvm-readobj --dyn-relocations \ # RUN: %p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 2>&1 \ # RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 --check-prefix=RELOC-BROKEN-ENTSIZE %s # RELOC-BROKEN-ENTSIZE: warning: '[[FILE]]': invalid DT_RELASZ value (0x18) or DT_RELAENT value (0x19) ## Check that llvm-readobj reports a warning when .dynamic section has an invalid ## size, which isn't a multiple of the dynamic entry size. # RUN: yaml2obj %s --docnum=21 -o %t21 # RUN: llvm-readobj --dyn-relocations %t21 2>&1 | FileCheck -DFILE=%t21 --check-prefix=DYN-TABLE-SIZE %s # DYN-TABLE-SIZE: warning: '[[FILE]]': SHT_DYNAMIC section with index 1 has invalid size (0x1){{$}} --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 Sections: - Name: .dynamic Type: SHT_DYNAMIC Content: "00" ## PT_DYNAMIC's p_offset field is so large that p_offset + p_filesz is larger ## than the object size. Check llvm-readobj reports it. # RUN: yaml2obj %s --docnum=22 -o %t22 # RUN: llvm-readobj --dyn-relocations %t22 2>&1 | FileCheck -DFILE=%t22 --check-prefix=DYN-TABLE-PHDR %s # DYN-TABLE-PHDR: warning: '[[FILE]]': PT_DYNAMIC segment offset (0xffff0000) + file size (0x0) exceeds the size of the file (0x150) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 ProgramHeaders: - Type: PT_DYNAMIC Offset: 0xffff0000 ## PT_DYNAMIC's p_filesz field is so large that p_offset + p_filesz is larger ## than the object size. Check llvm-readobj reports it. # RUN: yaml2obj %s --docnum=23 -o %t23 # RUN: llvm-readobj --dyn-relocations %t23 2>&1 \ # RUN: | FileCheck -DFILE=%t23 --check-prefix=DYN-TABLE-PHDR2 %s # DYN-TABLE-PHDR2: warning: '[[FILE]]': PT_DYNAMIC segment offset (0x78) + file size (0xffff0000) exceeds the size of the file (0x1a8) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 Sections: - Name: .dynamic Type: SHT_DYNAMIC Entries: - Tag: DT_NULL Value: 0 ProgramHeaders: - Type: PT_DYNAMIC FileSize: 0xffff0000 FirstSec: .dynamic LastSec: .dynamic # RUN: yaml2obj --docnum=24 %s -o %t24 # RUN: not obj2yaml 2>&1 %t24 | FileCheck %s -DFILE=%t24 --check-prefix=INVALID-SHSTRNDX # INVALID-SHSTRNDX: Error reading file: [[FILE]]: section header string table index 255 does not exist --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShStrNdx: 0xFF Sections: - Name: .foo Type: SHT_PROGBITS ## We report an error if the number of sections stored in sh_size ## is greater than UINT64_MAX / sizeof(Elf_Shdr) == 288230376151711743. ## Here we check that do not crash on a border value. # RUN: yaml2obj --docnum=25 %s -o %t25 # RUN: not llvm-readobj -h %t25 2>&1 | FileCheck -DFILE=%t25 --check-prefix=INVALID-SEC-NUM1 %s # INVALID-SEC-NUM1: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid section header table offset (e_shoff = 0x58) or invalid number of sections specified in the first section header's sh_size field (0x3ffffffffffffff) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShNum: 0x0 Sections: - Type: SHT_NULL Size: 288230376151711743 ## See above, but now we test the UINT64_MAX / sizeof(Elf_Shdr) value. ## The error is slightly different in this case. # RUN: yaml2obj --docnum=26 %s -o %t26 # RUN: not llvm-readobj -h %t26 2>&1 | FileCheck -DFILE=%t26 --check-prefix=INVALID-SEC-NUM2 %s # INVALID-SEC-NUM2: error: '[[FILE]]': unable to continue dumping, the file is corrupt: invalid number of sections specified in the NULL section's sh_size field (288230376151711744) --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShNum: 0x0 Sections: - Type: SHT_NULL Size: 288230376151711744 ## Check the case when SHOff is too large. SHOff + sizeof(Elf_Shdr) overflows the uint64 type. # RUN: yaml2obj --docnum=27 %s -o %t27 # RUN: not llvm-readobj -h %t27 2>&1 | FileCheck -DFILE=%t27 --check-prefix=INVALID-SEC-NUM3 %s # INVALID-SEC-NUM3: error: '[[FILE]]': unable to continue dumping, the file is corrupt: section header table goes past the end of the file: e_shoff = 0xffffffffffffffff --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 EShOff: 0xffffffffffffffff ## Check that llvm-objdump reports an error when it tries to dump a ## symbol name and .strtab is empty. # RUN: yaml2obj %s --docnum=28 -o %t28 # RUN: not llvm-objdump --syms %t28 2>&1 | FileCheck -DFILE=%t28 --check-prefix=STRTAB-EMPTY2 %s # STRTAB-EMPTY2: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .strtab Type: SHT_STRTAB Content: "" Symbols: - Name: foo ## Check that we report a warning if SHT_GNU_versym has invalid ## sh_entsize value (3 instead of 2) when trying to access the entries. # RUN: yaml2obj %s --docnum=29 -o %t29 # RUN: llvm-readobj -V %t29 2>&1 | FileCheck -DFILE=%t29 --check-prefix=INVALID-VER-SHENTSIZE %s # INVALID-VER-SHENTSIZE: warning: '[[FILE]]': cannot read content of SHT_GNU_versym section with index 1: section [index 1] has invalid sh_entsize: expected 2, but got 3 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB OSABI: ELFOSABI_FREEBSD Type: ET_DYN Machine: EM_X86_64 Sections: - Name: .gnu.version Type: SHT_GNU_versym EntSize: 0x0000000000000003 Entries: [ ] ## Needed to trigger creation of .dynsym. DynamicSymbols: - Name: foo Binding: STB_GLOBAL ## Check the case when e_shstrndx == SHN_XINDEX, but null section's sh_link contains ## the index of a section header string table that is larger than the number of the sections. # RUN: yaml2obj --docnum=30 %s -o %t30 # RUN: not llvm-objcopy %t30 2>&1 | FileCheck %s -DFILE=%t30 --check-prefix=INVALID-SHSTRTAB-INDEX # INVALID-SHSTRTAB-INDEX: error: section header string table index 255 does not exist --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_REL Machine: EM_X86_64 ## SHN_XINDEX == 0xffff. EShStrNdx: 0xffff Sections: - Type: SHT_NULL Link: 0xff ## Check the case when the e_phoff field is invalid. # RUN: yaml2obj --docnum=31 %s -o %t31 # RUN: not llvm-objdump --private-headers %t31 2>&1 | FileCheck -DFILE=%t31 %s --check-prefix=INVALID-PHOFF # INVALID-PHOFF: error: '[[FILE]]': program headers are longer than binary of size 280: e_phoff = 0xffffff, e_phnum = 0, e_phentsize = 0 --- !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 EPhOff: 0xffffff