mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-11-23 19:23:23 +01:00
cd6681160b
Splitted out from D85519. Currently we report "PT_DYNAMIC segment offset + size exceeds the size of the file", this changes it to "PT_DYNAMIC segment offset (0x1234) + file size (0x5678) exceeds the size of the file (0x68ab)" Differential revision: https://reviews.llvm.org/D85654
681 lines
21 KiB
Plaintext
681 lines
21 KiB
Plaintext
## Check that llvm-objdump reports an error when
|
|
## .shstrtab has an invalid type.
|
|
|
|
# RUN: yaml2obj %s --docnum=1 -o %t1
|
|
# RUN: not llvm-objdump -s %t1 2>&1 | FileCheck %s -DFILE=%t1 --check-prefix=INVALID-SHTYPE
|
|
|
|
# INVALID-SHTYPE: error: '[[FILE]]': invalid sh_type for string table section [index 1]: expected SHT_STRTAB, but got SHT_PROGBITS
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .shstrtab
|
|
Type: SHT_PROGBITS
|
|
|
|
## Check that llvm-objdump reports an error when
|
|
## .shstrtab has an invalid zero-size.
|
|
|
|
# RUN: yaml2obj %s --docnum=2 -o %t2
|
|
# RUN: not llvm-objdump -s %t2 2>&1 | FileCheck %s -DFILE=%t2 --check-prefix=STRTAB-EMPTY
|
|
|
|
# STRTAB-EMPTY: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .shstrtab
|
|
Type: SHT_STRTAB
|
|
Size: 0
|
|
|
|
## Check that llvm-objdump reports an error when .shstrtab has an invalid
|
|
## size that goes past the end of the file.
|
|
|
|
# RUN: not llvm-objdump -s %p/Inputs/invalid-strtab-size.elf 2>&1 \
|
|
# RUN: | FileCheck %s -DFILE=%p/Inputs/invalid-strtab-size.elf --check-prefix=INVALID-STRTAB-SIZE
|
|
|
|
# INVALID-STRTAB-SIZE: error: '[[FILE]]': section [index 1] has a sh_offset (0x70) + sh_size (0xffffff) that is greater than the file size (0x218)
|
|
|
|
## Check that llvm-dwarfdump reports an error during relocation resolution
|
|
## when instead of expected SHT_RELA section it locates a section of a different type.
|
|
|
|
# RUN: yaml2obj %s --docnum=3 -o %t3
|
|
# RUN: not --crash llvm-dwarfdump -debug-line %t3 2>&1 | FileCheck --check-prefix=RELA %s
|
|
|
|
# RELA: LLVM ERROR: Section is not SHT_RELA
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .debug_line
|
|
Type: SHT_PROGBITS
|
|
## The exact content does not matter here. We can use any minimal valid debug section
|
|
## which is a target for relocation. The idea is to trigger the code that reads the
|
|
## relocation's addend during relocation resolution. It should fail if called on
|
|
## a non-SHT_RELA section.
|
|
Content: 380000000200210000000101FB0E0D00010101010000000100000100676C6F62616C2E63707000000000000009020000000000000000130237000101
|
|
- Name: .rela.debug_line
|
|
Type: SHT_REL
|
|
Info: .debug_line
|
|
Relocations:
|
|
- Offset: 0x000000000000002E
|
|
Type: R_X86_64_64
|
|
|
|
## Check that llvm-objdump reports an error when it tries to dump section names
|
|
## and .shstrtab is not null-terminated.
|
|
|
|
# RUN: yaml2obj %s --docnum=4 -o %t4
|
|
# RUN: not llvm-objdump -s %t4 2>&1 | FileCheck -DFILE=%t4 --check-prefix=SHSTRTAB-NON-TERM %s
|
|
|
|
# SHSTRTAB-NON-TERM: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is non-null terminated
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .shstrtab
|
|
Type: SHT_STRTAB
|
|
Content: "11"
|
|
|
|
## Check that llvm-objdump reports an error when it tries to dump a symbol name and
|
|
## .strtab is not null-terminated.
|
|
|
|
# RUN: yaml2obj %s --docnum=5 -o %t5
|
|
# RUN: not llvm-objdump --syms %t5 2>&1 | FileCheck --check-prefix=NONULL %s
|
|
|
|
# NONULL: error: {{.*}}: SHT_STRTAB string table section [index 1] is non-null terminated
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .strtab
|
|
Type: SHT_STRTAB
|
|
Content: "11"
|
|
Symbols:
|
|
- Name: foo
|
|
|
|
## Check that llvm-readobj reports an error if .symtab has an invalid sh_entsize.
|
|
|
|
# RUN: yaml2obj %s --docnum=6 -o %t6
|
|
# RUN: llvm-readobj --symbols %t6 2>&1 | FileCheck -DFILE=%t6 --check-prefix=INVALID-SYM-SIZE %s
|
|
|
|
# INVALID-SYM-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has an invalid sh_entsize: 32
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .symtab
|
|
Type: SHT_SYMTAB
|
|
EntSize: 32
|
|
Symbols:
|
|
- Name: foo
|
|
|
|
## Check that llvm-readobj reports a warning if .dynsym has an invalid sh_entsize.
|
|
|
|
# RUN: yaml2obj %s --docnum=7 -o %t7
|
|
# RUN: llvm-readobj --dyn-symbols %t7 2>&1 | FileCheck -DFILE=%t7 --check-prefix=INVALID-DYNSYM-SIZE %s
|
|
|
|
# INVALID-DYNSYM-SIZE: warning: '[[FILE]]': SHT_DYNSYM section with index 1 has invalid size (0x30) or entry size (0x20)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .dynsym
|
|
Type: SHT_DYNSYM
|
|
EntSize: 32
|
|
DynamicSymbols:
|
|
- Name: foo
|
|
|
|
## Check that llvm-readobj reports a warning if .symtab has an invalid sh_link value,
|
|
## which is greater than number of sections.
|
|
|
|
# RUN: yaml2obj %s --docnum=8 -o %t8
|
|
# RUN: llvm-readobj --symbols %t8 2>&1 | FileCheck -DFILE=%t8 --check-prefix=INVALID-SYMTAB-LINK %s
|
|
|
|
# INVALID-SYMTAB-LINK: warning: '[[FILE]]': unable to get the string table for the SHT_SYMTAB section: invalid section index: 255
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .symtab
|
|
Type: SHT_SYMTAB
|
|
Link: 0xFF
|
|
|
|
## Check that llvm-readobj reports an error when trying to dump sections
|
|
## when the e_shentsize field is broken.
|
|
|
|
# RUN: yaml2obj %s --docnum=9 -o %t9
|
|
# RUN: not llvm-readobj -S %t9 2>&1 | FileCheck --check-prefix=INVALID-SH-ENTSIZE %s
|
|
|
|
# INVALID-SH-ENTSIZE: error: {{.*}}: invalid e_shentsize in ELF header: 1
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShEntSize: 1
|
|
|
|
## Check that llvm-readobj reports a warning if .symtab has sh_size
|
|
## that is not a multiple of sh_entsize.
|
|
|
|
# RUN: yaml2obj %s --docnum=10 -o %t10
|
|
# RUN: llvm-readobj --symbols %t10 2>&1 | FileCheck -DFILE=%t10 --check-prefix=INVALID-SYMTAB-SIZE %s
|
|
|
|
# INVALID-SYMTAB-SIZE: warning: '[[FILE]]': unable to read symbols from the SHT_SYMTAB section: section [index 1] has an invalid sh_size (1) which is not a multiple of its sh_entsize (24)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .symtab
|
|
Type: SHT_SYMTAB
|
|
Size: 1
|
|
|
|
## Test that llvm-readobj reports an error if SHT_SYMTAB_SHNDX section has
|
|
## invalid sh_size which should be:
|
|
## sizeof(.symtab_shndx) = (sizeof(.symtab) / entsize(.symtab)) * entsize(.symtab_shndx)
|
|
|
|
# RUN: yaml2obj %s --docnum=11 -o %t11
|
|
# RUN: not llvm-readobj --symbols %t11 2>&1 | FileCheck --check-prefix=INVALID-XINDEX-SIZE %s
|
|
|
|
# INVALID-XINDEX-SIZE: error: {{.*}}: SHT_SYMTAB_SHNDX has 2 entries, but the symbol table associated has 1
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .symtab_shndx
|
|
Type: SHT_SYMTAB_SHNDX
|
|
Entries: [ 0, 1 ]
|
|
Link: .symtab
|
|
Symbols: []
|
|
|
|
## Check that llvm-readobj reports a warning when the e_phentsize field is broken.
|
|
|
|
# RUN: llvm-readobj --program-headers %p/Inputs/invalid-e_shnum.elf 2>&1 | \
|
|
# RUN: FileCheck -DFILE=%p/Inputs/invalid-e_shnum.elf --check-prefix=INVALID-PH-ENTSIZE %s
|
|
|
|
# INVALID-PH-ENTSIZE: warning: '[[FILE]]': unable to dump program headers: invalid e_phentsize: 12336
|
|
|
|
## Check that llvm-readobj reports a warning when we have no SHT_SYMTAB_SHNDX section,
|
|
## but have a symbol referencing it.
|
|
|
|
# RUN: llvm-readobj --symbols %p/Inputs/invalid-ext-symtab-index.elf-x86-64 2>&1 | \
|
|
# RUN: FileCheck -DFILE=%p/Inputs/invalid-ext-symtab-index.elf-x86-64 --check-prefix=INVALID-EXT-SYMTAB-INDEX %s
|
|
|
|
# INVALID-EXT-SYMTAB-INDEX: warning: '[[FILE]]': extended symbol index (0) is past the end of the SHT_SYMTAB_SHNDX section of size 0
|
|
# INVALID-EXT-SYMTAB-INDEX: Section: Reserved (0xFFFF)
|
|
|
|
## Check that llvm-readobj reports an error if a relocation section
|
|
## has a broken sh_offset (past the end of the file).
|
|
|
|
# RUN: yaml2obj %s --docnum=12 -o %t12
|
|
# RUN: yaml2obj %s --docnum=13 -o %t13
|
|
# RUN: llvm-readobj -r %t12 2>&1 | FileCheck -DFILE=%t12 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_REL %s
|
|
# RUN: llvm-readobj -r %t13 2>&1 | FileCheck -DFILE=%t13 --check-prefix=INVALID-RELOC-SH-OFFSET -DTYPE=SHT_RELA %s
|
|
|
|
# INVALID-RELOC-SH-OFFSET: warning: '[[FILE]]': unable to read relocations from [[TYPE]] section with index 1: section [index 1] has a sh_offset (0x10000) + sh_size (0x0) that is greater than the file size (0x160)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_386
|
|
Sections:
|
|
- Name: .rel
|
|
Type: SHT_REL
|
|
ShOffset: 0x10000
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .rela
|
|
Type: SHT_RELA
|
|
ShOffset: 0x10000
|
|
|
|
## Check that llvm-readobj reports a warning when we try to print section symbols and
|
|
## .shstrtab has a broken sh_offset so large that sh_offset + sh_size overflows the platform address size type.
|
|
|
|
# RUN: yaml2obj %s --docnum=14 -o %t14
|
|
# RUN: llvm-readobj --symbols %t14 2>&1 | FileCheck -DFILE=%t14 --check-prefix=INVALID-SECTION-SIZE2 %s
|
|
|
|
# INVALID-SECTION-SIZE2: Symbol {
|
|
# INVALID-SECTION-SIZE2: Name: symbol (1)
|
|
# INVALID-SECTION-SIZE2-NEXT: Value: 0x123
|
|
# INVALID-SECTION-SIZE2-NEXT: Size: 0
|
|
# INVALID-SECTION-SIZE2-NEXT: Binding: Local (0x0)
|
|
# INVALID-SECTION-SIZE2-NEXT: Type: None (0x0)
|
|
# INVALID-SECTION-SIZE2-NEXT: Other: 0
|
|
# INVALID-SECTION-SIZE2-NEXT: warning: '[[FILE]]': section [index 1] has a sh_offset (0xffffffff) + sh_size (0x1b) that cannot be represented
|
|
# INVALID-SECTION-SIZE2-NEXT: Section: <?> (0x1)
|
|
# INVALID-SECTION-SIZE2-NEXT: }
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS32
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_386
|
|
Sections:
|
|
- Name: .shstrtab
|
|
Type: SHT_STRTAB
|
|
ShOffset: 0xFFFFFFFF
|
|
Symbols:
|
|
- Name: symbol
|
|
Section: .shstrtab
|
|
Value: 0x123
|
|
|
|
## Check that llvm-readobj reports an error when trying to dump sections
|
|
## when the e_shnum field is broken (is greater than the actual number of sections).
|
|
|
|
# RUN: yaml2obj %s --docnum=15 -o %t15
|
|
# RUN: not llvm-readobj -S %t15 2>&1 | FileCheck --check-prefix=INVALID-SECTION-NUM %s
|
|
|
|
# INVALID-SECTION-NUM: error: {{.*}}: section table goes past the end of file
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShNum: 0xFF
|
|
|
|
## Check llvm-readobj does not crash on a truncated ELF.
|
|
|
|
## Create a truncated ELF object with ELFCLASSNONE class using echo.
|
|
## 0x7f, 'E', 'L', 'F', ELFCLASS64(2), ELFDATA2LSB(1),
|
|
## EV_CURRENT(1), ELFOSABI_LINUX(3), <padding zero bytes>, ET_REL(1), EM_NONE(0)
|
|
# RUN: echo -e -n "\x7f\x45\x4c\x46\x02\x01\x01\x03\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00" > %t11
|
|
# RUN: not llvm-readobj -r %t11 2>&1 | FileCheck --check-prefix=INVALID-BUFFER %s
|
|
|
|
# INVALID-BUFFER: error: {{.*}}': invalid buffer: the size (18) is smaller than an ELF header (64)
|
|
|
|
# RUN: not llvm-readobj %p/Inputs/invalid-coff-header-too-small 2>&1 | FileCheck --check-prefix=COFF-HEADER %s
|
|
# COFF-HEADER: The file was not recognized as a valid object file
|
|
|
|
## Check that llvm-readobj reports an error if section name offset
|
|
## overflows the section name string table.
|
|
|
|
# RUN: yaml2obj %s --docnum=16 -o %t16
|
|
# RUN: llvm-readobj --sections %t16 2>&1 | FileCheck -DFILE=%t16 --check-prefix=BROKEN-SECNAME %s
|
|
|
|
## BROKEN-SECNAME: warning: '[[FILE]]': unable to get the name of SHT_STRTAB section with index 2: a section [index 2] has an invalid sh_name (0xb) offset which goes past the end of the section name string table
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .shstrtab
|
|
Type: SHT_STRTAB
|
|
Size: 1
|
|
|
|
## Check that llvm-readobj reports an error if a section has a broken offset
|
|
## that goes past the end of the file.
|
|
|
|
# RUN: yaml2obj %s --docnum=17 -o %t17
|
|
# RUN: not llvm-readobj --sections --section-data %t17 2>&1 \
|
|
# RUN: | FileCheck -DFILE=%t17 --check-prefix=BROKEN-SECSHOFFSET %s
|
|
|
|
# BROKEN-SECSHOFFSET: error: '[[FILE]]': section [index 1] has a sh_offset (0xffff0000) + sh_size (0x0) that is greater than the file size (0x160)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .foo
|
|
Type: SHT_PROGBITS
|
|
ShOffset: 0xFFFF0000
|
|
|
|
## Check that llvm-readobj reports a warning if symbol name
|
|
## offset goes past the end of the symbol string table.
|
|
|
|
# RUN: yaml2obj %s --docnum=18 -o %t18
|
|
# RUN: llvm-readobj --symbols %t18 2>&1 | FileCheck -DFILE=%t18 --check-prefix=INVALID-SYM-NAME %s
|
|
|
|
# INVALID-SYM-NAME: warning: '[[FILE]]': st_name (0x1) is past the end of the string table of size 0x1
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .strtab
|
|
Type: SHT_STRTAB
|
|
Size: 1
|
|
Symbols:
|
|
- Name: foo
|
|
|
|
## Version index in .gnu.version overflows the version map.
|
|
## Check llvm-readobj reports it.
|
|
|
|
# RUN: yaml2obj %s --docnum=19 -o %t19
|
|
# RUN: llvm-readobj -dt %t19 2>&1 | FileCheck -DFILE=%t19 --check-prefix=INVALID-VERSION %s
|
|
|
|
# INVALID-VERSION: warning: '[[FILE]]': SHT_GNU_versym section refers to a version index 255 which is missing
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .gnu.version
|
|
Type: SHT_GNU_versym
|
|
Entries: [ 0xFF ]
|
|
DynamicSymbols:
|
|
- Name: foo
|
|
|
|
## ELF header contains e_phentsize field with a value != sizeof(Elf_Phdr).
|
|
## Check llvm-readobj reports it.
|
|
|
|
# RUN: llvm-readobj -l %p/Inputs/corrupt-invalid-phentsize.elf.x86-64 2>&1 \
|
|
# RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-phentsize.elf.x86-64 --check-prefix=PHENTSIZE %s
|
|
|
|
# PHENTSIZE: warning: '[[FILE]]': unable to read program headers to locate the PT_DYNAMIC segment: invalid e_phentsize: 57
|
|
|
|
## The dynamic table contains DT_STRTAB with a value that is not in any loadable segment.
|
|
## Check llvm-readobj reports it.
|
|
|
|
# RUN: yaml2obj %s --docnum=20 -o %t20
|
|
# RUN: llvm-readobj --dynamic-table %t20 2>&1 | FileCheck -DFILE=%t20 --check-prefix=INVALID-DTSTRTAB %s
|
|
|
|
# INVALID-DTSTRTAB: warning: '[[FILE]]': Unable to parse DT_STRTAB: virtual address is not in any segment: 0xffff0000
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_EXEC
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .dynamic
|
|
Type: SHT_DYNAMIC
|
|
Address: 0x1000
|
|
Entries:
|
|
- Tag: DT_STRTAB
|
|
Value: 0xFFFF0000
|
|
- Tag: DT_NULL
|
|
Value: 0x0
|
|
ProgramHeaders:
|
|
- Type: PT_LOAD
|
|
VAddr: 0x1000
|
|
Sections:
|
|
- Section: .dynamic
|
|
|
|
## Check that llvm-readobj reports a warning when a dynamic relocation section
|
|
## has sh_entsize field with size != sizeof(Elf_Rela).
|
|
|
|
# RUN: llvm-readobj --dyn-relocations \
|
|
# RUN: %p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 2>&1 \
|
|
# RUN: | FileCheck -DFILE=%p/Inputs/corrupt-invalid-relocation-size.elf.x86-64 --check-prefix=RELOC-BROKEN-ENTSIZE %s
|
|
|
|
# RELOC-BROKEN-ENTSIZE: warning: '[[FILE]]': invalid DT_RELASZ value (0x18) or DT_RELAENT value (0x19)
|
|
|
|
## Check that llvm-readobj reports a warning when .dynamic section has an invalid
|
|
## size, which isn't a multiple of the dynamic entry size.
|
|
|
|
# RUN: yaml2obj %s --docnum=21 -o %t21
|
|
# RUN: llvm-readobj --dyn-relocations %t21 2>&1 | FileCheck -DFILE=%t21 --check-prefix=DYN-TABLE-SIZE %s
|
|
|
|
# DYN-TABLE-SIZE: warning: '[[FILE]]': SHT_DYNAMIC section with index 1 has invalid size (0x1){{$}}
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_EXEC
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .dynamic
|
|
Type: SHT_DYNAMIC
|
|
Content: "00"
|
|
|
|
## PT_DYNAMIC's p_offset field is so large that p_offset + p_filesz is larger
|
|
## than the object size. Check llvm-readobj reports it.
|
|
|
|
# RUN: yaml2obj %s --docnum=22 -o %t22
|
|
# RUN: llvm-readobj --dyn-relocations %t22 2>&1 | FileCheck -DFILE=%t22 --check-prefix=DYN-TABLE-PHDR %s
|
|
|
|
# DYN-TABLE-PHDR: warning: '[[FILE]]': PT_DYNAMIC segment offset (0xffff0000) + file size (0x0) exceeds the size of the file (0x150)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_EXEC
|
|
Machine: EM_X86_64
|
|
ProgramHeaders:
|
|
- Type: PT_DYNAMIC
|
|
Offset: 0xffff0000
|
|
|
|
## PT_DYNAMIC's p_filesz field is so large that p_offset + p_filesz is larger
|
|
## than the object size. Check llvm-readobj reports it.
|
|
|
|
# RUN: yaml2obj %s --docnum=23 -o %t23
|
|
# RUN: llvm-readobj --dyn-relocations %t23 2>&1 \
|
|
# RUN: | FileCheck -DFILE=%t23 --check-prefix=DYN-TABLE-PHDR2 %s
|
|
|
|
# DYN-TABLE-PHDR2: warning: '[[FILE]]': PT_DYNAMIC segment offset (0x78) + file size (0xffff0000) exceeds the size of the file (0x1a8)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_EXEC
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .dynamic
|
|
Type: SHT_DYNAMIC
|
|
Entries:
|
|
- Tag: DT_NULL
|
|
Value: 0
|
|
ProgramHeaders:
|
|
- Type: PT_DYNAMIC
|
|
FileSize: 0xffff0000
|
|
Sections:
|
|
- Section: .dynamic
|
|
|
|
# RUN: yaml2obj --docnum=24 %s -o %t24
|
|
# RUN: not obj2yaml 2>&1 %t24 | FileCheck %s -DFILE=%t24 --check-prefix=INVALID-SHSTRNDX
|
|
|
|
# INVALID-SHSTRNDX: Error reading file: [[FILE]]: section header string table index 255 does not exist
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShStrNdx: 0xFF
|
|
Sections:
|
|
- Name: .foo
|
|
Type: SHT_PROGBITS
|
|
|
|
## We report an error if the number of sections stored in sh_size
|
|
## is greater than UINT64_MAX / sizeof(Elf_Shdr) == 288230376151711743.
|
|
## Here we check that do not crash on a border value.
|
|
|
|
# RUN: yaml2obj --docnum=25 %s -o %t25
|
|
# RUN: not llvm-readobj -h %t25 2>&1 | FileCheck -DFILE=%t25 --check-prefix=INVALID-SEC-NUM1 %s
|
|
|
|
# INVALID-SEC-NUM1: error: '[[FILE]]': invalid section header table offset (e_shoff = 0x58) or invalid number of sections specified in the first section header's sh_size field (0x3ffffffffffffff)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShNum: 0x0
|
|
Sections:
|
|
- Type: SHT_NULL
|
|
Size: 288230376151711743
|
|
|
|
## See above, but now we test the UINT64_MAX / sizeof(Elf_Shdr) value.
|
|
## The error is slightly different in this case.
|
|
|
|
# RUN: yaml2obj --docnum=26 %s -o %t26
|
|
# RUN: not llvm-readobj -h %t26 2>&1 | FileCheck -DFILE=%t26 --check-prefix=INVALID-SEC-NUM2 %s
|
|
|
|
# INVALID-SEC-NUM2: error: '[[FILE]]': invalid number of sections specified in the NULL section's sh_size field (288230376151711744)
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShNum: 0x0
|
|
Sections:
|
|
- Type: SHT_NULL
|
|
Size: 288230376151711744
|
|
|
|
## Check the case when SHOff is too large. SHOff + sizeof(Elf_Shdr) overflows the uint64 type.
|
|
|
|
# RUN: yaml2obj --docnum=27 %s -o %t27
|
|
# RUN: not llvm-readobj -h %t27 2>&1 | FileCheck -DFILE=%t27 --check-prefix=INVALID-SEC-NUM3 %s
|
|
|
|
# INVALID-SEC-NUM3: error: '[[FILE]]': section header table goes past the end of the file: e_shoff = 0xffffffffffffffff
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
EShOff: 0xffffffffffffffff
|
|
|
|
## Check that llvm-objdump reports an error when it tries to dump a
|
|
## symbol name and .strtab is empty.
|
|
|
|
# RUN: yaml2obj %s --docnum=28 -o %t28
|
|
# RUN: not llvm-objdump --syms %t28 2>&1 | FileCheck -DFILE=%t28 --check-prefix=STRTAB-EMPTY2 %s
|
|
|
|
# STRTAB-EMPTY2: error: '[[FILE]]': SHT_STRTAB string table section [index 1] is empty
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .strtab
|
|
Type: SHT_STRTAB
|
|
Content: ""
|
|
Symbols:
|
|
- Name: foo
|
|
|
|
## Check that we report a warning if SHT_GNU_versym has invalid
|
|
## sh_entsize value (3 instead of 2) when trying to access the entries.
|
|
|
|
# RUN: yaml2obj %s --docnum=29 -o %t29
|
|
# RUN: llvm-readobj -V %t29 2>&1 | FileCheck -DFILE=%t29 --check-prefix=INVALID-VER-SHENTSIZE %s
|
|
|
|
# INVALID-VER-SHENTSIZE: warning: '[[FILE]]': cannot read content of SHT_GNU_versym section with index 1: section [index 1] has an invalid sh_entsize: 3
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
OSABI: ELFOSABI_FREEBSD
|
|
Type: ET_DYN
|
|
Machine: EM_X86_64
|
|
Sections:
|
|
- Name: .gnu.version
|
|
Type: SHT_GNU_versym
|
|
EntSize: 0x0000000000000003
|
|
Entries: [ ]
|
|
Link: .dynsym
|
|
## Needed to trigger creation of .dynsym.
|
|
DynamicSymbols:
|
|
- Name: foo
|
|
Binding: STB_GLOBAL
|
|
|
|
## Check the case when e_shstrndx == SHN_XINDEX, but null section's sh_link contains
|
|
## the index of a section header string table that is larger than the number of the sections.
|
|
|
|
# RUN: yaml2obj --docnum=30 %s -o %t30
|
|
# RUN: not llvm-objcopy %t30 2>&1 | FileCheck %s -DFILE=%t30 --check-prefix=INVALID-SHSTRTAB-INDEX
|
|
|
|
# INVALID-SHSTRTAB-INDEX: error: section header string table index 255 does not exist
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_REL
|
|
Machine: EM_X86_64
|
|
## SHN_XINDEX == 0xffff.
|
|
EShStrNdx: 0xffff
|
|
Sections:
|
|
- Type: SHT_NULL
|
|
Link: 0xff
|
|
|
|
## Check the case when the e_phoff field is invalid.
|
|
# RUN: yaml2obj --docnum=31 %s -o %t31
|
|
# RUN: not llvm-objdump --private-headers %t31 2>&1 | FileCheck -DFILE=%t31 %s --check-prefix=INVALID-PHOFF
|
|
|
|
# INVALID-PHOFF: error: '[[FILE]]': program headers are longer than binary of size 280: e_phoff = 0xffffff, e_phnum = 0, e_phentsize = 0
|
|
|
|
--- !ELF
|
|
FileHeader:
|
|
Class: ELFCLASS64
|
|
Data: ELFDATA2LSB
|
|
Type: ET_EXEC
|
|
Machine: EM_X86_64
|
|
EPhOff: 0xffffff
|