## Check that we can dump an offloading binary inside of an ELF section.
# RUN: yaml2obj %s -o %t.elf
-# RUN: llvm-objcopy --add-section .llvm.offloading=%t.bin %t.elf
-# RUN: llvm-objcopy --set-section-alignment .llvm.offloading=8 %t.elf
+# RUN: llvm-objcopy --update-section .llvm.offloading=%t.bin %t.elf
# RUN: llvm-objdump --offloading %t.elf | FileCheck %s --check-prefixes=CHECK,ELF --match-full-lines --strict-whitespace --implicit-check-not={{.}}
!ELF
Class: ELFCLASS64
Data: ELFDATA2LSB
Type: ET_EXEC
+Sections:
+ - Name: .llvm.offloading
+ Type: SHT_LLVM_OFFLOADING
+ Flags: [ SHF_EXCLUDE ]
+ AddressAlign: 0x0000000000000008
# ELF:{{.*}}file format elf64-unknown
# ELF-EMPTY:
Type: ET_EXEC
Sections:
- Name: .llvm.offloading
- Type: SHT_PROGBITS
+ Type: SHT_LLVM_OFFLOADING
Flags: [ SHF_EXCLUDE ]
Address: 0x0
ShOffset: 0x99999
Type: ET_EXEC
Sections:
- Name: .llvm.offloading
- Type: SHT_PROGBITS
+ Type: SHT_LLVM_OFFLOADING
Flags: [ SHF_EXCLUDE ]
Address: 0x0
AddressAlign: 0x0000000000000008
--- /dev/null
+# RUN: yaml2obj %s -o %t
+# RUN: llvm-objdump --offloading %t 2>&1 | FileCheck -DFILENAME=%t %s
+
+--- !COFF
+header:
+ Machine: IMAGE_FILE_MACHINE_AMD64
+ Characteristics: []
+sections:
+ - Name: .rdata
+ Characteristics: []
+ SectionData: 00
+symbols:
+
+# CHECK: warning: '[[FILENAME]]': --offloading is currently only supported for ELF targets
# RUN: yaml2obj %S/Inputs/malformed.yaml -o %t-bad.bin
# RUN: cat %t-bad.bin >> %t-good.bin
# RUN: yaml2obj %s -o %t.elf
-# RUN: llvm-objcopy --add-section .llvm.offloading=%t-good.bin %t.elf
-# RUN: llvm-objcopy --set-section-alignment .llvm.offloading=8 %t.elf
+# RUN: llvm-objcopy --update-section .llvm.offloading=%t-good.bin %t.elf
# RUN: llvm-objdump --offloading %t.elf 2>&1 | FileCheck %s -DFILENAME=%t.elf
!ELF
Class: ELFCLASS64
Data: ELFDATA2LSB
Type: ET_EXEC
+Sections:
+ - Name: .llvm.offloading
+ Type: SHT_LLVM_OFFLOADING
+ Flags: [ SHF_EXCLUDE ]
+ AddressAlign: 0x0000000000000008
# CHECK: OFFLOADING IMAGE [0]:
# CHECK: warning: '[[FILENAME]]': while parsing offloading files: The end of the file was unexpectedly encountered
//===----------------------------------------------------------------------===//
#include "OffloadDump.h"
#include "llvm-objdump.h"
+#include "llvm/Object/ELFObjectFile.h"
using namespace llvm;
using namespace llvm::object;
using namespace llvm::objdump;
-constexpr const char OffloadSectionString[] = ".llvm.offloading";
-
/// Get the printable name of the image kind.
static StringRef getImageName(const OffloadBinary &OB) {
switch (OB.getImageKind()) {
/// Print the embedded offloading contents of an ObjectFile \p O.
void llvm::dumpOffloadBinary(const ObjectFile &O) {
- for (SectionRef Sec : O.sections()) {
- Expected<StringRef> Name = Sec.getName();
- if (!Name || !Name->startswith(OffloadSectionString))
+ if (!O.isELF()) {
+ reportWarning("--offloading is currently only supported for ELF targets",
+ O.getFileName());
+ return;
+ }
+
+ for (ELFSectionRef Sec : O.sections()) {
+ if (Sec.getType() != ELF::SHT_LLVM_OFFLOADING)
continue;
Expected<StringRef> Contents = Sec.getContents();