Searched refs:PLT (Results 1 - 25 of 36) sorted by relevance
12
/external/llvm/test/MC/ELF/ |
H A D | plt.s | 5 jmp foo@PLT
|
H A D | weakref-plt.s | 4 call bar@PLT
|
H A D | weakref-reloc.s | 6 call zed@PLT
|
H A D | alias-reloc.s | 9 call bar@PLT
|
H A D | merge.s | 10 jmp foo@PLT
|
H A D | relocation-386.s | 45 // Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol 69 // Relocation 29 (zed@PLT) is of type R_386_PLT32 and uses the symbol 83 calll bar2@PLT 106 call zed@PLT 119 movl zed@PLT(%eax), %eax
|
H A D | fde.s | 23 callq _Z2rsv@PLT
|
/external/swiftshader/third_party/LLVM/test/MC/ELF/ |
H A D | plt.s | 5 jmp foo@PLT
|
H A D | weakref-plt.s | 4 call bar@PLT
|
H A D | weakref-reloc.s | 7 call zed@PLT
|
H A D | alias-reloc.s | 9 call bar@PLT
|
H A D | merge.s | 13 jmp foo@PLT
|
H A D | relocation-386.s | 120 // Relocation 18 (zed@PLT) is of type R_386_PLT32 and uses the symbol 198 calll bar2@PLT 221 call zed@PLT
|
/external/boringssl/src/util/fipstools/testdata/x86_64-LabelRewrite/ |
H A D | in1.s | 14 # Jumps to PLT symbols are rewritten through redirectors. 15 call memcpy@PLT 16 jmp memcpy@PLT 17 jbe memcpy@PLT 19 # Jumps to local PLT symbols use their local targets. 20 call foo@PLT 21 jmp foo@PLT 22 jbe foo@PLT 25 call OPENSSL_ia32cap_get@PLT
|
H A D | out.s | 22 # Jumps to PLT symbols are rewritten through redirectors. 23 # WAS call memcpy@PLT 25 # WAS jmp memcpy@PLT 27 # WAS jbe memcpy@PLT 30 # Jumps to local PLT symbols use their local targets. 31 # WAS call foo@PLT 33 # WAS jmp foo@PLT 35 # WAS jbe foo@PLT 39 # WAS call OPENSSL_ia32cap_get@PLT 88 jmp memcpy@PLT [all...] |
/external/llvm/test/MC/X86/ |
H A D | macho-reloc-errors-x86_64.s | 8 mov %rax, thing@PLT 9 jmp thing@PLT
|
/external/llvm/test/MC/ARM/ |
H A D | elf-thumbfunc-reloc2.s | 18 bl foo(PLT)
|
/external/llvm/test/Instrumentation/AddressSanitizer/X86/ |
H A D | asm_mov_no_instrumentation.s | 10 # CHECK-NOT: callq __asan_report_load1@PLT 11 # CHECK-NOT: callq __asan_report_store1@PLT
|
H A D | asm_mov.s | 10 # CHECK: callq __asan_report_load1@PLT 16 # CHECK: callq __asan_report_store1@PLT 39 # CHECK: callq __asan_report_load16@PLT 45 # CHECK: callq __asan_report_store16@PLT
|
H A D | asm_swap_intel.s | 10 # CHECK: callq __asan_report_load8@PLT 16 # CHECK: callq __asan_report_load8@PLT 22 # CHECK: callq __asan_report_store8@PLT 28 # CHECK: callq __asan_report_store8@PLT
|
H A D | asm_rsp_mem_op.s | 12 # CHECK: callq __asan_report_load8@PLT 34 # CHECK: callq __asan_report_load8@PLT
|
/external/llvm/test/MC/SystemZ/ |
H A D | fixups.s | 31 # CHECK: brasl %r14, target@PLT # encoding: [0xc0,0xe5,A,A,A,A] 32 # CHECK-NEXT: # fixup A - offset: 2, value: target@PLT+2, kind: FK_390_PC32DBL 37 # CHECK: brasl %r14, target@PLT:tls_gdcall:sym # encoding: [0xc0,0xe5,A,A,A,A] 38 # CHECK-NEXT: # fixup A - offset: 2, value: target@PLT+2, kind: FK_390_PC32DBL 45 # CHECK: brasl %r14, target@PLT:tls_ldcall:sym # encoding: [0xc0,0xe5,A,A,A,A] 46 # CHECK-NEXT: # fixup A - offset: 2, value: target@PLT+2, kind: FK_390_PC32DBL 59 # CHECK: bras %r14, target@PLT # encoding: [0xa7,0xe5,A,A] 60 # CHECK-NEXT: # fixup A - offset: 2, value: target@PLT+2, kind: FK_390_PC16DBL 65 # CHECK: bras %r14, target@PLT:tls_gdcall:sym # encoding: [0xa7,0xe5,A,A] 66 # CHECK-NEXT: # fixup A - offset: 2, value: target@PLT [all...] |
H A D | insn-good.s | 663 #CHECK: bras %r0, bar@PLT # encoding: [0xa7,0x05,A,A] 664 #CHECK: fixup A - offset: 2, value: bar@PLT+2, kind: FK_390_PC16DBL 665 #CHECK: bras %r14, bar@PLT # encoding: [0xa7,0xe5,A,A] 666 #CHECK: fixup A - offset: 2, value: bar@PLT+2, kind: FK_390_PC16DBL 667 #CHECK: bras %r15, bar@PLT # encoding: [0xa7,0xf5,A,A] 668 #CHECK: fixup A - offset: 2, value: bar@PLT+2, kind: FK_390_PC16DBL 669 bras %r0,bar@PLT 670 bras %r14,bar@PLT 671 bras %r15,bar@PLT 706 #CHECK: brasl %r0, bar@PLT # encodin [all...] |
/external/llvm/test/Object/Inputs/ |
H A D | elfver.S | 15 call _puts@PLT
|
/external/elfutils/backends/ |
H A D | i386_reloc.def | 42 RELOC_TYPE (32PLT, REL)
|
Completed in 441 milliseconds
12