gold: Update x86-64 tests
authorH.J. Lu <hjl.tools@gmail.com>
Sun, 19 Jul 2020 14:14:47 +0000 (07:14 -0700)
committerH.J. Lu <hjl.tools@gmail.com>
Sun, 19 Jul 2020 14:18:07 +0000 (07:18 -0700)
commit 36938cabf0efcb053d1585e8580a4b3db438ca4e
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Jul 15 08:53:55 2020 +0200

    x86: avoid attaching suffixes to unambiguous insns

removed the 'a' suffix on call and jmp from disassembler output.  Update
gold x86-64 tests.

* testsuite/bnd_ifunc_1.sh: Updated.
* testsuite/bnd_plt_1.sh: Likewise.
* testsuite/split_x86_64.sh: Likewise.
* testsuite/x86_64_indirect_call_to_direct.sh: Likewise.

gold/ChangeLog
gold/testsuite/bnd_ifunc_1.sh
gold/testsuite/bnd_plt_1.sh
gold/testsuite/split_x86_64.sh
gold/testsuite/x86_64_indirect_call_to_direct.sh

index f7520ba3cdc13e0227045e39ea5154c4e1864480..81db095c4863d2f42144f36ee1a8373c9fe40576 100644 (file)
@@ -1,3 +1,10 @@
+2020-07-19  H.J. Lu  <hongjiu.lu@intel.com>
+
+       * testsuite/bnd_ifunc_1.sh: Updated.
+       * testsuite/bnd_plt_1.sh: Likewise.
+       * testsuite/split_x86_64.sh: Likewise.
+       * testsuite/x86_64_indirect_call_to_direct.sh: Likewise.
+
 2020-07-08  Nick Clifton  <nickc@redhat.com>
 
        * testsuite/script_test_7.sh: Adjust expected address of the .bss
index 98871bfbd48c4d6adcc31a5a2637908fc09daefb..fe77c75143cea9ec2875f18f28067bb08b128711 100755 (executable)
@@ -30,7 +30,7 @@ match()
   fi
 }
 
-match '[0-9a-f]*:.*bnd jmpq \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x18>' bnd_ifunc_1.stdout
-APLT_ADDR=$(egrep '[0-9a-f]*:.*bnd jmpq \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x18>' bnd_ifunc_1.stdout |
+match '[0-9a-f]*:.*bnd jmp \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x18>' bnd_ifunc_1.stdout
+APLT_ADDR=$(egrep '[0-9a-f]*:.*bnd jmp \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x18>' bnd_ifunc_1.stdout |
   sed -e 's/ *\([0-9a-f]*\):.*/\1/')
-match "bnd callq $APLT_ADDR" bnd_ifunc_1.stdout
+match "bnd call $APLT_ADDR" bnd_ifunc_1.stdout
index 06858148c143e1e292bba59b52aa6c3706a5f220..7a2207ef053fabaf1662355a78e8dde5dab112fe 100755 (executable)
@@ -37,16 +37,16 @@ get_plt()
 }
 
 # Extract the addresses of the indirect jumps, omitting the PLT0 entry.
-get_aplt_jmpq_addresses()
+get_aplt_jmp_addresses()
 {
   sed -n -e '/_GLOBAL_OFFSET_TABLE_+0x10/d' \
-        -e '/bnd jmpq \*0x[0-9a-f]*(%rip)/p' |
+        -e '/bnd jmp \*0x[0-9a-f]*(%rip)/p' |
     sed -e 's/ *\([0-9a-f]*\):.*/\1/'
 }
 
-match 'bnd jmpq \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x10>' bnd_plt_1.stdout
+match 'bnd jmp \*0x[0-9a-f]*\(%rip\) *# [0-9a-f]* <_GLOBAL_OFFSET_TABLE_\+0x10>' bnd_plt_1.stdout
 
-for APLT_ADDR in $(get_plt < bnd_ifunc_2.stdout | get_aplt_jmpq_addresses)
+for APLT_ADDR in $(get_plt < bnd_ifunc_2.stdout | get_aplt_jmp_addresses)
 do
-  match "bnd (callq|jmpq) $APLT_ADDR" bnd_ifunc_2.stdout
+  match "bnd (call|jmp) $APLT_ADDR" bnd_ifunc_2.stdout
 done
index 33bb4892ed6352b01ae18d83002d54599157d4fe..afde87d84dd304a65c086ed488b44abf55ce46a7 100755 (executable)
@@ -39,16 +39,16 @@ nomatch()
 }
 
 match 'cmp.*%fs:[^,]*,%rsp' split_x86_64_1.stdout
-match 'callq.*__morestack>?$' split_x86_64_1.stdout
+match 'call.*__morestack>?$' split_x86_64_1.stdout
 match 'lea.*-0x200\(%rsp\),' split_x86_64_1.stdout
 
 match 'stc' split_x86_64_2.stdout
-match 'callq.*__morestack_non_split>?$' split_x86_64_2.stdout
-nomatch 'callq.*__morestack>?$' split_x86_64_2.stdout
+match 'call.*__morestack_non_split>?$' split_x86_64_2.stdout
+nomatch 'call.*__morestack>?$' split_x86_64_2.stdout
 match 'lea.*-0x4200\(%rsp\),' split_x86_64_2.stdout
 
 match 'failed to match' split_x86_64_3.stdout
 
-match 'callq.*__morestack>?$' split_x86_64_4.stdout
+match 'call.*__morestack>?$' split_x86_64_4.stdout
 
 match 'cannot mix' split_x86_64_r.stdout
index d97a5fe681bafa67ffd3285cf3acf2b6dafa3fae..e0474bc5803e69a8e558ab04cf57c5e5e9293768 100755 (executable)
@@ -25,5 +25,5 @@
 
 set -e
 
-grep -q "callq[ ]\+[a-f0-9]\+ <foo>" x86_64_indirect_call_to_direct1.stdout
-grep -q "jmpq[ ]\+[a-f0-9]\+ <foo>" x86_64_indirect_jump_to_direct1.stdout
+grep -q "call[ ]\+[a-f0-9]\+ <foo>" x86_64_indirect_call_to_direct1.stdout
+grep -q "jmp[ ]\+[a-f0-9]\+ <foo>" x86_64_indirect_jump_to_direct1.stdout