<< COFF::SCT_COMPLEX_TYPE_SHIFT);
}
-void MCWinCOFFStreamer::EmitCOFFSectionIndex(MCSymbol const *Symbol) {
+void MCWinCOFFStreamer::EmitCOFFSectionIndex(const MCSymbol *Symbol) {
+ visitUsedSymbol(*Symbol);
MCDataFragment *DF = getOrCreateDataFragment();
const MCSymbolRefExpr *SRE = MCSymbolRefExpr::create(Symbol, getContext());
MCFixup Fixup = MCFixup::create(DF->getContents().size(), SRE, FK_SecRel_2);
DF->getContents().resize(DF->getContents().size() + 2, 0);
}
-void MCWinCOFFStreamer::EmitCOFFSecRel32(MCSymbol const *Symbol,
+void MCWinCOFFStreamer::EmitCOFFSecRel32(const MCSymbol *Symbol,
uint64_t Offset) {
+ visitUsedSymbol(*Symbol);
MCDataFragment *DF = getOrCreateDataFragment();
// Create Symbol A for the relocation relative reference.
const MCExpr *MCE = MCSymbolRefExpr::create(Symbol, getContext());
+++ /dev/null
-// RUN: not llvm-mc -filetype=obj -triple i686-pc-win32 %s 2>%t
-// RUN: FileCheck %s < %t
-
-// CHECK: symbol 'bar' can not be undefined
-// CHECK: symbol 'baz' can not be undefined
-
-.data
-foo:
- .secidx bar
- .secidx baz
--- /dev/null
+# RUN: llvm-mc -filetype=obj -triple i686-pc-win32 %s -o %t.obj
+# RUN: llvm-readobj -symbols -relocations %t.obj | FileCheck %s
+
+# Previously .secrel32 and .secidx relocations against undefined symbols
+# resulted in an error. That was a mistake. The linker is fully capable of
+# resolving these relocations against symbols in other object files. Such
+# relocations can be found in the MSVCRT debug info describing linker-provided
+# symbols like __safe_se_handler_table and __guard_fids_table.
+
+.data
+foo:
+ .secrel32 bar
+ .secidx baz
+
+
+# CHECK: Relocations [
+# CHECK: Section (2) .data {
+# CHECK: 0x0 IMAGE_REL_I386_SECREL bar
+# CHECK: 0x4 IMAGE_REL_I386_SECTION baz
+# CHECK: }
+# CHECK: ]
+
+# CHECK: Symbol {
+# CHECK: Name: bar
+# CHECK-NEXT: Value: 0
+# CHECK-NEXT: Section: IMAGE_SYM_UNDEFINED (0)
+# CHECK: Symbol {
+# CHECK: Name: baz
+# CHECK-NEXT: Value: 0
+# CHECK-NEXT: Section: IMAGE_SYM_UNDEFINED (0)