Index: ELF/Arch/PPC64.cpp =================================================================== --- ELF/Arch/PPC64.cpp +++ ELF/Arch/PPC64.cpp @@ -93,6 +93,8 @@ // And because the lowest non-zero 256M boundary is 0x10000000, PPC64 linkers // use 0x10000000 as the starting address. DefaultImageBase = 0x10000000; + + TrapInstr = 0x7fe00008; } static uint32_t getEFlags(InputFile *File) { Index: test/ELF/fill-trap-ppc.s =================================================================== --- /dev/null +++ test/ELF/fill-trap-ppc.s @@ -0,0 +1,30 @@ +# REQUIRES: ppc + +# RUN: llvm-mc -filetype=obj -triple=powerpc64le-linux %s -o %t.o +# RUN: ld.lld %t.o -o %t.ppc64le +# RUN: llvm-readobj -program-headers %t.ppc64le | FileCheck %s +# RUN: od -Ax -t x4 -N16 -j0x10ff0 %t.ppc64le | FileCheck %s -check-prefix=FILL + +# RUN: llvm-mc -filetype=obj -triple=powerpc64-linux %s -o %t.o +# RUN: ld.lld %t.o -o %t.ppc64 +# RUN: llvm-readobj -program-headers %t.ppc64 | FileCheck %s +# RUN: od -Ax -t x4 -N16 -j0x10ff0 %t.ppc64 | FileCheck %s -check-prefix=FILL + +# CHECK: ProgramHeader { +# CHECK: Type: PT_LOAD +# CHECK: Offset: 0x10000{{$}} +# CHECK-NEXT: VirtualAddress: +# CHECK-NEXT: PhysicalAddress: +# CHECK-NEXT: FileSize: 4096 +# CHECK-NEXT: MemSize: +# CHECK-NEXT: Flags [ +# CHECK-NEXT: PF_R +# CHECK-NEXT: PF_X +# CHECK-NEXT: ] + +## Check that executable page is filled with traps at its end. +# FILL: 010ff0 7fe00008 7fe00008 7fe00008 7fe00008 + +.globl _start +_start: + nop