tlsbin-2.d 2.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. #source: tlsbinpic.s
  2. #source: tlsbin.s
  3. #as: -little
  4. #ld: -EL --hash-style=sysv tmpdir/tlsbin-0-dso.so
  5. #readelf: -Ssrl
  6. #target: sh*-*-linux* sh*-*-netbsd*
  7. There are [0-9]+ section headers, starting at offset 0x[0-9a-f]+:
  8. Section Headers:
  9. +\[Nr\] Name +Type +Addr +Off +Size +ES Flg Lk Inf Al
  10. +\[ 0\] +NULL +0+ 0+ 0+ 0+ +0 +0 +0
  11. +\[ 1\] \.interp .*
  12. +\[ 2\] \.hash .*
  13. +\[ 3\] \.dynsym .*
  14. +\[ 4\] \.dynstr .*
  15. +\[ 5\] \.rela\.dyn .*
  16. +\[ 6\] \.rela\.plt .*
  17. +\[ 7\] \.plt .*
  18. +\[ 8\] \.text +PROGBITS .*
  19. +\[ 9\] \.tdata +PROGBITS .* 0+018 00 WAT +0 +0 +4
  20. +\[10\] \.tbss +NOBITS .* 0+010 00 WAT +0 +0 +1
  21. #...
  22. +\[[0-9a-f]+\] \.got +PROGBITS .*
  23. #...
  24. +\[[0-9a-f]+\] \.symtab .*
  25. +\[[0-9a-f]+\] \.strtab .*
  26. +\[[0-9a-f]+\] \.shstrtab .*
  27. Key to Flags:
  28. #...
  29. Elf file type is EXEC \(Executable file\)
  30. Entry point 0x402000
  31. There are [0-9]+ program headers, starting at offset [0-9]+
  32. Program Headers:
  33. +Type +Offset +VirtAddr +PhysAddr +FileSiz +MemSiz +Flg Align
  34. +PHDR.*
  35. +INTERP.*
  36. .*Requesting program interpreter.*
  37. +LOAD.*
  38. +LOAD.*
  39. +DYNAMIC.*
  40. +TLS +0x[0-9a-f]+ 0x[0-9a-f]+ 0x[0-9a-f]+ 0x0+18 0x0+28 R +0x4
  41. Section to Segment mapping:
  42. +Segment Sections\.\.\.
  43. +00 +
  44. +01 +\.interp *
  45. +02 +\.interp \.hash \.dynsym \.dynstr \.rela\.dyn \.rela\.plt \.plt \.text *
  46. +03 +\.tdata \.dynamic \.got *
  47. +04 +\.dynamic *
  48. +05 +\.tdata \.tbss *
  49. Relocation section '\.rela\.dyn' at offset 0x[0-9a-f]+ contains 4 entries:
  50. Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
  51. [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG3 \+ 0
  52. [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG2 \+ 0
  53. [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG4 \+ 0
  54. [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG1 \+ 0
  55. Relocation section '\.rela\.plt' at offset 0x[0-9a-f]+ contains 1 entry:
  56. Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
  57. [0-9a-f ]+R_SH_JMP_SLOT[0-9a-f ]+__tls_get_addr \+ [0-9a-f]+
  58. Symbol table '\.dynsym' contains [0-9]+ entries:
  59. +Num: +Value +Size +Type +Bind +Vis +Ndx +Name
  60. .* NOTYPE +LOCAL +DEFAULT +UND *
  61. .* TLS +GLOBAL +DEFAULT +UND sG3
  62. .* TLS +GLOBAL +DEFAULT +UND sG2
  63. .* TLS +GLOBAL +DEFAULT +UND sG4
  64. .* FUNC +GLOBAL +DEFAULT +UND __tls_get_addr
  65. #...
  66. .* TLS +GLOBAL +DEFAULT +UND sG1
  67. #pass