Home | History | Annotate | Download | only in ld-sh
      1 #source: tlspic1.s
      2 #source: tlspic2.s
      3 #as: -little
      4 #ld: -shared -EL
      5 #readelf: -Ssrl
      6 #target: sh*-*-linux* sh*-*-netbsd*
      7 
      8 There are [0-9]+ section headers, starting at offset 0x[0-9a-f]+:
      9 
     10 Section Headers:
     11  +\[Nr\] Name +Type +Addr +Off +Size +ES Flg Lk Inf Al
     12  +\[ 0\] +NULL +0+ 0+ 0+ 0+ +0 +0 +0
     13  +\[ 1\] \.hash .*
     14  +\[ 2\] \.dynsym .*
     15  +\[ 3\] \.dynstr .*
     16  +\[ 4\] \.rela\.dyn .*
     17  +\[ 5\] \.rela\.plt .*
     18  +\[ 6\] \.plt .*
     19  +\[ 7\] \.text +PROGBITS .*
     20  +\[ 8\] \.tdata +PROGBITS .* 0+18 00 WAT +0 +0 +4
     21  +\[ 9\] \.tbss +NOBITS .* 0+08 00 WAT +0 +0 +1
     22 #...
     23  +\[[0-9a-f]+\] \.got +PROGBITS .*
     24 #...
     25  +\[[0-9a-f]+\] \.shstrtab .*
     26  +\[[0-9a-f]+\] \.symtab .*
     27  +\[[0-9a-f]+\] \.strtab .*
     28 Key to Flags:
     29 .*
     30 .*
     31 .*
     32 
     33 Elf file type is DYN \(Shared object file\)
     34 Entry point 0x[0-9a-f]+
     35 There are 4 program headers, starting at offset [0-9]+
     36 
     37 Program Headers:
     38  +Type +Offset +VirtAddr +PhysAddr +FileSiz +MemSiz +Flg Align
     39  +LOAD.*
     40  +LOAD.*
     41  +DYNAMIC.*
     42  +TLS .* 0x0+18 0x0+20 R +0x4
     43 
     44  Section to Segment mapping:
     45  +Segment Sections\.\.\.
     46  +00 +\.hash \.dynsym \.dynstr \.rela\.dyn \.rela\.plt \.plt \.text *
     47  +01 +\.tdata \.dynamic \.got *
     48  +02 +\.dynamic *
     49  +03 +\.tdata \.tbss *
     50 
     51 Relocation section '\.rela\.dyn' at offset 0x[0-9a-f]+ contains 10 entries:
     52  Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
     53 [0-9a-f ]+R_SH_TLS_DTPMOD32 +0
     54 [0-9a-f ]+R_SH_TLS_TPOFF32 +c
     55 [0-9a-f ]+R_SH_TLS_DTPMOD32 +0
     56 [0-9a-f ]+R_SH_TLS_DTPMOD32 +0
     57 [0-9a-f ]+R_SH_TLS_TPOFF32 +1c
     58 [0-9a-f ]+R_SH_TLS_DTPMOD32 +0
     59 [0-9a-f ]+R_SH_TLS_TPOFF32 +14
     60 [0-9a-f ]+R_SH_TLS_DTPMOD32 +0+ +sg1 \+ 0
     61 [0-9a-f ]+R_SH_TLS_DTPOFF32 +0+ +sg1 \+ 0
     62 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+04 +sg2 \+ 0
     63 
     64 Relocation section '\.rela\.plt' at offset 0x[0-9a-f]+ contains 1 entries:
     65  Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
     66 [0-9a-f ]+R_SH_JMP_SLOT[0-9a-f ]+__tls_get_addr \+ [0-9a-f]+
     67 
     68 Symbol table '\.dynsym' contains [0-9]+ entries:
     69  +Num: +Value +Size +Type +Bind +Vis +Ndx +Name
     70 .* NOTYPE +LOCAL +DEFAULT +UND *
     71 .* NOTYPE +GLOBAL +DEFAULT +UND __tls_get_addr
     72 .* TLS +GLOBAL +DEFAULT +8 sg1
     73 #...
     74 .* FUNC +GLOBAL +DEFAULT +7 fn1
     75 #...
     76 .* TLS +GLOBAL +DEFAULT +8 sg2
     77 #...
     78 
     79 #pass
     80