hanchenye-llvm-project/lld/test/old-elf/ARM/rel-tls-ie32.test

126 lines
4.2 KiB
Plaintext

# Check handling of R_ARM_TLS_IE32 relocation.
# RUN: yaml2obj -format=elf -docnum 1 %s > %t-tls.o
# RUN: yaml2obj -format=elf -docnum 2 %s > %t-tlsv.o
# RUN: lld -flavor old-gnu -target arm -m armelf_linux_eabi -Bstatic \
# RUN: --noinhibit-exec %t-tls.o %t-tlsv.o -o %t
# RUN: llvm-objdump -s -t %t | FileCheck -check-prefix=STATIC %s
# STATIC: Contents of section .got:
# STATIC-NEXT: 401008 08000000 0c000000
# tp_off(i) = 0x08 ^^ ^^ tp_off(j) = 0x0c
# tp_off(i) + sizeof(i) = tp_off(j)
# 0x08 + 0x04 = 0x0c
# STATIC: SYMBOL TABLE:
# STATIC: 00400094 g F .text {{[0-9a-f]+}} main
# STATIC: 00000000 g .tdata 00000004 i
# sizeof(i) = 0x04 ^^
# STATIC: 00000004 g .tdata 00000004 j
# RUN: yaml2obj -format=elf -docnum 1 %s > %t-tls.o
# RUN: yaml2obj -format=elf -docnum 2 %s > %t-tlsv.o
# RUN: lld -flavor old-gnu -target arm -m armelf_linux_eabi \
# RUN: --noinhibit-exec %t-tls.o %t-tlsv.o -o %t
# RUN: llvm-objdump -s -t %t | FileCheck -check-prefix=EXEC-DYN %s
# EXEC-DYN: Contents of section .rel.dyn:
# EXEC-DYN-NEXT: 400134 08104000 13000000 0c104000 13000000
# addr(i) = 0x401008 ^^ ^^ addr(j) = 0x40100c
# EXEC-DYN: Contents of section .got:
# EXEC-DYN-NEXT: 401008 00000000 04000000
# tls_off(i) = 0x00 ^^ ^^ tls_off(j) = 0x04
# EXEC-DYN: SYMBOL TABLE:
# EXEC-DYN: 00400144 g F .text {{[0-9a-f]+}} main
# EXEC-DYN: 00000000 g .tdata 00000004 i
# EXEC-DYN: 00000004 g .tdata 00000004 j
# tls.o
---
FileHeader:
Class: ELFCLASS32
Data: ELFDATA2LSB
Type: ET_REL
Machine: EM_ARM
Flags: [ EF_ARM_EABI_VER5 ]
Sections:
- Name: .text
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
AddressAlign: 0x0000000000000004
Content: 80B400AF0C4B7B441B681DEE702FD2580A4B7B441B681DEE701FCB581A44084B7B441B681DEE701FCB585B0013441846BD465DF8047B70472E000000260000001C000000
- Name: .rel.text
Type: SHT_REL
Link: .symtab
AddressAlign: 0x0000000000000004
Info: .text
Relocations:
- Offset: 0x0000000000000038
Symbol: i
Type: R_ARM_TLS_IE32
- Offset: 0x000000000000003C
Symbol: i
Type: R_ARM_TLS_IE32
- Offset: 0x0000000000000040
Symbol: j
Type: R_ARM_TLS_IE32
- Name: .data
Type: SHT_PROGBITS
Flags: [ SHF_WRITE, SHF_ALLOC ]
AddressAlign: 0x0000000000000001
Content: ''
- Name: .bss
Type: SHT_NOBITS
Flags: [ SHF_WRITE, SHF_ALLOC ]
AddressAlign: 0x0000000000000001
Symbols:
Global:
- Name: main
Type: STT_FUNC
Section: .text
Value: 0x0000000000000001
- Name: i
Type: STT_TLS
- Name: j
Type: STT_TLS
# tlsv.o
---
FileHeader:
Class: ELFCLASS32
Data: ELFDATA2LSB
Type: ET_REL
Machine: EM_ARM
Flags: [ EF_ARM_EABI_VER5 ]
Sections:
- Name: .text
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
AddressAlign: 0x0000000000000001
Content: ''
- Name: .data
Type: SHT_PROGBITS
Flags: [ SHF_WRITE, SHF_ALLOC ]
AddressAlign: 0x0000000000000001
Content: ''
- Name: .bss
Type: SHT_NOBITS
Flags: [ SHF_WRITE, SHF_ALLOC ]
AddressAlign: 0x0000000000000001
- Name: .tdata
Type: SHT_PROGBITS
Flags: [ SHF_WRITE, SHF_ALLOC, SHF_TLS ]
AddressAlign: 0x0000000000000004
Content: 05000000FBFFFFFF
Symbols:
Global:
- Name: i
Type: STT_TLS
Section: .tdata
Size: 0x0000000000000004
- Name: j
Type: STT_TLS
Section: .tdata
Value: 0x0000000000000004
Size: 0x0000000000000004
...