Back to index

cell-binutils  2.17cvs20070401
tlsbin-2.d
Go to the documentation of this file.
00001 #source: tlsbinpic.s
00002 #source: tlsbin.s
00003 #as: -little
00004 #ld: -EL tmpdir/tlsbin-0-dso.so
00005 #readelf: -Ssrl
00006 #target: sh*-*-linux* sh*-*-netbsd*
00007 
00008 There are [0-9]+ section headers, starting at offset 0x[0-9a-f]+:
00009 
00010 Section Headers:
00011   \[Nr\] Name +Type +Addr +Off +Size +ES Flg Lk Inf Al
00012   \[ 0\] +NULL +0+ 0+ 0+ 0+ +0 +0 +0
00013   \[ 1\] \.interp .*
00014   \[ 2\] \.hash .*
00015   \[ 3\] \.dynsym .*
00016   \[ 4\] \.dynstr .*
00017   \[ 5\] \.rela\.dyn .*
00018   \[ 6\] \.rela\.plt .*
00019   \[ 7\] \.plt .*
00020   \[ 8\] \.text +PROGBITS .*
00021   \[ 9\] \.tdata +PROGBITS .* 0+018 00 WAT  0   0  4
00022   \[10\] \.tbss +NOBITS .* 0+010 00 WAT  0   0  1
00023 #...
00024   \[[0-9a-f]+\] \.got +PROGBITS .*
00025 #...
00026   \[[0-9a-f]+\] \.shstrtab .*
00027   \[[0-9a-f]+\] \.symtab .*
00028   \[[0-9a-f]+\] \.strtab .*
00029 Key to Flags:
00030 .*
00031 .*
00032 .*
00033 
00034 Elf file type is EXEC \(Executable file\)
00035 Entry point 0x402000
00036 There are [0-9]+ program headers, starting at offset [0-9]+
00037 
00038 Program Headers:
00039   Type +Offset +VirtAddr +PhysAddr +FileSiz +MemSiz +Flg Align
00040   PHDR.*
00041   INTERP.*
00042 .*Requesting program interpreter.*
00043   LOAD.*
00044   LOAD.*
00045   DYNAMIC.*
00046   TLS +0x[0-9a-f]+ 0x[0-9a-f]+ 0x[0-9a-f]+ 0x0+18 0x0+28 R +0x4
00047 
00048  Section to Segment mapping:
00049   Segment Sections\.\.\.
00050    00 +
00051    01 +\.interp *
00052    02 +\.interp \.hash \.dynsym \.dynstr \.rela\.dyn \.rela\.plt \.plt \.text *
00053    03 +\.tdata \.dynamic \.got *
00054    04 +\.dynamic *
00055    05 +\.tdata \.tbss *
00056 
00057 Relocation section '\.rela\.dyn' at offset 0x[0-9a-f]+ contains 4 entries:
00058  Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
00059 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG3 \+ 0
00060 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG2 \+ 0
00061 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG4 \+ 0
00062 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG1 \+ 0
00063 
00064 Relocation section '\.rela\.plt' at offset 0x[0-9a-f]+ contains 1 entries:
00065  Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
00066 [0-9a-f ]+R_SH_JMP_SLOT[0-9a-f ]+__tls_get_addr \+ [0-9a-f]+
00067 
00068 Symbol table '\.dynsym' contains [0-9]+ entries:
00069  +Num: +Value +Size Type +Bind +Vis +Ndx Name
00070 .* NOTYPE +LOCAL +DEFAULT  UND *
00071 .* TLS +GLOBAL DEFAULT  UND sG3
00072 .* TLS +GLOBAL DEFAULT  UND sG2
00073 .* TLS +GLOBAL DEFAULT  UND sG4
00074 .* FUNC +GLOBAL DEFAULT  UND __tls_get_addr
00075 #...
00076 .* TLS +GLOBAL DEFAULT  UND sG1
00077 #...
00078 
00079 #pass