4 #ld: -EL tmpdir/tlsbin-0-dso.so
6 #target: sh*-*-linux* sh*-*-netbsd*
8 There are [0-9]+ section headers, starting at offset 0x[0-9a-f]+:
11 +\[Nr\] Name +Type +Addr +Off +Size +ES Flg Lk Inf Al
12 +\[ 0\] +NULL +0+ 0+ 0+ 0+ +0 +0 +0
17 +\[ 5\] \.rela\.dyn .*
18 +\[ 6\] \.rela\.plt .*
20 +\[ 8\] \.text +PROGBITS .*
21 +\[ 9\] \.tdata +PROGBITS .* 0+018 00 WAT +0 +0 +4
22 +\[10\] \.tbss +NOBITS .* 0+010 00 WAT +0 +0 +1
24 +\[[0-9a-f]+\] \.got +PROGBITS .*
26 +\[[0-9a-f]+\] \.shstrtab .*
27 +\[[0-9a-f]+\] \.symtab .*
28 +\[[0-9a-f]+\] \.strtab .*
32 Elf file type is EXEC \(Executable file\)
34 There are [0-9]+ program headers, starting at offset [0-9]+
37 +Type +Offset +VirtAddr +PhysAddr +FileSiz +MemSiz +Flg Align
40 .*Requesting program interpreter.*
44 +TLS +0x[0-9a-f]+ 0x[0-9a-f]+ 0x[0-9a-f]+ 0x0+18 0x0+28 R +0x4
46 Section to Segment mapping:
47 +Segment Sections\.\.\.
50 +02 +\.interp \.hash \.dynsym \.dynstr \.rela\.dyn \.rela\.plt \.plt \.text *
51 +03 +\.tdata \.dynamic \.got *
55 Relocation section '\.rela\.dyn' at offset 0x[0-9a-f]+ contains 4 entries:
56 Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
57 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG3 \+ 0
58 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG2 \+ 0
59 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG4 \+ 0
60 [0-9a-f ]+R_SH_TLS_TPOFF32 +0+ +sG1 \+ 0
62 Relocation section '\.rela\.plt' at offset 0x[0-9a-f]+ contains 1 entries:
63 Offset +Info +Type +Sym\.Value +Sym\. Name \+ Addend
64 [0-9a-f ]+R_SH_JMP_SLOT[0-9a-f ]+__tls_get_addr \+ [0-9a-f]+
66 Symbol table '\.dynsym' contains [0-9]+ entries:
67 +Num: +Value +Size +Type +Bind +Vis +Ndx +Name
68 .* NOTYPE +LOCAL +DEFAULT +UND *
69 .* TLS +GLOBAL +DEFAULT +UND sG3
70 .* TLS +GLOBAL +DEFAULT +UND sG2
71 .* TLS +GLOBAL +DEFAULT +UND sG4
72 .* FUNC +GLOBAL +DEFAULT +UND __tls_get_addr
74 .* TLS +GLOBAL +DEFAULT +UND sG1