# Check handling of R_ARM_TLS_IE32 relocation. # RUN: yaml2obj -format=elf -docnum 1 %s > %t-tls.o # RUN: yaml2obj -format=elf -docnum 2 %s > %t-tlsv.o # RUN: lld -flavor gnu -target arm -m armelf_linux_eabi -Bstatic \ # RUN: --noinhibit-exec %t-tls.o %t-tlsv.o -o %t # RUN: llvm-objdump -s -t %t | FileCheck -check-prefix=STATIC %s # STATIC: Contents of section .got: # STATIC-NEXT: 401008 08000000 0c000000 # tp_off(i) = 0x08 ^^ ^^ tp_off(j) = 0x0c # tp_off(i) + sizeof(i) = tp_off(j) # 0x08 + 0x04 = 0x0c # STATIC: SYMBOL TABLE: # STATIC: 00400094 g F .text {{[0-9a-f]+}} main # STATIC: 00000000 g .tdata 00000004 i # sizeof(i) = 0x04 ^^ # STATIC: 00000004 g .tdata 00000004 j # RUN: yaml2obj -format=elf -docnum 1 %s > %t-tls.o # RUN: yaml2obj -format=elf -docnum 2 %s > %t-tlsv.o # RUN: lld -flavor gnu -target arm -m armelf_linux_eabi \ # RUN: --noinhibit-exec %t-tls.o %t-tlsv.o -o %t # RUN: llvm-objdump -s -t %t | FileCheck -check-prefix=EXEC-DYN %s # EXEC-DYN: Contents of section .rel.dyn: # EXEC-DYN-NEXT: 400134 08104000 13000000 0c104000 13000000 # addr(i) = 0x401008 ^^ ^^ addr(j) = 0x40100c # EXEC-DYN: Contents of section .got: # EXEC-DYN-NEXT: 401008 00000000 04000000 # tls_off(i) = 0x00 ^^ ^^ tls_off(j) = 0x04 # EXEC-DYN: SYMBOL TABLE: # EXEC-DYN: 00400144 g F .text {{[0-9a-f]+}} main # EXEC-DYN: 00000000 g .tdata 00000004 i # EXEC-DYN: 00000004 g .tdata 00000004 j # tls.o --- FileHeader: Class: ELFCLASS32 Data: ELFDATA2LSB Type: ET_REL Machine: EM_ARM Flags: [ EF_ARM_EABI_VER5 ] Sections: - Name: .text Type: SHT_PROGBITS Flags: [ SHF_ALLOC, SHF_EXECINSTR ] AddressAlign: 0x0000000000000004 Content: 80B400AF0C4B7B441B681DEE702FD2580A4B7B441B681DEE701FCB581A44084B7B441B681DEE701FCB585B0013441846BD465DF8047B70472E000000260000001C000000 - Name: .rel.text Type: SHT_REL Link: .symtab AddressAlign: 0x0000000000000004 Info: .text Relocations: - Offset: 0x0000000000000038 Symbol: i Type: R_ARM_TLS_IE32 - Offset: 0x000000000000003C Symbol: i Type: R_ARM_TLS_IE32 - Offset: 0x0000000000000040 Symbol: j Type: R_ARM_TLS_IE32 - Name: .data Type: SHT_PROGBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 Content: '' - Name: .bss Type: SHT_NOBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 Symbols: Global: - Name: main Type: STT_FUNC Section: .text Value: 0x0000000000000001 - Name: i Type: STT_TLS - Name: j Type: STT_TLS # tlsv.o --- FileHeader: Class: ELFCLASS32 Data: ELFDATA2LSB Type: ET_REL Machine: EM_ARM Flags: [ EF_ARM_EABI_VER5 ] Sections: - Name: .text Type: SHT_PROGBITS Flags: [ SHF_ALLOC, SHF_EXECINSTR ] AddressAlign: 0x0000000000000001 Content: '' - Name: .data Type: SHT_PROGBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 Content: '' - Name: .bss Type: SHT_NOBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 - Name: .tdata Type: SHT_PROGBITS Flags: [ SHF_WRITE, SHF_ALLOC, SHF_TLS ] AddressAlign: 0x0000000000000004 Content: 05000000FBFFFFFF Symbols: Global: - Name: i Type: STT_TLS Section: .tdata Size: 0x0000000000000004 - Name: j Type: STT_TLS Section: .tdata Value: 0x0000000000000004 Size: 0x0000000000000004 ...