1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
|
// RUN: llvm-mc %s -o %t.o -filetype=obj -triple=armv7a-linux-gnueabi
// RUN: ld.lld %t.o -o %t.so -shared
// RUN: llvm-readobj -s -dyn-relocations %t.so | FileCheck --check-prefix=SEC %s
// RUN: llvm-objdump -d -triple=armv7a-linux-gnueabi %t.so | FileCheck %s
// REQUIRES: arm
// Test the handling of the global-dynamic TLS model. Dynamic Loader finds
// module index R_ARM_TLS_DTPMOD32 and the offset within the module
// R_ARM_TLS_DTPOFF32. One of the variables is hidden which permits relaxation
// to local dynamic
.text
.syntax unified
.globl func
.p2align 2
.type func,%function
func:
push {r4, r5, r11, lr}
add r11, sp, #8
ldr r0, .LCPI0_0
.LPC0_2:
add r0, pc, r0
bl __tls_get_addr
ldr r1, [r0]
ldr r2, .LCPI0_1
add r4, r1, #1
str r4, [r0]
.LPC0_1:
add r0, pc, r2
bl __tls_get_addr
ldr r1, [r0]
ldr r2, .LCPI0_2
add r5, r1, #1
str r5, [r0]
.LPC0_0:
add r0, pc, r2
bl __tls_get_addr
ldr r1, [r0]
add r1, r1, #1
str r1, [r0]
add r0, r1, r5
add r0, r0, r4
pop {r4, r5, r11, pc}
.p2align 2
.LCPI0_0:
.word x(TLSGD) + (. - .LPC0_2 - 8)
.LCPI0_1:
.word y(TLSGD) + (. - .LPC0_1 - 8)
.LCPI0_2:
.word z(TLSGD) + (. - .LPC0_0 - 8)
.Lfunc_end0:
.type x,%object @ @x
.section .tdata,"awT",%progbits
.globl x
.p2align 2
x:
.word 10 @ 0xa
.type y,%object @ @y
.section .tbss,"awT",%nobits
.globl y
.p2align 2
y:
.word 0
.hidden z
.type z,%object
.globl z
z:
.word 0
// SEC: Name: .tdata
// SEC-NEXT: Type: SHT_PROGBITS (0x1)
// SEC-NEXT: Flags [
// SEC-NEXT: SHF_ALLOC
// SEC-NEXT: SHF_TLS
// SEC-NEXT: SHF_WRITE
// SEC-NEXT: ]
// SEC-NEXT: Address: 0x2000
// SEC: Size: 4
// SEC: Name: .tbss
// SEC-NEXT: Type: SHT_NOBITS
// SEC-NEXT: Flags [
// SEC-NEXT: SHF_ALLOC
// SEC-NEXT: SHF_TLS
// SEC-NEXT: SHF_WRITE
// SEC-NEXT: ]
// SEC-NEXT: Address: 0x2004
// SEC: Size: 8
// SEC: Name: .got (74)
// SEC-NEXT: Type: SHT_PROGBITS (0x1)
// SEC-NEXT: Flags [
// SEC-NEXT: SHF_ALLOC
// SEC-NEXT: SHF_WRITE
// SEC-NEXT: ]
// SEC-NEXT: Address: 0x206C
// SEC: Size: 24
// SEC: Dynamic Relocations {
// SEC-NEXT: 0x207C R_ARM_TLS_DTPMOD32 -
// SEC-NEXT: 0x206C R_ARM_TLS_DTPMOD32 x
// SEC-NEXT: 0x2070 R_ARM_TLS_DTPOFF32 x
// SEC-NEXT: 0x2074 R_ARM_TLS_DTPMOD32 y
// SEC-NEXT: 0x2078 R_ARM_TLS_DTPOFF32 y
// SEC-NEXT: 0x300C R_ARM_JUMP_SLOT __tls_get_addr
// CHECK: Disassembly
// CHECK-NEXT: func:
// CHECK-NEXT: 1000: 30 48 2d e9 push {r4, r5, r11, lr}
// CHECK-NEXT: 1004: 08 b0 8d e2 add r11, sp, #8
// CHECK-NEXT: 1008: 4c 00 9f e5 ldr r0, [pc, #76]
// .LPC0_2:
// CHECK-NEXT: 100c: 00 00 8f e0 add r0, pc, r0
// 0x1010 + 8 + 0x6c = 0x1084 = __tls_get_addr(PLT)
// CHECK-NEXT: 1010: 1b 00 00 eb bl #108
// CHECK-NEXT: 1014: 00 10 90 e5 ldr r1, [r0]
// CHECK-NEXT: 1018: 40 20 9f e5 ldr r2, [pc, #64]
// CHECK-NEXT: 101c: 01 40 81 e2 add r4, r1, #1
// CHECK-NEXT: 1020: 00 40 80 e5 str r4, [r0]
// .LPC0_1:
// CHECK-NEXT: 1024: 02 00 8f e0 add r0, pc, r2
// 0x1028 + 8 + 0x54 = 0x1084 = __tls_get_addr(PLT)
// CHECK-NEXT: 1028: 15 00 00 eb bl #84
// CHECK-NEXT: 102c: 00 10 90 e5 ldr r1, [r0]
// CHECK-NEXT: 1030: 2c 20 9f e5 ldr r2, [pc, #44]
// CHECK-NEXT: 1034: 01 50 81 e2 add r5, r1, #1
// CHECK-NEXT: 1038: 00 50 80 e5 str r5, [r0]
// .LPC0_0:
// CHECK-NEXT: 103c: 02 00 8f e0 add r0, pc, r2
// 0x1040 + 8 + 0x3c = 0x1084 = __tls_get_addr(PLT)
// CHECK-NEXT: 1040: 0f 00 00 eb bl #60
// CHECK-NEXT: 1044: 00 10 90 e5 ldr r1, [r0]
// CHECK-NEXT: 1048: 01 10 81 e2 add r1, r1, #1
// CHECK-NEXT: 104c: 00 10 80 e5 str r1, [r0]
// CHECK-NEXT: 1050: 05 00 81 e0 add r0, r1, r5
// CHECK-NEXT: 1054: 04 00 80 e0 add r0, r0, r4
// CHECK-NEXT: 1058: 30 88 bd e8 pop {r4, r5, r11, pc}
// (0x206c - 0x105c) - (0x105c - 0x100c - 8) = 0x1058
// CHECK: 105c: 58 10 00 00
// (0x2074 - 0x1060) - (0x1060 - 0x1024 - 8) = 0x1048
// CHECK-NEXT: 1060: 48 10 00 00
// (0x207c - 0x1064) - (0x1064 - 0x103c - 8) = 0x1038
// CHECK-NEXT: 1064: 38 10 00 00
// CHECK: Disassembly of section .plt:
// CHECK-NEXT: .plt:
// CHECK-NEXT: 1070: 04 e0 2d e5 str lr, [sp, #-4]!
// CHECK-NEXT: 1074: 04 e0 9f e5 ldr lr, [pc, #4]
// CHECK-NEXT: 1078: 0e e0 8f e0 add lr, pc, lr
// CHECK-NEXT: 107c: 08 f0 be e5 ldr pc, [lr, #8]!
// CHECK-NEXT: 1080: 80 1f 00 00
// CHECK-NEXT: 1084: 04 c0 9f e5 ldr r12, [pc, #4]
// CHECK-NEXT: 1088: 0f c0 8c e0 add r12, r12, pc
// CHECK-NEXT: 108c: 00 f0 9c e5 ldr pc, [r12]
// CHECK-NEXT: 1090: 7c 1f 00 00
|