xref: /aosp_15_r20/external/llvm/test/MC/ELF/weakref-reloc.s (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple x86_64-pc-linux-gnu %s -o - | llvm-readobj -r -t | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker
3*9880d681SAndroid Build Coastguard Worker// Test that the relocations point to the correct symbols.
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard Worker	.weakref bar,foo
6*9880d681SAndroid Build Coastguard Worker        call    zed@PLT
7*9880d681SAndroid Build Coastguard Worker     call	bar
8*9880d681SAndroid Build Coastguard Worker
9*9880d681SAndroid Build Coastguard Worker// CHECK:      Relocations [
10*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   Section ({{[0-9]+}}) {{[^ ]+}} {
11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x1 R_X86_64_PLT32 zed 0xFFFFFFFFFFFFFFFC
12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x6 R_X86_64_PC32 foo 0xFFFFFFFFFFFFFFFC
13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   }
14*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: ]
15