1 # Check handling of R_ARM_JUMP24 relocation.
2 # RUN: yaml2obj -format=elf %s > %t-o.o
3 # RUN: lld -flavor gnu -target arm -m armelf_linux_eabi -Bstatic \
4 # RUN: --noinhibit-exec %t-o.o -o %t
5 # RUN: llvm-objdump -s -t %t | FileCheck %s
7 # CHECK: Contents of section .text:
8 # CHECK: 400094 04b08de2 f5ffffea 0030a0e1 0300a0e1
10 # call site offset PC(arm) _Z1fv addr
11 # 0x400098 + (-0x2C) + 0x8 = 0x400074
12 # CHECK: SYMBOL TABLE:
13 # CHECK: 00400074 g F .text {{[0-9a-f]+}} _Z1fv
14 # CHECK: 00400090 g F .text {{[0-9a-f]+}} main
22 Flags: [ EF_ARM_EABI_VER5 ]
26 Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
27 AddressAlign: 0x0000000000000004
28 Content: 04B02DE500B08DE20030A0E30300A0E100D04BE204B09DE41EFF2FE100482DE904B08DE2FEFFFFEA0030A0E10300A0E10088BDE8
32 AddressAlign: 0x0000000000000004
35 - Offset: 0x0000000000000024
41 Flags: [ SHF_WRITE, SHF_ALLOC ]
42 AddressAlign: 0x0000000000000001
46 Flags: [ SHF_WRITE, SHF_ALLOC ]
47 AddressAlign: 0x0000000000000001
57 Value: 0x000000000000001C