1 # Check handling of R_ARM_THM_JUMP24 relocation.
2 # RUN: yaml2obj -format=elf %s > %t-o.o
3 # RUN: lld -flavor gnu -target arm -m armelf_linux_eabi -Bstatic \
4 # RUN: --noinhibit-exec %t-o.o -o %t
5 # RUN: llvm-objdump -s -t %t | FileCheck %s
7 # CHECK: Contents of section .text:
8 # CHECK: 400084 80b500af fff7f4bf 03461846 80bd00bf
10 # call site offset PC(thm) _Z1fv addr
11 # 0x400088 + (-0x18) + 0x4 = 0x400074
12 # CHECK: SYMBOL TABLE:
13 # CHECK: 00400074 g F .text {{[0-9a-f]+}} _Z1fv
14 # CHECK: 00400084 g F .text {{[0-9a-f]+}} main
22 Flags: [ EF_ARM_EABI_VER5 ]
26 Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
27 AddressAlign: 0x0000000000000004
28 Content: 80B400AF00231846BD465DF8047B704780B500AFFFF7FEBF0346184680BD00BF
32 AddressAlign: 0x0000000000000004
35 - Offset: 0x0000000000000014
37 Type: R_ARM_THM_JUMP24
41 Flags: [ SHF_WRITE, SHF_ALLOC ]
42 AddressAlign: 0x0000000000000001
46 Flags: [ SHF_WRITE, SHF_ALLOC ]
47 AddressAlign: 0x0000000000000001
54 Value: 0x0000000000000001
58 Value: 0x0000000000000011