xref: /aosp_15_r20/external/llvm/test/MC/ELF/weak-relocation.s (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple x86_64-pc-linux-gnu %s -o - | llvm-readobj -r | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker
3*9880d681SAndroid Build Coastguard Worker// Test that weak symbols always produce relocations
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard Worker	.weak	foo
6*9880d681SAndroid Build Coastguard Workerfoo:
7*9880d681SAndroid Build Coastguard Workerbar:
8*9880d681SAndroid Build Coastguard Worker        call    foo
9*9880d681SAndroid Build Coastguard Worker
10*9880d681SAndroid Build Coastguard Worker// CHECK:      Relocations [
11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   Section ({{[0-9]+}}) .rela.text {
12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     0x1 R_X86_64_PC32 foo 0xFFFFFFFFFFFFFFFC
13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   }
14*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: ]
15