xref: /aosp_15_r20/external/llvm/test/MC/ELF/weakref-plt.s (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple x86_64-pc-linux-gnu %s -o - | llvm-readobj -t | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker
3*9880d681SAndroid Build Coastguard Worker	.weakref	bar,foo
4*9880d681SAndroid Build Coastguard Worker	call	bar@PLT
5*9880d681SAndroid Build Coastguard Worker
6*9880d681SAndroid Build Coastguard Worker// CHECK:        Symbol {
7*9880d681SAndroid Build Coastguard Worker// CHECK:          Name: foo
8*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Value:
9*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Size:
10*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Binding: Weak
11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Type:
12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Other:
13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:     Section:
14*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT:   }
15