xref: /aosp_15_r20/external/llvm/test/tools/llvm-objdump/coff-many-relocs.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// Test that llvm-objdump can handle IMAGE_SCN_LNK_NRELOC_OVFL.
2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -r %p/Inputs/many-relocs.obj-i386 | FileCheck %s
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard WorkerCHECK:      RELOCATION RECORDS FOR [.text]:
5*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR16 foo
6*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_REL16 foo
7*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR32 foo
8*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR32NB foo
9*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SEG12 foo
10*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECTION foo
11*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECREL foo
12*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_TOKEN foo
13*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECREL7 foo
14*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_REL32 foo
15