1*9880d681SAndroid Build Coastguard Worker// Test that llvm-objdump can handle IMAGE_SCN_LNK_NRELOC_OVFL. 2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -r %p/Inputs/many-relocs.obj-i386 | FileCheck %s 3*9880d681SAndroid Build Coastguard Worker 4*9880d681SAndroid Build Coastguard WorkerCHECK: RELOCATION RECORDS FOR [.text]: 5*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR16 foo 6*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_REL16 foo 7*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR32 foo 8*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_DIR32NB foo 9*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SEG12 foo 10*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECTION foo 11*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECREL foo 12*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_TOKEN foo 13*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_SECREL7 foo 14*9880d681SAndroid Build Coastguard WorkerCHECK-NEXT: IMAGE_REL_I386_REL32 foo 15