blob: e0ae31d2da000bb28be3d9fb5f3deb7273e5bc82 [file] [log] [blame]
# REQUIRES: x86
# RUN: yaml2obj %s -o %t.o
# RUN: ld.lld -Ttext 0x0 %t.o -o %t.exe
# RUN: llvm-objdump -s --section=.text %t.exe 2>&1 | FileCheck %s
# CHECK: Contents of section .text:
# CHECK-NEXT: 0000 45231111 41231111
!ELF
FileHeader:
Class: ELFCLASS32
Data: ELFDATA2LSB
Type: ET_REL
Machine: EM_386
Sections:
- Type: SHT_PROGBITS
Name: .text
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
AddressAlign: 0x04
Content: "1111111111111111"
- Type: SHT_REL
Name: .rel.text
Link: .symtab
Info: .text
AddressAlign: 0x04
Relocations:
- Symbol: _start
Type: R_386_16
- Offset: 4
Symbol: _start
Type: R_386_PC16
Symbols:
- Name: _start
Type: STT_FUNC
Section: .text
Value: 0x1234
Size: 4
Binding: STB_GLOBAL