# Check handling of R_ARM_JUMP_SLOT relocation. # RUN: yaml2obj -format=elf %s > %t-o.o # RUN: lld -flavor gnu -target arm -m armelf_linux_eabi -shared \ # RUN: --noinhibit-exec %t-o.o -lfn -L%p/Inputs -o %t # RUN: llvm-readobj -relocations %t | FileCheck %s # CHECK: 0x40100C R_ARM_JUMP_SLOT fn 0x0 --- FileHeader: Class: ELFCLASS32 Data: ELFDATA2LSB Type: ET_REL Machine: EM_ARM Flags: [ EF_ARM_EABI_VER5 ] Sections: - Name: .text Type: SHT_PROGBITS Flags: [ SHF_ALLOC, SHF_EXECINSTR ] AddressAlign: 0x0000000000000004 Content: 00482DE904B08DE2FEFFFFEB0030A0E10300A0E10088BDE8 - Name: .rel.text Type: SHT_REL Link: .symtab AddressAlign: 0x0000000000000004 Info: .text Relocations: - Offset: 0x0000000000000008 Symbol: fn Type: R_ARM_CALL - Name: .data Type: SHT_PROGBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 Content: '' - Name: .bss Type: SHT_NOBITS Flags: [ SHF_WRITE, SHF_ALLOC ] AddressAlign: 0x0000000000000001 Symbols: Local: - Name: '$a' Section: .text Global: - Name: f Type: STT_FUNC Section: .text - Name: fn ...