xref: /llvm-project/llvm/test/tools/llvm-objdump/ELF/AArch64/pcrel-address.yaml (revision 5dde2bcdd172f4650e9f5ff31b338d948c69c6c0)
1# RUN: yaml2obj %s -o %t
2# RUN: llvm-objdump %t -d --no-show-raw-insn | FileCheck %s
3
4# CHECK-LABEL: <_start>:
5# CHECK-NEXT:    200100: adr  x0, 0x220000
6# CHECK-NEXT:    200104: adr  x0, 0x201004 <_start+0xf04>
7# CHECK-NEXT:    200108: adrp x2, 0x220000
8# CHECK-NEXT:    20010c: adrp x2, 0x201000 <_start+0xf00>
9
10--- !ELF
11FileHeader:
12  Class:   ELFCLASS64
13  Data:    ELFDATA2LSB
14  Type:    ET_EXEC
15  Machine: EM_AARCH64
16Sections:
17  - Name:    .text
18    Type:    SHT_PROGBITS
19    Address: 0x200100
20    Flags:   [SHF_ALLOC, SHF_EXECINSTR]
21    Content: '00F80F100078001002010090020000B0'
22  - Name:    .data
23    Type:    SHT_PROGBITS
24    Flags:   [SHF_ALLOC, SHF_WRITE]
25    Address: 0x220000
26Symbols:
27  - Name:    _start
28    Section: .text
29    Value:   0x200100
30