llvm/llvm/test/tools/llvm-objdump/ELF/AArch64/pcrel-address.yaml

# RUN: yaml2obj %s -o %t
# RUN: llvm-objdump %t -d --no-show-raw-insn | FileCheck %s

# CHECK-LABEL: <_start>:
# CHECK-NEXT:    200100: adr  x0, 0x220000
# CHECK-NEXT:    200104: adr  x0, 0x201004 <_start+0xf04>
# CHECK-NEXT:    200108: adrp x2, 0x220000
# CHECK-NEXT:    20010c: adrp x2, 0x201000 <_start+0xf00>

--- !ELF
FileHeader:
  Class:   ELFCLASS64
  Data:    ELFDATA2LSB
  Type:    ET_EXEC
  Machine: EM_AARCH64
Sections:
  - Name:    .text
    Type:    SHT_PROGBITS
    Address: 0x200100
    Flags:   [SHF_ALLOC, SHF_EXECINSTR]
    Content: '00F80F100078001002010090020000B0'
  - Name:    .data
    Type:    SHT_PROGBITS
    Flags:   [SHF_ALLOC, SHF_WRITE]
    Address: 0x220000
Symbols:
  - Name:    _start
    Section: .text
    Value:   0x200100