# REQUIRES: x86

# RUN: yaml2obj %s -o %t.o
# RUN: ld.lld -Ttext 0x0 %t.o -o %t.exe
# RUN: llvm-objdump -s --section=.text %t.exe 2>&1 | FileCheck %s

# CHECK:      Contents of section .text:
# CHECK-NEXT:  0000 45231111 41231111

!ELF
FileHeader:
  Class:           ELFCLASS32
  Data:            ELFDATA2LSB
  Type:            ET_REL
  Machine:         EM_386
Sections:
  - Type:            SHT_PROGBITS
    Name:            .text
    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
    AddressAlign:    0x04
    Content:         "1111111111111111"
  - Type:            SHT_REL
    Name:            .rel.text
    Link:            .symtab
    Info:            .text
    AddressAlign:    0x04
    Relocations:
      - Symbol:          _start
        Type:            R_386_16
      - Offset:          4
        Symbol:          _start
        Type:            R_386_PC16
Symbols:
  - Name:     _start
    Type:     STT_FUNC
    Section:  .text
    Value:    0x1234
    Size:     4
    Binding:  STB_GLOBAL
