1 // RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s 2 3 .def _foobar; 4 .scl 2; 5 .type 32; 6 .endef 7 .text 8 .long 0 9 .globl _foobar 10 .align 16, 0x90 11 _foobar: # @foobar 12 # BB#0: 13 ret 14 15 .data 16 .globl _rust_crate # @rust_crate 17 .align 4 18 _rust_crate: 19 .long 0 20 .long _foobar 21 .long _foobar-_rust_crate 22 .long _foobar-_rust_crate 23 24 // CHECK: Name = .data 25 // CHECK: SectionData = 26 // CHECK-NEXT: 00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...| 27 // CHECK: Relocations = [ 28 // CHECK-NEXT: 0 = { 29 // CHECK-NEXT: VirtualAddress = 0x4 30 // CHECK-NEXT: SymbolTableIndex = 31 // CHECK-NEXT: Type = IMAGE_REL_I386_DIR32 (6) 32 // CHECK-NEXT: SymbolName = _foobar 33 // CHECK-NEXT: } 34 // CHECK-NEXT: 1 = { 35 // CHECK-NEXT: VirtualAddress = 0x8 36 // CHECK-NEXT: SymbolTableIndex = 0 37 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) 38 // CHECK-NEXT: SymbolName = .text 39 // CHECK-NEXT: } 40 // CHECK-NEXT: 2 = { 41 // CHECK-NEXT: VirtualAddress = 0xC 42 // CHECK-NEXT: SymbolTableIndex = 0 43 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) 44 // CHECK-NEXT: SymbolName = .text 45 // CHECK-NEXT: } 46 // CHECK-NEXT: ] 47