Home | History | Annotate | Download | only in COFF
      1 // RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s
      2 
      3 	.def	 _foobar;
      4 	.scl	2;
      5 	.type	32;
      6 	.endef
      7 	.text
      8 	.long   0
      9 	.globl	_foobar
     10 	.align	16, 0x90
     11 _foobar:                                # @foobar
     12 # BB#0:
     13 	ret
     14 
     15 	.data
     16 	.globl	_rust_crate             # @rust_crate
     17 	.align	4
     18 _rust_crate:
     19 	.long   0
     20 	.long   _foobar
     21 	.long	_foobar-_rust_crate
     22 	.long	_foobar-_rust_crate
     23 
     24 // CHECK:      Name                     = .data
     25 // CHECK:      SectionData              =
     26 // CHECK-NEXT:   00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...|
     27 // CHECK:        Relocations              = [
     28 // CHECK-NEXT:   0 = {
     29 // CHECK-NEXT:     VirtualAddress           = 0x4
     30 // CHECK-NEXT:     SymbolTableIndex         =
     31 // CHECK-NEXT:     Type                     = IMAGE_REL_I386_DIR32 (6)
     32 // CHECK-NEXT:     SymbolName               = _foobar
     33 // CHECK-NEXT:   }
     34 // CHECK-NEXT:   1 = {
     35 // CHECK-NEXT:     VirtualAddress           = 0x8
     36 // CHECK-NEXT:     SymbolTableIndex         = 0
     37 // CHECK-NEXT:     Type                     = IMAGE_REL_I386_REL32 (20)
     38 // CHECK-NEXT:     SymbolName               = .text
     39 // CHECK-NEXT:   }
     40 // CHECK-NEXT:   2 = {
     41 // CHECK-NEXT:     VirtualAddress           = 0xC
     42 // CHECK-NEXT:     SymbolTableIndex         = 0
     43 // CHECK-NEXT:     Type                     = IMAGE_REL_I386_REL32 (20)
     44 // CHECK-NEXT:     SymbolName               = .text
     45 // CHECK-NEXT:   }
     46 // CHECK-NEXT: ]
     47