1// RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s 2 3 .def _foobar; 4 .scl 2; 5 .type 32; 6 .endef 7 .text 8 .long 0 9 .globl _foobar 10 .align 16, 0x90 11_foobar: # @foobar 12# BB#0: 13 ret 14 15 .data 16 .globl _rust_crate # @rust_crate 17 .align 4 18_rust_crate: 19 .long 0 20 .long _foobar 21 .long _foobar-_rust_crate 22 .long _foobar-_rust_crate 23 24// CHECK: Name = .data 25// CHECK: SectionData = 26// CHECK-NEXT: 00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...| 27// CHECK: Relocations = [ 28// CHECK-NEXT: 0 = { 29// CHECK-NEXT: VirtualAddress = 0x4 30// CHECK-NEXT: SymbolTableIndex = 31// CHECK-NEXT: Type = IMAGE_REL_I386_DIR32 (6) 32// CHECK-NEXT: SymbolName = _foobar 33// CHECK-NEXT: } 34// CHECK-NEXT: 1 = { 35// CHECK-NEXT: VirtualAddress = 0x8 36// CHECK-NEXT: SymbolTableIndex = 0 37// CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) 38// CHECK-NEXT: SymbolName = .text 39// CHECK-NEXT: } 40// CHECK-NEXT: 2 = { 41// CHECK-NEXT: VirtualAddress = 0xC 42// CHECK-NEXT: SymbolTableIndex = 0 43// CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) 44// CHECK-NEXT: SymbolName = .text 45// CHECK-NEXT: } 46// CHECK-NEXT: ] 47