• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1// RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s
2
3	.def	 _foobar;
4	.scl	2;
5	.type	32;
6	.endef
7	.text
8	.long   0
9	.globl	_foobar
10	.align	16, 0x90
11_foobar:                                # @foobar
12# BB#0:
13	ret
14
15	.data
16	.globl	_rust_crate             # @rust_crate
17	.align	4
18_rust_crate:
19	.long   0
20	.long   _foobar
21	.long	_foobar-_rust_crate
22	.long	_foobar-_rust_crate
23
24// CHECK:      Name                     = .data
25// CHECK:      SectionData              =
26// CHECK-NEXT:   00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...|
27// CHECK:        Relocations              = [
28// CHECK-NEXT:   0 = {
29// CHECK-NEXT:     VirtualAddress           = 0x4
30// CHECK-NEXT:     SymbolTableIndex         =
31// CHECK-NEXT:     Type                     = IMAGE_REL_I386_DIR32 (6)
32// CHECK-NEXT:     SymbolName               = _foobar
33// CHECK-NEXT:   }
34// CHECK-NEXT:   1 = {
35// CHECK-NEXT:     VirtualAddress           = 0x8
36// CHECK-NEXT:     SymbolTableIndex         = 0
37// CHECK-NEXT:     Type                     = IMAGE_REL_I386_REL32 (20)
38// CHECK-NEXT:     SymbolName               = .text
39// CHECK-NEXT:   }
40// CHECK-NEXT:   2 = {
41// CHECK-NEXT:     VirtualAddress           = 0xC
42// CHECK-NEXT:     SymbolTableIndex         = 0
43// CHECK-NEXT:     Type                     = IMAGE_REL_I386_REL32 (20)
44// CHECK-NEXT:     SymbolName               = .text
45// CHECK-NEXT:   }
46// CHECK-NEXT: ]
47