1 // RUN
: llvm-mc
-filetype
=obj
-triple i686-pc-mingw32
%s | coff-dump.py | FileCheck
%s
16 .globl _rust_crate # @rust_crate
21 .long _foobar-_rust_crate
22 .long _foobar-_rust_crate
24 // CHECK
: Name
= .data
25 // CHECK
: SectionData
=
26 // CHECK-NEXT
: 00 00 00 00 00 00 00 00 - 1C
00 00 00 20 00 00 00 |
............ ...|
27 // CHECK
: Relocations
= [
29 // CHECK-NEXT
: VirtualAddress
= 0x4
30 // CHECK-NEXT
: SymbolTableIndex
=
31 // CHECK-NEXT
: Type
= IMAGE_REL_I386_DIR32
(6)
32 // CHECK-NEXT
: SymbolName
= _foobar
35 // CHECK-NEXT
: VirtualAddress
= 0x8
36 // CHECK-NEXT
: SymbolTableIndex
= 0
37 // CHECK-NEXT
: Type
= IMAGE_REL_I386_REL32
(20)
38 // CHECK-NEXT
: SymbolName
= .text
41 // CHECK-NEXT
: VirtualAddress
= 0xC
42 // CHECK-NEXT
: SymbolTableIndex
= 0
43 // CHECK-NEXT
: Type
= IMAGE_REL_I386_REL32
(20)
44 // CHECK-NEXT
: SymbolName
= .text