1 // RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s
16 .globl _rust_crate # @rust_crate
21 .long _foobar-_rust_crate
22 .long _foobar-_rust_crate
24 // CHECK: Name = .data
25 // CHECK: SectionData =
26 // CHECK-NEXT: 00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...|
27 // CHECK: Relocations = [
29 // CHECK-NEXT: VirtualAddress = 0x4
30 // CHECK-NEXT: SymbolTableIndex =
31 // CHECK-NEXT: Type = IMAGE_REL_I386_DIR32 (6)
32 // CHECK-NEXT: SymbolName = _foobar
35 // CHECK-NEXT: VirtualAddress = 0x8
36 // CHECK-NEXT: SymbolTableIndex = 0
37 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20)
38 // CHECK-NEXT: SymbolName = .text
41 // CHECK-NEXT: VirtualAddress = 0xC
42 // CHECK-NEXT: SymbolTableIndex = 0
43 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20)
44 // CHECK-NEXT: SymbolName = .text