// RUN: llvm-mc -triple i686-windows -filetype obj -o %t.obj %s // RUN: llvm-rtdyld -triple i686-windows -dummy-extern _OutputDebugStringA@4=0xfffffffe -dummy-extern _ExitProcess@4=0xffffffff -verify -check=%s %t.obj .text .def _main .scl 2 .type 32 .endef .global _main _main: rel1: call _function // IMAGE_REL_I386_REL32 # rtdyld-check: decode_operand(rel1, 0) = (_function-_main-4-1) xorl %eax, %eax retl .def _function .scl 2 .type 32 .endef _function: rel2: pushl string rel3: calll *__imp__OutputDebugStringA // IMAGE_REL_I386_DIR32 # rtdyld-check: decode_operand(rel3, 3) = __imp__OutputDebugStringA addl $4, %esp pushl $0 rel4: calll *__imp__ExitProcess // IMAGE_REL_I386_DIR32 # rtdyld-check: decode_operand(rel4, 3) = __imp__ExitProcess addl $4, %esp retl .data .global __imp__OutputDebugStringA .align 4 __imp__OutputDebugStringA: .long "_OutputDebugStringA@4" // IMAGE_REL_I386_DIR32 # rtdyld-check: *{4}__imp__OutputDebugStringA = 0xfffffffe .global __imp__ExitProcess .align 4 __imp__ExitProcess: .long "_ExitProcess@4" // IMAGE_REL_I386_DIR32 # rtdyld-check: *{4}__imp__ExitProcess = 0xffffffff .global string .align 1 string: .asciz "Hello World!\n" .global relocations relocations: rel5: .long _function@imgrel // IMAGE_REL_I386_DIR32NB # rtdyld-check: *{4}rel5 = _function - section_addr(COFF_i386.s.tmp.obj, .text) rel6: # rtdyld-check: *{2}rel6 = 1 .secidx __imp__OutputDebugStringA // IMAGE_REL_I386_SECTION rel7: # rtdyld-check: *{4}rel7 = relocations - section_addr(COFF_i386.s.tmp.obj, .data) .secrel32 relocations // IMAGE_REL_I386_SECREL