// RUN: llvm-mc -filetype=obj -triple i686-pc-mingw32 %s | coff-dump.py | FileCheck %s .def _foobar; .scl 2; .type 32; .endef .text .long 0 .globl _foobar .align 16, 0x90 _foobar: # @foobar # BB#0: ret .data .globl _rust_crate # @rust_crate .align 4 _rust_crate: .long 0 .long _foobar .long _foobar-_rust_crate .long _foobar-_rust_crate // CHECK: Name = .data // CHECK: SectionData = // CHECK-NEXT: 00 00 00 00 00 00 00 00 - 1C 00 00 00 20 00 00 00 |............ ...| // CHECK: Relocations = [ // CHECK-NEXT: 0 = { // CHECK-NEXT: VirtualAddress = 0x4 // CHECK-NEXT: SymbolTableIndex = // CHECK-NEXT: Type = IMAGE_REL_I386_DIR32 (6) // CHECK-NEXT: SymbolName = _foobar // CHECK-NEXT: } // CHECK-NEXT: 1 = { // CHECK-NEXT: VirtualAddress = 0x8 // CHECK-NEXT: SymbolTableIndex = 0 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) // CHECK-NEXT: SymbolName = .text // CHECK-NEXT: } // CHECK-NEXT: 2 = { // CHECK-NEXT: VirtualAddress = 0xC // CHECK-NEXT: SymbolTableIndex = 0 // CHECK-NEXT: Type = IMAGE_REL_I386_REL32 (20) // CHECK-NEXT: SymbolName = .text // CHECK-NEXT: } // CHECK-NEXT: ]