simple-pe64-dll.test 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. # RUN: %yaml2obj %s -o %t.obj
  2. # RUN: %bloaty --raw-map %t.obj | %FileCheck %s --dump-input fail
  3. --- !COFF
  4. OptionalHeader:
  5. AddressOfEntryPoint: 4192
  6. ImageBase: 268435456
  7. SectionAlignment: 4096
  8. FileAlignment: 512
  9. MajorOperatingSystemVersion: 4
  10. MinorOperatingSystemVersion: 0
  11. MajorImageVersion: 0
  12. MinorImageVersion: 0
  13. MajorSubsystemVersion: 4
  14. MinorSubsystemVersion: 0
  15. Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
  16. DLLCharacteristics: [ ]
  17. SizeOfStackReserve: 1048576
  18. SizeOfStackCommit: 4096
  19. SizeOfHeapReserve: 1048576
  20. SizeOfHeapCommit: 4096
  21. ExportTable:
  22. RelativeVirtualAddress: 8320
  23. Size: 336
  24. ImportTable:
  25. RelativeVirtualAddress: 8224
  26. Size: 40
  27. ResourceTable:
  28. RelativeVirtualAddress: 0
  29. Size: 0
  30. ExceptionTable:
  31. RelativeVirtualAddress: 12288
  32. Size: 36
  33. CertificateTable:
  34. RelativeVirtualAddress: 0
  35. Size: 0
  36. BaseRelocationTable:
  37. RelativeVirtualAddress: 0
  38. Size: 0
  39. Debug:
  40. RelativeVirtualAddress: 0
  41. Size: 0
  42. Architecture:
  43. RelativeVirtualAddress: 0
  44. Size: 0
  45. GlobalPtr:
  46. RelativeVirtualAddress: 0
  47. Size: 0
  48. TlsTable:
  49. RelativeVirtualAddress: 0
  50. Size: 0
  51. LoadConfigTable:
  52. RelativeVirtualAddress: 0
  53. Size: 0
  54. BoundImport:
  55. RelativeVirtualAddress: 0
  56. Size: 0
  57. IAT:
  58. RelativeVirtualAddress: 8264
  59. Size: 16
  60. DelayImportDescriptor:
  61. RelativeVirtualAddress: 0
  62. Size: 0
  63. ClrRuntimeHeader:
  64. RelativeVirtualAddress: 0
  65. Size: 0
  66. header:
  67. Machine: IMAGE_FILE_MACHINE_AMD64
  68. Characteristics: [ IMAGE_FILE_EXECUTABLE_IMAGE, IMAGE_FILE_LINE_NUMS_STRIPPED, IMAGE_FILE_LOCAL_SYMS_STRIPPED, IMAGE_FILE_LARGE_ADDRESS_AWARE, IMAGE_FILE_DEBUG_STRIPPED, IMAGE_FILE_DLL ]
  69. sections:
  70. - Name: .text
  71. Characteristics: [ IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ ]
  72. VirtualAddress: 4096
  73. VirtualSize: 168
  74. SectionData: 554889E54881EC20000000488D0DEE0F0000E889000000C9C30000000104020504030150554889E54881EC2000000048894D10488955184C8945204C894D28488D0DC30F0000E855000000B800000000E900000000C9C3000000000000000000554889E54881EC3000000048894D10488955184C894520488B45204989C08B5518488B4D10E89AFFFFFF8945FC8B45FCE900000000C9C3000104020504030150FF25A20F00000000
  75. - Name: .data
  76. Characteristics: [ IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE ]
  77. VirtualAddress: 8192
  78. VirtualSize: 480
  79. SectionData: 637572696F757321004D61726B204A616E73656E0000000000000000000000005820000000000000000000006820000048200000000000000000000000000000000000000000000073200000000000000000000000000000732000000000000000000000000000006D73766372742E646C6C000000707574730000000000000000000000000000000000000020210000010000000C0000000C000000A8200000D820000008210000241000000040000000400000004000000040000000400000004000006010000020200000E0210000A0100000001000002D2100003521000046210000592100006A2100007D21000091210000A7210000B1210000B8210000BD210000C421000000000100020003000400050006000700080009000A000B00706536345F7374642E646C6C00446C6C4D61696E005F5F66696E695F61727261795F656E64005F5F66696E695F61727261795F7374617274005F5F696E69745F61727261795F656E64005F5F696E69745F61727261795F7374617274005F5F707265696E69745F61727261795F656E64005F5F707265696E69745F61727261795F7374617274005F646C6C7374617274005F6564617461005F656E64005F65746578740068656C6C6F5F74686572650000000000000000000000000000000000
  80. - Name: .pdata
  81. Characteristics: [ IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ ]
  82. VirtualAddress: 12288
  83. VirtualSize: 36
  84. SectionData: 0B100000191000001C1000002F100000571000001C1000006B1000009710000098100000
  85. symbols: []
  86. ...
  87. # CHECK: FILE MAP:
  88. # CHECK: 000-188 392 [PE Headers]
  89. # CHECK: 188-200 120 [PE Section Headers]
  90. # CHECK: 200-400 512 .text
  91. # CHECK: 400-600 512 .data
  92. # CHECK: 600-800 512 .pdata
  93. # CHECK: VM MAP:
  94. # CHECK: 0000-0188 392 [PE Headers]
  95. # CHECK: 0188-0200 120 [PE Section Headers]
  96. # CHECK: 0200-1000 3584 [-- Nothing mapped --]
  97. # CHECK: 1000-10a8 168 .text
  98. # CHECK: 10a8-2000 3928 [-- Nothing mapped --]
  99. # CHECK: 2000-21e0 480 .data
  100. # CHECK: 21e0-3000 3616 [-- Nothing mapped --]
  101. # CHECK: 3000-3024 36 .pdata