1 # RUN: yaml2obj %s -o %t
2 # RUN: %lldb %t -o "target modules dump sections" -o exit \
3 # RUN: | FileCheck --match-full-lines --strict-whitespace %s
5 # CHECK:Sections for '{{.*}}command-target-modules-dump-sections.yaml.tmp' (x86_64):
6 # CHECK-NEXT: SectID Type File Address Perm File Off. File Size Flags Section Name
7 # CHECK-NEXT: ---------- ---------------- --------------------------------------- ---- ---------- ---------- ---------- ----------------------------
8 # CHECK-NEXT: 0x00000001 code [0x0000000000004000-0x0000000000005000) r-x 0x00001000 0x00001000 0x00000006 command-target-modules-dump-sections.yaml.tmp..text
9 # CHECK-NEXT: 0x00000002 regular [0x0000000000005000-0x0000000000005100) r-- 0x00002000 0x00000100 0x00000002 command-target-modules-dump-sections.yaml.tmp..rodata
10 # CHECK-NEXT: 0x00000003 eh-frame [0x0000000000006000-0x0000000000006040) r-- 0x00002100 0x00000040 0x00000002 command-target-modules-dump-sections.yaml.tmp..eh_frame
20 Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
21 Address: 0x0000000000004000
22 AddressAlign: 0x0000000000001000
27 Address: 0x0000000000005000
28 AddressAlign: 0x0000000000000020
31 Type: SHT_X86_64_UNWIND
33 Address: 0x0000000000006000
34 AddressAlign: 0x0000000000000008