1# RUN: yaml2obj %s -o %t
2# RUN: %lldb %t -o "target modules dump sections" -o exit \
3# RUN:   | FileCheck --match-full-lines --strict-whitespace %s
4
5#      CHECK:Sections for '{{.*}}command-target-modules-dump-sections.yaml.tmp' (x86_64):
6# CHECK-NEXT:  SectID     Type             File Address                             Perm File Off.  File Size  Flags      Section Name
7# CHECK-NEXT:  ---------- ---------------- ---------------------------------------  ---- ---------- ---------- ---------- ----------------------------
8# CHECK-NEXT:  0x00000001 code             [0x0000000000004000-0x0000000000005000)  r-x  0x00001000 0x00001000 0x00000006 command-target-modules-dump-sections.yaml.tmp..text
9# CHECK-NEXT:  0x00000002 regular          [0x0000000000005000-0x0000000000005100)  r--  0x00002000 0x00000100 0x00000002 command-target-modules-dump-sections.yaml.tmp..rodata
10# CHECK-NEXT:  0x00000003 eh-frame         [0x0000000000006000-0x0000000000006040)  r--  0x00002100 0x00000040 0x00000002 command-target-modules-dump-sections.yaml.tmp..eh_frame
11--- !ELF
12FileHeader:
13  Class:           ELFCLASS64
14  Data:            ELFDATA2LSB
15  Type:            ET_EXEC
16  Machine:         EM_X86_64
17Sections:
18  - Name:            .text
19    Type:            SHT_PROGBITS
20    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
21    Address:         0x0000000000004000
22    AddressAlign:    0x0000000000001000
23    Size:            0x1000
24  - Name:            .rodata
25    Type:            SHT_PROGBITS
26    Flags:           [ SHF_ALLOC ]
27    Address:         0x0000000000005000
28    AddressAlign:    0x0000000000000020
29    Size:            0x100
30  - Name:            .eh_frame
31    Type:            SHT_X86_64_UNWIND
32    Flags:           [ SHF_ALLOC ]
33    Address:         0x0000000000006000
34    AddressAlign:    0x0000000000000008
35    Size:            0x40
36...
37