1# RUN: yaml2obj %s -o %t 2# RUN: %lldb %t -o "target modules dump sections" -o exit \ 3# RUN: | FileCheck --match-full-lines --strict-whitespace %s 4 5# CHECK:Sections for '{{.*}}command-target-modules-dump-sections.yaml.tmp' (x86_64): 6# CHECK-NEXT: SectID Type File Address Perm File Off. File Size Flags Section Name 7# CHECK-NEXT: ---------- ---------------- --------------------------------------- ---- ---------- ---------- ---------- ---------------------------- 8# CHECK-NEXT: 0x00000001 code [0x0000000000004000-0x0000000000005000) r-x 0x00001000 0x00001000 0x00000006 command-target-modules-dump-sections.yaml.tmp..text 9# CHECK-NEXT: 0x00000002 regular [0x0000000000005000-0x0000000000005100) r-- 0x00002000 0x00000100 0x00000002 command-target-modules-dump-sections.yaml.tmp..rodata 10# CHECK-NEXT: 0x00000003 eh-frame [0x0000000000006000-0x0000000000006040) r-- 0x00002100 0x00000040 0x00000002 command-target-modules-dump-sections.yaml.tmp..eh_frame 11--- !ELF 12FileHeader: 13 Class: ELFCLASS64 14 Data: ELFDATA2LSB 15 Type: ET_EXEC 16 Machine: EM_X86_64 17Sections: 18 - Name: .text 19 Type: SHT_PROGBITS 20 Flags: [ SHF_ALLOC, SHF_EXECINSTR ] 21 Address: 0x0000000000004000 22 AddressAlign: 0x0000000000001000 23 Size: 0x1000 24 - Name: .rodata 25 Type: SHT_PROGBITS 26 Flags: [ SHF_ALLOC ] 27 Address: 0x0000000000005000 28 AddressAlign: 0x0000000000000020 29 Size: 0x100 30 - Name: .eh_frame 31 Type: SHT_X86_64_UNWIND 32 Flags: [ SHF_ALLOC ] 33 Address: 0x0000000000006000 34 AddressAlign: 0x0000000000000008 35 Size: 0x40 36... 37