objdump-private-headers.test 1.4 KB

12345678910111213141516171819202122232425
  1. RUN: llvm-objdump -p %p/Inputs/program-headers.elf-i386 \
  2. RUN: | FileCheck %s -check-prefix ELF-i386
  3. RUN: llvm-objdump -p %p/Inputs/program-headers.elf-x86-64 \
  4. RUN: | FileCheck %s -check-prefix ELF-x86-64
  5. RUN: llvm-objdump -p %p/Inputs/macho-rpath-x86_64 \
  6. RUN: | FileCheck %s -check-prefix MACHO-x86_64
  7. ELF-i386: Program Header:
  8. ELF-i386: LOAD off 0x00000000 vaddr 0x08048000 paddr 0x08048000 align 2**12
  9. ELF-i386: filesz 0x00000134 memsz 0x00000134 flags r-x
  10. ELF-i386: STACK off 0x00000000 vaddr 0x00000000 paddr 0x00000000 align 2**2
  11. ELF-i386: filesz 0x00000000 memsz 0x00000000 flags rw-
  12. ELF-x86-64: Program Header:
  13. ELF-x86-64: LOAD off 0x0000000000000000 vaddr 0x0000000000400000 paddr 0x0000000000400000 align 2**21
  14. ELF-x86-64: filesz 0x0000000000000138 memsz 0x0000000000000138 flags r-x
  15. ELF-x86-64: EH_FRAME off 0x00000000000000f4 vaddr 0x00000000004000f4 paddr 0x00000000004000f4 align 2**2
  16. ELF-x86-64: filesz 0x0000000000000014 memsz 0x0000000000000014 flags r--
  17. ELF-x86-64: STACK off 0x0000000000000000 vaddr 0x0000000000000000 paddr 0x0000000000000000 align 2**3
  18. ELF-x86-64: filesz 0x0000000000000000 memsz 0x0000000000000000 flags rw-
  19. MACHO-x86_64: Load command 12
  20. MACHO-x86_64: cmd LC_RPATH
  21. MACHO-x86_64: cmdsize 32
  22. MACHO-x86_64: path @executable_path/. (offset 12)