xref: /aosp_15_r20/external/llvm/test/Object/objdump-file-header.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard WorkerRUN: yaml2obj %p/Inputs/COFF/i386.yaml | llvm-objdump -f - | FileCheck %s -check-prefix COFF-i386
2*9880d681SAndroid Build Coastguard WorkerRUN: llvm-objdump -f %p/Inputs/trivial-object-test.elf-i386 \
3*9880d681SAndroid Build Coastguard WorkerRUN:              | FileCheck %s -check-prefix ELF-i386
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard WorkerXFAIL: *
6*9880d681SAndroid Build Coastguard Worker
7*9880d681SAndroid Build Coastguard WorkerCOFF-i386: : file format
8*9880d681SAndroid Build Coastguard WorkerCOFF-i386: architecture: i386
9*9880d681SAndroid Build Coastguard WorkerCOFF-i386: HAS_RELOC
10*9880d681SAndroid Build Coastguard WorkerCOFF-i386: HAS_SYMS
11*9880d681SAndroid Build Coastguard WorkerCOFF-i386: start address 0x
12*9880d681SAndroid Build Coastguard Worker
13*9880d681SAndroid Build Coastguard WorkerELF-i386: : file format elf
14*9880d681SAndroid Build Coastguard WorkerELF-i386: architecture: i386
15*9880d681SAndroid Build Coastguard WorkerELF-i386: HAS_RELOC
16*9880d681SAndroid Build Coastguard WorkerELF-i386: HAS_SYMS
17*9880d681SAndroid Build Coastguard WorkerELF-i386: start address 0x
18