xref: /aosp_15_r20/external/llvm/test/tools/llvm-objdump/macho-bind.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker# RUN: llvm-objdump -macho -bind %p/Inputs/bind.macho-x86_64 \
2*9880d681SAndroid Build Coastguard Worker# RUN:   | FileCheck %s
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001028  pointer  0        flat-namespace      _any
6*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001020  pointer  0        main-executable     _fromApp
7*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001018  pointer  0        this-image          _myfunc
8*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001000  pointer  0        libfoo              _foo
9*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001008  pointer  0        libbar              _bar
10*9880d681SAndroid Build Coastguard Worker# CHECK:__DATA   __data             0x00001010  pointer  0        libSystem           _malloc
11