RUN: llvm-objdump --macho --dyld-info %p/Inputs/chained-fixups.macho-x86_64 | \
RUN: FileCheck -DNAME=%p/Inputs/chained-fixups.macho-x86_64 %s
RUN: llvm-otool -dyld_info %p/Inputs/chained-fixups.macho-x86_64 | \
RUN: FileCheck -DNAME=%p/Inputs/chained-fixups.macho-x86_64 %s
## See chained-fixups.test for how the test input was generated.
CHECK: [[NAME]]:
CHECK-NEXT: dyld information:
CHECK-NEXT: segment section address pointer type addend dylib symbol/vm address
CHECK-NEXT: __DATA_CONST __const 0x3E0 0x8010000000000001 bind 0x0 libdylib _weakImport (weak import)
CHECK-NEXT: __DATA_CONST __const 0x3E8 0x8000000000000000 bind 0x0 flat-namespace _dynamicLookup
CHECK-NEXT: __DATA __data 0x3F0 0x00200000000003F0 rebase 0x3F0
CHECK-NEXT: __DATA __data 0x400 0x8000000000000004 bind 0x0 weak _weak
CHECK-NEXT: __DATA __data 0x1410 0x8000000000000003 bind 0x0 weak _weakLocal
CHECK-NEXT: __DATA __data 0x3410 0x8010000000000002 bind 0x0 libdylib _dylib
CHECK-NEXT: __DATA __data 0x3418 0x800000002A000002 bind 0x2A libdylib _dylib
## TODO: Print opcode-based fixups/binds as well
## For now, test that execution doesn't fail if the input uses those.
RUN: llvm-objdump --macho --dyld-info %p/Inputs/bind.macho-x86_64
RUN: llvm-objdump --macho --dyld-info %p/Inputs/bind.macho-x86_64
## If both -chained_fixups and -dyld_info are passed, otool prints dyld_info
## output first. Match that.
RUN: llvm-otool -chained_fixups -dyld_info \
RUN: %p/Inputs/chained-fixups.macho-x86_64 | \
RUN: FileCheck --check-prefix=BOTH %s
BOTH: dyld information:
BOTH: chained fixups header