xref: /aosp_15_r20/external/llvm/test/tools/llvm-objdump/ARM/macho-symbolized-disassembly.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.obj.macho-arm | FileCheck %s -check-prefix=OBJ
2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.exe.macho-arm | FileCheck %s -check-prefix=EXE
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard WorkerOBJ: 00000006	40 f2 24 03 	movw	r3, :lower16:((54-14)-4)
5*9880d681SAndroid Build Coastguard WorkerOBJ: 0000000a	c0 f2 00 03 	movt	r3, :upper16:((54-14)-4)
6*9880d681SAndroid Build Coastguard WorkerOBJ: 00000024	ff f7 ec ff 	bl	_printf
7*9880d681SAndroid Build Coastguard Worker
8*9880d681SAndroid Build Coastguard WorkerEXE: 0000bfa8	00 f0 28 e8 	blx	0xbffc @ symbol stub for: _printf
9