xref: /aosp_15_r20/external/llvm/test/tools/llvm-objdump/X86/hex-displacement.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker# Check that target displacement has '0x' prefix
2*9880d681SAndroid Build Coastguard Worker# to accent hex format of the number.
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Worker# RUN: llvm-objdump -d %p/Inputs/hello.exe.macho-i386 | FileCheck %s
5*9880d681SAndroid Build Coastguard Worker
6*9880d681SAndroid Build Coastguard Worker# CHECK: 1f47:   e8 00 00 00 00  calll   0 <_main+0xC>
7