xref: /aosp_15_r20/external/llvm/test/tools/llvm-objdump/X86/macho-symbol-table.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard WorkerRUN: llvm-objdump -macho -t %p/Inputs/hello.obj.macho-x86_64 | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker
3*9880d681SAndroid Build Coastguard WorkerCHECK: SYMBOL TABLE:
4*9880d681SAndroid Build Coastguard WorkerCHECK: 000000000000003b l       __TEXT,__cstring	L_.str
5*9880d681SAndroid Build Coastguard WorkerCHECK: 0000000000000068 l       __TEXT,__eh_frame	EH_frame0
6*9880d681SAndroid Build Coastguard WorkerCHECK: 0000000000000000 g     F __TEXT,__text	        _main
7*9880d681SAndroid Build Coastguard WorkerCHECK: 0000000000000080 g       __TEXT,__eh_frame	_main.eh
8*9880d681SAndroid Build Coastguard WorkerCHECK: 0000000000000000         *UND*	                _printf
9