1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.obj.macho-x86_64 | FileCheck %s -check-prefix=OBJ 2*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.exe.macho-x86_64 | FileCheck %s -check-prefix=EXE 3*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/ObjC.obj.macho-x86_64 | FileCheck %s -check-prefix=ObjC-OBJ 4*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/ObjC.exe.macho-x86_64 | FileCheck %s -check-prefix=ObjC-EXE 5*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello_cpp.exe.macho-x86_64 | FileCheck %s -check-prefix=CXX-EXE 6*9880d681SAndroid Build Coastguard Worker 7*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.obj.macho-i386 | FileCheck %s -check-prefix=i386-OBJ 8*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex %p/Inputs/hello.exe.macho-i386 | FileCheck %s -check-prefix=i386-EXE 9*9880d681SAndroid Build Coastguard Worker 10*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex -no-symbolic-operands %p/Inputs/hello.obj.macho-x86_64 | FileCheck %s -check-prefix=NO-SYM-OPS-OBJ 11*9880d681SAndroid Build Coastguard Worker// RUN: llvm-objdump -d -m -no-show-raw-insn -full-leading-addr -print-imm-hex -no-symbolic-operands %p/Inputs/hello.exe.macho-x86_64 | FileCheck %s -check-prefix=NO-SYM-OPS-EXE 12*9880d681SAndroid Build Coastguard Worker 13*9880d681SAndroid Build Coastguard WorkerOBJ: 0000000000000008 leaq L_.str(%rip), %rax ## literal pool for: "Hello world\n" 14*9880d681SAndroid Build Coastguard WorkerOBJ: 0000000000000026 callq _printf 15*9880d681SAndroid Build Coastguard Worker 16*9880d681SAndroid Build Coastguard WorkerEXE: 0000000100000f38 leaq 0x4f(%rip), %rax ## literal pool for: "Hello world\n" 17*9880d681SAndroid Build Coastguard WorkerEXE: 0000000100000f56 callq 0x100000f6c ## symbol stub for: _printf 18*9880d681SAndroid Build Coastguard Worker 19*9880d681SAndroid Build Coastguard WorkerObjC-OBJ: 0000000000000008 leaq 0xb1(%rip), %rax ## Objc cfstring ref: @"The current date and time is: %@" 20*9880d681SAndroid Build Coastguard WorkerObjC-OBJ: 0000000000000016 movq 0x4b(%rip), %rcx ## Objc class ref: NSObject 21*9880d681SAndroid Build Coastguard WorkerObjC-OBJ: 000000000000001d movq 0x64(%rip), %rsi ## Objc selector ref: new 22*9880d681SAndroid Build Coastguard WorkerObjC-OBJ: 0000000000000034 movq 0x35(%rip), %rax ## Objc class ref: NSDate 23*9880d681SAndroid Build Coastguard WorkerObjC-OBJ: 000000000000003b movq 0x4e(%rip), %rsi ## Objc selector ref: date 24*9880d681SAndroid Build Coastguard Worker 25*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000ee8 leaq 0x159(%rip), %rax ## Objc cfstring ref: @"The current date and time is: %@" 26*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000ef6 movq 0x13b(%rip), %rcx ## Objc class ref: _OBJC_CLASS_$_NSObject 27*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000efd movq 0x124(%rip), %rsi ## Objc selector ref: new 28*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000f0b callq 0x100000f4a ## Objc message: +[NSObject new] 29*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000f14 movq 0x125(%rip), %rax ## Objc class ref: _OBJC_CLASS_$_NSDate 30*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000f1b movq 0x10e(%rip), %rsi ## Objc selector ref: date 31*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000f25 callq 0x100000f4a ## Objc message: +[NSDate date] 32*9880d681SAndroid Build Coastguard WorkerObjC-EXE: 0000000100000f33 callq 0x100000f44 ## symbol stub for: _NSLog 33*9880d681SAndroid Build Coastguard Worker 34*9880d681SAndroid Build Coastguard WorkerCXX-EXE: 00000001000014cb callq __ZNSt3__116__pad_and_outputIcNS_11char_traitsIcEEEENS_19ostreambuf_iteratorIT_T0_EES6_PKS4_S8_S8_RNS_8ios_baseES4_ 35*9880d681SAndroid Build Coastguard Worker 36*9880d681SAndroid Build Coastguard Worker// FIXME: Demangler depends on host's <cxxabi.h>. 37*9880d681SAndroid Build Coastguard Worker// std::__1::ostreambuf_iterator<char, std::__1::char_traits<char> > std::__1::__pad_and_output<char, std::__1::char_traits<char> >(std::__1::ostreambuf_iterator<char, std::__1::char_traits<char> >, char const*, char const*, char const*, std::__1::ios_base&, char) 38*9880d681SAndroid Build Coastguard Worker 39*9880d681SAndroid Build Coastguard Workeri386-OBJ: 0000002f calll _printf 40*9880d681SAndroid Build Coastguard Worker 41*9880d681SAndroid Build Coastguard Workeri386-EXE: 00001f6f calll 0x1f84 ## symbol stub for: _printf 42*9880d681SAndroid Build Coastguard Worker 43*9880d681SAndroid Build Coastguard WorkerNO-SYM-OPS-OBJ: 0000000000000008 leaq (%rip), %rax 44*9880d681SAndroid Build Coastguard WorkerNO-SYM-OPS-OBJ: 0000000000000026 callq 0x2b 45*9880d681SAndroid Build Coastguard Worker 46*9880d681SAndroid Build Coastguard WorkerNO-SYM-OPS-EXE: 0000000100000f38 leaq 0x4f(%rip), %rax 47*9880d681SAndroid Build Coastguard WorkerNO-SYM-OPS-EXE: 0000000100000f56 callq 0x100000f6c 48