blob: 1232033a85c466ba8514aab5a8177e7b60af80d6 [file] [log] [blame]
Paul Semel007dedb2018-07-18 16:39:21 +00001# RUN: yaml2obj %s > %t
2# RUN: llvm-objdump -d -C %t | FileCheck --check-prefix=DEMANGLE %s
Zachary Turner030ad372018-08-20 22:18:21 +00003# RUN: llvm-objdump -d --demangle %t | FileCheck --check-prefix=DEMANGLE %s
Paul Semel007dedb2018-07-18 16:39:21 +00004# RUN: llvm-objdump -d %t | FileCheck --check-prefix=NO-DEMANGLE %s
Paul Semel007dedb2018-07-18 16:39:21 +00005
6!ELF
7FileHeader:
8 Class: ELFCLASS64
9 Data: ELFDATA2LSB
10 Type: ET_EXEC
11 Machine: EM_X86_64
12Sections:
13 - Name: .text1
14 Type: SHT_PROGBITS
15 Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
16 Address: 0x1000
17 AddressAlign: 0x0000000000000010
18 Content: "0000000000000000"
19 - Name: .text2
20 Type: SHT_PROGBITS
21 Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
22 Address: 0x1010
23 AddressAlign: 0x0000000000000010
24 Content: "0000000000000000"
25Symbols:
26 Local:
27 - Name: _Z3fooi
28 Type: STT_FUNC
29 Section: .text1
30 Value: 0x1000
31 - Name: _Z3foov
32 Type: STT_FUNC
33 Section: .text2
34 Value: 0x1010
35
36# We just want to check that the symbols are demangled
37# DEMANGLE: foo(int)
38# DEMANGLE: foo()
39
40# NO-DEMANGLE: _Z3fooi
41# NO-DEMANGLE: _Z3foov