1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
| # RUN: yaml2obj %s > %t
# RUN: llvm-objdump -d -C %t | FileCheck --check-prefix=DEMANGLE %s
# RUN: llvm-objdump -d --demangle %t | FileCheck --check-prefix=DEMANGLE %s
# RUN: llvm-objdump -d %t | FileCheck --check-prefix=NO-DEMANGLE %s
!ELF
FileHeader:
Class: ELFCLASS64
Data: ELFDATA2LSB
Type: ET_EXEC
Machine: EM_X86_64
Sections:
- Name: .text1
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
Address: 0x1000
AddressAlign: 0x0000000000000010
Content: "0000000000000000"
- Name: .text2
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
Address: 0x1010
AddressAlign: 0x0000000000000010
Content: "0000000000000000"
Symbols:
- Name: _Z3fooi
Type: STT_FUNC
Section: .text1
Value: 0x1000
- Name: _Z3foov
Type: STT_FUNC
Section: .text2
Value: 0x1010
# We just want to check that the symbols are demangled
# DEMANGLE: foo(int)
# DEMANGLE: foo()
# NO-DEMANGLE: _Z3fooi
# NO-DEMANGLE: _Z3foov
|