xref: /llvm-project/llvm/test/tools/llvm-objdump/X86/disassemble-demangle.test (revision 55c81d4282c5da0189711261a11537bc8a7fe85c)
1# RUN: yaml2obj %s -o %t
2# RUN: llvm-objdump -d -C %t | FileCheck --check-prefix=DEMANGLE %s
3# RUN: llvm-objdump -d --demangle %t | FileCheck --check-prefix=DEMANGLE %s
4# RUN: llvm-objdump -d %t | FileCheck --check-prefix=NO-DEMANGLE %s
5
6!ELF
7FileHeader:
8  Class:           ELFCLASS64
9  Data:            ELFDATA2LSB
10  Type:            ET_EXEC
11  Machine:         EM_X86_64
12Sections:
13  - Name:            .text1
14    Type:            SHT_PROGBITS
15    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
16    Address:         0x1000
17    AddressAlign:    0x0000000000000010
18    Content:         "0000000000000000"
19  - Name:            .text2
20    Type:            SHT_PROGBITS
21    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
22    Address:         0x1010
23    AddressAlign:    0x0000000000000010
24    Content:         "0000000000000000"
25Symbols:
26  - Name:     _Z3fooi
27    Type:     STT_FUNC
28    Section:  .text1
29    Value:    0x1000
30  - Name:     _Z3foov
31    Type:     STT_FUNC
32    Section:  .text2
33    Value:    0x1010
34
35# We just want to check that the symbols are demangled
36# DEMANGLE: foo(int)
37# DEMANGLE: foo()
38
39# NO-DEMANGLE: _Z3fooi
40# NO-DEMANGLE: _Z3foov
41