# RUN: yaml2obj %s -o %t # RUN: llvm-objdump -d -C %t | FileCheck --check-prefix=DEMANGLE %s # RUN: llvm-objdump -d --demangle %t | FileCheck --check-prefix=DEMANGLE %s # RUN: llvm-objdump -d %t | FileCheck --check-prefix=NO-DEMANGLE %s !ELF FileHeader: Class: ELFCLASS64 Data: ELFDATA2LSB Type: ET_EXEC Machine: EM_X86_64 Sections: - Name: .text1 Type: SHT_PROGBITS Flags: [ SHF_ALLOC, SHF_EXECINSTR ] Address: 0x1000 AddressAlign: 0x0000000000000010 Content: "0000000000000000" - Name: .text2 Type: SHT_PROGBITS Flags: [ SHF_ALLOC, SHF_EXECINSTR ] Address: 0x1010 AddressAlign: 0x0000000000000010 Content: "0000000000000000" Symbols: - Name: _Z3fooi Type: STT_FUNC Section: .text1 Value: 0x1000 - Name: _Z3foov Type: STT_FUNC Section: .text2 Value: 0x1010 # We just want to check that the symbols are demangled # DEMANGLE: foo(int) # DEMANGLE: foo() # NO-DEMANGLE: _Z3fooi # NO-DEMANGLE: _Z3foov