1*9880d681SAndroid Build Coastguard WorkerRUN: grep '^ADDR:' %s | sed -s 's/ADDR: //' \ 2*9880d681SAndroid Build Coastguard WorkerRUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-dwarf.exe" \ 3*9880d681SAndroid Build Coastguard WorkerRUN: | FileCheck %s 4*9880d681SAndroid Build Coastguard Worker 5*9880d681SAndroid Build Coastguard WorkerThis test relies on UnDecorateSymbolName, which is Windows-only. 6*9880d681SAndroid Build Coastguard WorkerREQUIRES: system-windows 7*9880d681SAndroid Build Coastguard Worker 8*9880d681SAndroid Build Coastguard WorkerADDR: 0x5009 9*9880d681SAndroid Build Coastguard WorkerADDR: 0x5038 10*9880d681SAndroid Build Coastguard Worker 11*9880d681SAndroid Build Coastguard WorkerCHECK: foo(void) 12*9880d681SAndroid Build Coastguard WorkerCHECK: coff-dwarf.cpp:7 13*9880d681SAndroid Build Coastguard WorkerCHECK: bar(void) 14*9880d681SAndroid Build Coastguard WorkerCHECK: coff-dwarf.cpp:13 15*9880d681SAndroid Build Coastguard WorkerCHECK: main 16*9880d681SAndroid Build Coastguard WorkerCHECK: coff-dwarf.cpp:17 17