xref: /aosp_15_r20/external/llvm/test/tools/llvm-symbolizer/coff-exports.test (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard WorkerRUN: grep '^ADDR:' %s | sed -s 's/ADDR: //' \
2*9880d681SAndroid Build Coastguard WorkerRUN: 	 | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-exports.exe" \
3*9880d681SAndroid Build Coastguard WorkerRUN:	 | FileCheck %s
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard WorkerThis test relies on UnDecorateSymbolName, which is Windows-only.
6*9880d681SAndroid Build Coastguard WorkerREQUIRES: system-windows
7*9880d681SAndroid Build Coastguard Worker
8*9880d681SAndroid Build Coastguard WorkerADDR: 0x500A
9*9880d681SAndroid Build Coastguard WorkerADDR: 0x5038
10*9880d681SAndroid Build Coastguard WorkerADDR: 0x504B
11*9880d681SAndroid Build Coastguard Worker
12*9880d681SAndroid Build Coastguard WorkerWe get the expected stack trace, except 'foo' appears for the 'bar' frame
13*9880d681SAndroid Build Coastguard Workerbecause 'bar' isn't in the export table.
14*9880d681SAndroid Build Coastguard Worker
15*9880d681SAndroid Build Coastguard WorkerCHECK: foo(void)
16*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0
17*9880d681SAndroid Build Coastguard WorkerCHECK: foo(void)
18*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0
19*9880d681SAndroid Build Coastguard WorkerCHECK: main
20*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0
21