1*9880d681SAndroid Build Coastguard WorkerRUN: grep '^ADDR:' %s | sed -s 's/ADDR: //' \ 2*9880d681SAndroid Build Coastguard WorkerRUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-exports.exe" \ 3*9880d681SAndroid Build Coastguard WorkerRUN: | FileCheck %s 4*9880d681SAndroid Build Coastguard Worker 5*9880d681SAndroid Build Coastguard WorkerThis test relies on UnDecorateSymbolName, which is Windows-only. 6*9880d681SAndroid Build Coastguard WorkerREQUIRES: system-windows 7*9880d681SAndroid Build Coastguard Worker 8*9880d681SAndroid Build Coastguard WorkerADDR: 0x500A 9*9880d681SAndroid Build Coastguard WorkerADDR: 0x5038 10*9880d681SAndroid Build Coastguard WorkerADDR: 0x504B 11*9880d681SAndroid Build Coastguard Worker 12*9880d681SAndroid Build Coastguard WorkerWe get the expected stack trace, except 'foo' appears for the 'bar' frame 13*9880d681SAndroid Build Coastguard Workerbecause 'bar' isn't in the export table. 14*9880d681SAndroid Build Coastguard Worker 15*9880d681SAndroid Build Coastguard WorkerCHECK: foo(void) 16*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0 17*9880d681SAndroid Build Coastguard WorkerCHECK: foo(void) 18*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0 19*9880d681SAndroid Build Coastguard WorkerCHECK: main 20*9880d681SAndroid Build Coastguard WorkerCHECK: ??:0:0 21