1; This test ensures that we drop the preempted copy of @f from %t2.bc from its 2; comdat after making it available_externally. If not we would get a 3; verification error. 4; RUN: opt -module-summary %s -o %t1.bc 5; RUN: opt -module-summary %p/Inputs/linkonce_resolution_comdat.ll -o %t2.bc 6; RUN: llvm-lto -thinlto-action=run %t1.bc %t2.bc -exported-symbol=f -exported-symbol=g -thinlto-save-temps=%t3. 7 8; RUN: llvm-dis %t3.0.3.imported.bc -o - | FileCheck %s --check-prefix=IMPORT1 9; RUN: llvm-dis %t3.1.3.imported.bc -o - | FileCheck %s --check-prefix=IMPORT2 10; Copy from first module is prevailing and converted to weak_odr, copy 11; from second module is preempted and converted to available_externally and 12; removed from comdat. 13; IMPORT1: define weak_odr i32 @f(i8* %0) unnamed_addr comdat($c1) { 14; IMPORT2: define available_externally i32 @f(i8* %0) unnamed_addr { 15 16; RUN: llvm-nm -o - < %t1.bc.thinlto.o | FileCheck %s --check-prefix=NM1 17; NM1: W f 18 19; RUN: llvm-nm -o - < %t2.bc.thinlto.o | FileCheck %s --check-prefix=NM2 20; f() would have been turned into available_externally since it is preempted, 21; and inlined into g() 22; NM2-NOT: f 23 24target datalayout = "e-m:e-p270:32:32-p271:32:32-p272:64:64-i64:64-f80:128-n8:16:32:64-S128" 25target triple = "x86_64-unknown-linux-gnu" 26 27$c1 = comdat any 28 29define linkonce_odr i32 @f(i8*) unnamed_addr comdat($c1) { 30 ret i32 43 31} 32