## Show which labels are printed in disassembly of an executable.

# RUN: yaml2obj %s -o %t
# RUN: llvm-objdump %t -d | FileCheck %s --implicit-check-not=stt_section \
# RUN:                                   --implicit-check-not=fourth \
# RUN:                                   --implicit-check-not=absolute \
# RUN:                                   --implicit-check-not=other

# Match this line so the implicit check-nots don't match the path.
# CHECK: {{^.*}}file format elf64-x86-64

# CHECK:     0000000000004000 <first>:
# CHECK:     0000000000004001 <second>:
# CHECK:     0000000000004002 <third>:

--- !ELF
FileHeader:
  Class:   ELFCLASS64
  Data:    ELFDATA2LSB
  Type:    ET_EXEC
  Machine: EM_X86_64
Sections:
  - Name:    .text
    Type:    SHT_PROGBITS
    Address: 0x4000
    Flags:   [SHF_ALLOC, SHF_EXECINSTR]
    Content: '9090909090'
  - Name:    .text2
    Type:    SHT_PROGBITS
    Address: 0x4004
    Flags:   [SHF_ALLOC, SHF_EXECINSTR]
    Size:    0
Symbols:
  - Name:    first # Shows, with second, that symbol sizes are not used to delineate functions.
    Value:   0x4000
    Section: .text
    Size:    0x2
  - Name:    second
    Value:   0x4001
    Size:    0x1
    Section: .text
  - Name:    third # Shows, with fourth, that first symbol is picked.
    Value:   0x4002
    Section: .text
  - Name:    fourth
    Value:   0x4002
    Section: .text
  - Name:    stt_section # Shows that STT_SECTION symbols are ignored even if no other symbol present.
    Value:   0x4003
    Type:    STT_SECTION
    Section: .text
  - Name:    absolute # Show that absolute symbols are ignored.
    Value:   0x4004
    Index:   SHN_ABS
  - Name:    other # Show that symbols from other sections are ignored.
    Value:   0x4004
    Section: .text2
