1*9880d681SAndroid Build Coastguard Worker// RUN: llvm-mc -filetype=obj -triple x86_64-pc-linux-gnu %s -o - | llvm-readobj -t | FileCheck %s 2*9880d681SAndroid Build Coastguard Worker 3*9880d681SAndroid Build Coastguard Worker .weakref bar,foo 4*9880d681SAndroid Build Coastguard Worker call bar@PLT 5*9880d681SAndroid Build Coastguard Worker 6*9880d681SAndroid Build Coastguard Worker// CHECK: Symbol { 7*9880d681SAndroid Build Coastguard Worker// CHECK: Name: foo 8*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Value: 9*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Size: 10*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Binding: Weak 11*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Type: 12*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Other: 13*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: Section: 14*9880d681SAndroid Build Coastguard Worker// CHECK-NEXT: } 15