[AMDGPU] llvm-objdump: Skip amd_kernel_code_t only at the begining of kernel symbol.

Summary: This change fix bug in AMDGPU disassembly. Previously, presence of symbols other than kernel symbols caused objdump to skip begining of those symbols.

Reviewers: tstellarAMD, vpykhtin, Bigcheese, ruiu

Subscribers: kzhuravl, arsenm

Differential Revision: http://reviews.llvm.org/D21966

llvm-svn: 278921
diff --git a/llvm/test/Object/AMDGPU/objdump.s b/llvm/test/Object/AMDGPU/objdump.s
index ca02a7a..83f0df2 100644
--- a/llvm/test/Object/AMDGPU/objdump.s
+++ b/llvm/test/Object/AMDGPU/objdump.s
@@ -11,11 +11,14 @@
 	s_load_dwordx2 s[0:1], s[4:5], 0x8
 	s_waitcnt lgkmcnt(0)
 	s_add_u32 s0, s7, s0
+BB0:
 	v_add_i32_e32 v1, vcc, s0, v1
+BB1:
 	s_movk_i32 s0, 0x483
 	v_cmp_ge_i32_e32 vcc, s0, v0
 	s_and_saveexec_b64 s[0:1], vcc
 	v_lshlrev_b32_e32 v4, 2, v0
+BB3:
 	s_cbranch_execz 21
 	s_mov_b64 s[2:3], exec
 	s_mov_b64 s[10:11], exec
@@ -30,6 +33,7 @@
 	s_and_saveexec_b64 s[0:1], vcc
 	s_cbranch_execz 85
 	s_load_dwordx4 s[8:11], s[4:5], 0x40
+BB5:
 	v_ashrrev_i32_e32 v77, 31, v76
 	v_lshlrev_b64 v[10:11], 2, v[76:77]
 	s_waitcnt lgkmcnt(0)
@@ -48,11 +52,14 @@
 // CHECK:  s_load_dwordx2 s[0:1], s[4:5], 0x8                         // 000000000108: C0060002 00000008
 // CHECK:  s_waitcnt lgkmcnt(0)                                       // 000000000110: BF8C007F
 // CHECK:  s_add_u32 s0, s7, s0                                       // 000000000114: 80000007
+// CHECK:  BB0:
 // CHECK:  v_add_i32_e32 v1, vcc, s0, v1                              // 000000000118: 32020200
+// CHECK:  BB1:
 // CHECK:  s_movk_i32 s0, 0x483                                       // 00000000011C: B0000483
 // CHECK:  v_cmp_ge_i32_e32 vcc, s0, v0                               // 000000000120: 7D8C0000
 // CHECK:  s_and_saveexec_b64 s[0:1], vcc                             // 000000000124: BE80206A
 // CHECK:  v_lshlrev_b32_e32 v4, 2, v0                                // 000000000128: 24080082
+// CHECK:  BB3:
 // CHECK:  s_cbranch_execz 21                                         // 00000000012C: BF880015
 // CHECK:  s_mov_b64 s[2:3], exec                                     // 000000000130: BE82017E
 // CHECK:  s_mov_b64 s[10:11], exec                                   // 000000000134: BE8A017E
@@ -63,6 +70,7 @@
 // CHECK:  s_and_saveexec_b64 s[0:1], vcc                             // 000000000240: BE80206A
 // CHECK:  s_cbranch_execz 85                                         // 000000000244: BF880055
 // CHECK:  s_load_dwordx4 s[8:11], s[4:5], 0x40                       // 000000000248: C00A0202 00000040
+// CHECK:  BB5:
 // CHECK:  v_ashrrev_i32_e32 v77, 31, v76                             // 000000000250: 229A989F
 // CHECK:  v_lshlrev_b64 v[10:11], 2, v[76:77]                        // 000000000254: D28F000A 00029882
 // CHECK:  s_waitcnt lgkmcnt(0)                                       // 00000000025C: BF8C007F