Run DCE after a LoopFlatten test to reduce spurious output [nfc]
[llvm-project.git] / bolt / test / X86 / Inputs / issue26.yaml
blob7a5c082f29270c99382f2074a69bcadba311941d
1 --- !ELF
2 FileHeader:
3   Class:           ELFCLASS64
4   Data:            ELFDATA2LSB
5   Type:            ET_EXEC
6   Machine:         EM_X86_64
7   Entry:           0x00000000004004FA
8 Sections:
9   - Name:            .text
10     Type:            SHT_PROGBITS
11     Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
12     Address:         0x00000000004003E0
13     AddressAlign:    0x0000000000000010
14     Content:         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
15   - Name:            .rela.text
16     Type:            SHT_RELA
17     Flags:           [ SHF_INFO_LINK ]
18     Link:            .symtab
19     AddressAlign:    0x0000000000000008
20     Info:            .text
21     Relocations:
22   - Name:            .rodata
23     Type:            SHT_PROGBITS
24     Flags:           [ SHF_ALLOC ]
25     Address:         0x0000000000400580
26     AddressAlign:    0x0000000000000008
27     Content:         '01000200000000000000000000000000'
28   - Name:            .dynamic
29     Type:            SHT_DYNAMIC
30     Flags:           [ SHF_WRITE, SHF_ALLOC ]
31     Address:         0x0000000000600E28
32     Link:            .dynstr
33     AddressAlign:    0x0000000000000008
34     Content:         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
35 Symbols:
36     - Name:            FUNC
37       Type:            STT_FUNC
38       Section:         .text
39       Value:           0x00000000004004F0
40       Size:            0x000000000000000A
41       Binding:         STB_GLOBAL
42     - Name:            main
43       Type:            STT_FUNC
44       Section:         .text
45       Value:           0x00000000004004FA
46       Size:            0x0000000000000004
47       Binding:         STB_GLOBAL
48     - Name:            XYZ
49       Type:            STT_FUNC
50       Section:         .text
51       Value:           0x00000000004004CD
52       Size:            0x0000000000000023
53       Binding:         STB_GLOBAL
54 DynamicSymbols:
55     - Name:            mydata
56       Section:         .rodata
57       Value:           0x0000000000400100
58       Binding:         STB_GLOBAL
59 ProgramHeaders:
60   - Type: PT_PHDR
61     Flags: [ PF_X, PF_R ]
62     VAddr: 0x004003E0
63     PAddr: 0x004003E0
64     FirstSec: .text
65     LastSec: .text
66   - Type: PT_LOAD
67     Flags: [ PF_X, PF_R ]
68     VAddr: 0x004003E0
69     PAddr: 0x004003E0
70     FirstSec: .text
71     LastSec: .text
72   - Type: PT_DYNAMIC
73     Flags: [ PF_X, PF_R ]
74     VAddr: 0x00600E28
75     PAddr: 0x00600E28
76     FirstSec: .dynamic
77     LastSec: .dynamic
78 ...