Run DCE after a LoopFlatten test to reduce spurious output [nfc]
[llvm-project.git] / llvm / test / tools / llvm-xray / AArch64 / Inputs / elf64-pic.yaml
blob9b9b2960aea88581d271efbe5e876a839e475df6
1 # Generated from the following source:
2 # __attribute__((xray_always_instrument)) void foo() {}
3 # __attribute__((xray_always_instrument)) void bar() {}
4 # __attribute__((xray_always_instrument)) void jar() {}
6 # Built with the following arguments:
7 # -target aarch64-none-linux-android -fxray-instrument
9 --- !ELF
10 FileHeader:
11   Class:           ELFCLASS64
12   Data:            ELFDATA2LSB
13   Type:            ET_DYN
14   Machine:         EM_AARCH64
15   Entry:           0x0000000000000420
16 Sections:
17   - Name:            .hash
18     Type:            SHT_HASH
19     Flags:           [ SHF_ALLOC ]
20     Address:         0x0000000000000228
21     Link:            .dynsym
22     AddressAlign:    0x0000000000000004
23     EntSize:         0x0000000000000004
24     Bucket:          [ 0, 0, 3, 0 ]
25     Chain:           [ 0, 0, 1, 2 ]
26   - Name:            .rela.dyn
27     Type:            SHT_RELA
28     Flags:           [ SHF_ALLOC ]
29     Address:         0x0000000000000270
30     Link:            .dynsym
31     AddressAlign:    0x0000000000000008
32     EntSize:         0x0000000000000018
33     Relocations:
34       - Offset:          0x00000000000025B0
35         Type:            R_AARCH64_RELATIVE
36         Addend:          1056
37       - Offset:          0x00000000000025D0
38         Type:            R_AARCH64_RELATIVE
39         Addend:          1088
40       - Offset:          0x00000000000025F0
41         Type:            R_AARCH64_RELATIVE
42         Addend:          1124
43       - Offset:          0x0000000000002610
44         Type:            R_AARCH64_RELATIVE
45         Addend:          1156
46       - Offset:          0x0000000000002630
47         Type:            R_AARCH64_RELATIVE
48         Addend:          1192
49       - Offset:          0x0000000000002650
50         Type:            R_AARCH64_RELATIVE
51         Addend:          1224
52       - Offset:          0x0000000000002670
53         Type:            R_AARCH64_RELATIVE
54         Addend:          9648
55       - Offset:          0x0000000000002678
56         Type:            R_AARCH64_RELATIVE
57         Addend:          9712
58       - Offset:          0x0000000000002680
59         Type:            R_AARCH64_RELATIVE
60         Addend:          9712
61       - Offset:          0x0000000000002688
62         Type:            R_AARCH64_RELATIVE
63         Addend:          9776
64       - Offset:          0x0000000000002690
65         Type:            R_AARCH64_RELATIVE
66         Addend:          9776
67       - Offset:          0x0000000000002698
68         Type:            R_AARCH64_RELATIVE
69         Addend:          9840
70       - Offset:          0x00000000000025F8
71         Symbol:          _Z3barv
72         Type:            R_AARCH64_ABS64
73       - Offset:          0x0000000000002618
74         Symbol:          _Z3barv
75         Type:            R_AARCH64_ABS64
76       - Offset:          0x00000000000025B8
77         Symbol:          _Z3foov
78         Type:            R_AARCH64_ABS64
79       - Offset:          0x00000000000025D8
80         Symbol:          _Z3foov
81         Type:            R_AARCH64_ABS64
82       - Offset:          0x0000000000002638
83         Symbol:          _Z3jarv
84         Type:            R_AARCH64_ABS64
85       - Offset:          0x0000000000002658
86         Symbol:          _Z3jarv
87         Type:            R_AARCH64_ABS64
88   - Name:            .text
89     Type:            SHT_PROGBITS
90     Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
91     Address:         0x0000000000000420
92     AddressAlign:    0x0000000000000004
93     Content:         080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5C0035FD6080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5C0035FD6080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5080000141F2003D51F2003D51F2003D51F2003D51F2003D51F2003D51F2003D5C0035FD6
94   - Name:            .dynamic
95     Type:            SHT_DYNAMIC
96     Flags:           [ SHF_WRITE, SHF_ALLOC ]
97     Address:         0x00000000000014F0
98     Link:            .dynstr
99     AddressAlign:    0x0000000000000008
100     EntSize:         0x0000000000000010
101     Entries:
102       - Tag:             DT_FLAGS
103         Value:           0x0000000000000008
104       - Tag:             DT_FLAGS_1
105         Value:           0x0000000000000001
106       - Tag:             DT_RELA
107         Value:           0x0000000000000270
108       - Tag:             DT_RELASZ
109         Value:           0x00000000000001B0
110       - Tag:             DT_RELAENT
111         Value:           0x0000000000000018
112       - Tag:             DT_RELACOUNT
113         Value:           0x000000000000000C
114       - Tag:             DT_SYMTAB
115         Value:           0x00000000000001C8
116       - Tag:             DT_SYMENT
117         Value:           0x0000000000000018
118       - Tag:             DT_STRTAB
119         Value:           0x0000000000000250
120       - Tag:             DT_STRSZ
121         Value:           0x0000000000000019
122       - Tag:             DT_HASH
123         Value:           0x0000000000000228
124       - Tag:             DT_NULL
125         Value:           0x0000000000000000
126   - Name:            xray_instr_map
127     Type:            SHT_PROGBITS
128     Flags:           [ SHF_WRITE, SHF_ALLOC, SHF_LINK_ORDER ]
129     Address:         0x00000000000025B0
130     Link:            .text
131     AddressAlign:    0x0000000000000001
132     Content:         '000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000010100000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000101000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000001010000000000000000000000000000'
133   - Name:            xray_fn_idx
134     Type:            SHT_PROGBITS
135     Flags:           [ SHF_WRITE, SHF_ALLOC, SHF_LINK_ORDER ]
136     Address:         0x0000000000002670
137     Link:            .text
138     AddressAlign:    0x0000000000000010
139     Content:         '000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000'
140 DynamicSymbols:
141   - Name:            _Z3barv
142     Type:            STT_FUNC
143     Section:         .text
144     Binding:         STB_GLOBAL
145     Value:           0x0000000000000464
146     Size:            0x0000000000000044
147   - Name:            _Z3foov
148     Type:            STT_FUNC
149     Section:         .text
150     Binding:         STB_GLOBAL
151     Value:           0x0000000000000420
152     Size:            0x0000000000000044
153   - Name:            _Z3jarv
154     Type:            STT_FUNC
155     Section:         .text
156     Binding:         STB_GLOBAL
157     Value:           0x00000000000004A8
158     Size:            0x0000000000000044