xref: /llvm-project/bolt/test/X86/Inputs/srol-bug-input.yaml (revision 4c106cfdf7cf7eec861ad3983a3dd9a9e8f3a8ae)
1--- !ELF
2FileHeader:
3  Class:           ELFCLASS64
4  Data:            ELFDATA2LSB
5  Type:            ET_EXEC
6  Machine:         EM_X86_64
7  Entry:           0x0000000000400000
8Sections:
9  - Name:            .text
10    Type:            SHT_PROGBITS
11    Flags:           [ SHF_ALLOC, SHF_EXECINSTR ]
12    Address:         0x0000000000400000
13    AddressAlign:    0x0000000000000010
14    Content:         0315fa0000002B15f40000002315ee0000000B15e80000003315e2000000500fB715da0000008A15d4000000668B15cd0000008B15c7000000488B15c00000003A15ba000000663B15b30000003B15ad000000483B15a60000008415a0000000668515990000008515930000004885158c000000C3
15  - Name:            .rodata
16    Type:            SHT_PROGBITS
17    Flags:           [ SHF_ALLOC ]
18    Address:         0x0000000000400100
19    AddressAlign:    0x0000000000000100
20    Content:         010002000000000000000000
21  - Name:            .dynamic
22    Type:            SHT_DYNAMIC
23    Flags:           [ SHF_WRITE, SHF_ALLOC ]
24    Address:         0x000000000061ADA8
25    Link:            .dynstr
26    AddressAlign:    0x0000000000000008
27    Content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
28Symbols:
29    - Name:            mydata
30      Section:         .rodata
31      Value:           0x0000000000400100
32      Binding:         STB_GLOBAL
33    - Name:            myfunc
34      Type:            STT_FUNC
35      Section:         .text
36      Value:           0x0000000000400000
37      Binding:         STB_GLOBAL
38DynamicSymbols:
39    - Name:            mydata
40      Section:         .rodata
41      Value:           0x0000000000400100
42      Binding:         STB_GLOBAL
43ProgramHeaders:
44  - Type: PT_PHDR
45    Flags: [ PF_X, PF_R ]
46    VAddr: 0x00400000
47    PAddr: 0x00400000
48    FirstSec: .text
49    LastSec: .text
50  - Type: PT_LOAD
51    Flags: [ PF_X, PF_R ]
52    VAddr: 0x00400000
53    PAddr: 0x00400000
54    FirstSec: .text
55    LastSec: .text
56  - Type: PT_DYNAMIC
57    Flags: [ PF_X, PF_R ]
58    VAddr: 0x0061ADA8
59    PAddr: 0x0064ADA8
60    FirstSec: .dynamic
61    LastSec: .dynamic
62...
63