| # RUN: yaml2obj --docnum=1 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s |
| # RUN: yaml2obj --docnum=1 -DCONTENT=020000FA0C109FE5010080E01EFF2FE1024800EB803070473141592627182818 -DFLAG=,EF_ARM_BE8 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s |
| # RUN: yaml2obj --docnum=2 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s |
| |
| ## Test llvm-objdump disassembly of all three kinds of |
| ## AAELF32-compliant big-endian ELF file. |
| ## |
| ## In image files, by default AArch32 ELF stores the instructions |
| ## big-endian ('BE32' style), unless the EF_ARM_BE8 flag is set in the |
| ## ELF header, which indicates that instructions are stored |
| ## little-endian ('BE8' style). llvm-objdump should detect the flag and |
| ## handle both types, using the $a, $t and $d mapping symbols to |
| ## distinguish Arm instructions, Thumb instructions, and data. |
| ## |
| ## Relocatable object files always use the BE32 style. (The linker is |
| ## expected to byte-swap code sections, using the same the mapping |
| ## symbols to decide how, if it's going to generate an image with BE8 |
| ## instruction endianness and the BE8 flag set.) |
| ## |
| ## This test checks all three cases of this. It provides llvm-objdump |
| ## with the BE32 and BE8 versions of the same image file, with the code |
| ## section byte-swapped, and the EF_ARM_BE8 flag absent and present |
| ## respectively to indicate that. We also provide a matching object |
| ## file. We expect the identical disassembly from both, apart from the |
| ## detail that addresses in the ELF images start at 0x8000 and section |
| ## offsets in the object start at 0. |
| |
| # CHECK: 0: fa000002 blx |
| # CHECK-NEXT: 4: e59f100c ldr r1, [pc, #12] |
| # CHECK-NEXT: 8: e0800001 add r0, r0, r1 |
| # CHECK-NEXT: c: e12fff1e bx lr |
| # CHECK: 10: 4802 ldr r0, [pc, #8] |
| # CHECK-NEXT: 12: eb00 3080 add.w r0, r0, r0, lsl #14 |
| # CHECK-NEXT: 16: 4770 bx lr |
| # CHECK: 18: 31 41 59 26 .word 0x31415926 |
| # CHECK-NEXT: 1c: 27 18 28 18 .word 0x27182818 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS32 |
| Data: ELFDATA2MSB |
| Type: ET_EXEC |
| Machine: EM_ARM |
| Flags: [ EF_ARM_EABI_UNKNOWN[[FLAG=]] ] |
| Entry: 0x8000 |
| ProgramHeaders: |
| - Type: PT_LOAD |
| Flags: [ PF_X, PF_R ] |
| FirstSec: .text |
| LastSec: .text |
| VAddr: 0x8000 |
| Align: 0x4 |
| Sections: |
| - Name: .text |
| Type: SHT_PROGBITS |
| Flags: [ SHF_ALLOC, SHF_EXECINSTR ] |
| Address: 0x8000 |
| AddressAlign: 0x4 |
| Content: [[CONTENT]] |
| Symbols: |
| - Name: '$a' |
| Section: .text |
| Value: 0x8000 |
| - Name: '$t' |
| Section: .text |
| Value: 0x8010 |
| - Name: '$d' |
| Section: .text |
| Value: 0x8018 |
| |
| --- !ELF |
| FileHeader: |
| Class: ELFCLASS32 |
| Data: ELFDATA2MSB |
| Type: ET_REL |
| Machine: EM_ARM |
| Sections: |
| - Name: .text |
| Type: SHT_PROGBITS |
| Flags: [ SHF_ALLOC, SHF_EXECINSTR ] |
| AddressAlign: 0x4 |
| Content: [[CONTENT]] |
| Symbols: |
| - Name: '$a' |
| Section: .text |
| - Name: '$t' |
| Section: .text |
| Value: 0x10 |
| - Name: '$d' |
| Section: .text |
| Value: 0x18 |