92 lines
3.6 KiB
Text
92 lines
3.6 KiB
Text
|
# RUN: yaml2obj --docnum=1 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
|
||
|
# RUN: yaml2obj --docnum=1 -DCONTENT=020000FA0C109FE5010080E01EFF2FE1024800EB803070473141592627182818 -DFLAG=,EF_ARM_BE8 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
|
||
|
# RUN: yaml2obj --docnum=2 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
|
||
|
|
||
|
## Test llvm-objdump disassembly of all three kinds of
|
||
|
## AAELF32-compliant big-endian ELF file.
|
||
|
##
|
||
|
## In image files, by default AArch32 ELF stores the instructions
|
||
|
## big-endian ('BE32' style), unless the EF_ARM_BE8 flag is set in the
|
||
|
## ELF header, which indicates that instructions are stored
|
||
|
## little-endian ('BE8' style). llvm-objdump should detect the flag and
|
||
|
## handle both types, using the $a, $t and $d mapping symbols to
|
||
|
## distinguish Arm instructions, Thumb instructions, and data.
|
||
|
##
|
||
|
## Relocatable object files always use the BE32 style. (The linker is
|
||
|
## expected to byte-swap code sections, using the same the mapping
|
||
|
## symbols to decide how, if it's going to generate an image with BE8
|
||
|
## instruction endianness and the BE8 flag set.)
|
||
|
##
|
||
|
## This test checks all three cases of this. It provides llvm-objdump
|
||
|
## with the BE32 and BE8 versions of the same image file, with the code
|
||
|
## section byte-swapped, and the EF_ARM_BE8 flag absent and present
|
||
|
## respectively to indicate that. We also provide a matching object
|
||
|
## file. We expect the identical disassembly from both, apart from the
|
||
|
## detail that addresses in the ELF images start at 0x8000 and section
|
||
|
## offsets in the object start at 0.
|
||
|
|
||
|
# CHECK: 0: fa000002 blx
|
||
|
# CHECK-NEXT: 4: e59f100c ldr r1, [pc, #12]
|
||
|
# CHECK-NEXT: 8: e0800001 add r0, r0, r1
|
||
|
# CHECK-NEXT: c: e12fff1e bx lr
|
||
|
# CHECK: 10: 4802 ldr r0, [pc, #8]
|
||
|
# CHECK-NEXT: 12: eb00 3080 add.w r0, r0, r0, lsl #14
|
||
|
# CHECK-NEXT: 16: 4770 bx lr
|
||
|
# CHECK: 18: 31 41 59 26 .word 0x31415926
|
||
|
# CHECK-NEXT: 1c: 27 18 28 18 .word 0x27182818
|
||
|
|
||
|
--- !ELF
|
||
|
FileHeader:
|
||
|
Class: ELFCLASS32
|
||
|
Data: ELFDATA2MSB
|
||
|
Type: ET_EXEC
|
||
|
Machine: EM_ARM
|
||
|
Flags: [ EF_ARM_EABI_UNKNOWN[[FLAG=]] ]
|
||
|
Entry: 0x8000
|
||
|
ProgramHeaders:
|
||
|
- Type: PT_LOAD
|
||
|
Flags: [ PF_X, PF_R ]
|
||
|
FirstSec: .text
|
||
|
LastSec: .text
|
||
|
VAddr: 0x8000
|
||
|
Align: 0x4
|
||
|
Sections:
|
||
|
- Name: .text
|
||
|
Type: SHT_PROGBITS
|
||
|
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
|
||
|
Address: 0x8000
|
||
|
AddressAlign: 0x4
|
||
|
Content: [[CONTENT]]
|
||
|
Symbols:
|
||
|
- Name: '$a'
|
||
|
Section: .text
|
||
|
Value: 0x8000
|
||
|
- Name: '$t'
|
||
|
Section: .text
|
||
|
Value: 0x8010
|
||
|
- Name: '$d'
|
||
|
Section: .text
|
||
|
Value: 0x8018
|
||
|
|
||
|
--- !ELF
|
||
|
FileHeader:
|
||
|
Class: ELFCLASS32
|
||
|
Data: ELFDATA2MSB
|
||
|
Type: ET_REL
|
||
|
Machine: EM_ARM
|
||
|
Sections:
|
||
|
- Name: .text
|
||
|
Type: SHT_PROGBITS
|
||
|
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
|
||
|
AddressAlign: 0x4
|
||
|
Content: [[CONTENT]]
|
||
|
Symbols:
|
||
|
- Name: '$a'
|
||
|
Section: .text
|
||
|
- Name: '$t'
|
||
|
Section: .text
|
||
|
Value: 0x10
|
||
|
- Name: '$d'
|
||
|
Section: .text
|
||
|
Value: 0x18
|