# RUN: yaml2obj --docnum=1 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
# RUN: yaml2obj --docnum=1 -DCONTENT=020000FA0C109FE5010080E01EFF2FE1024800EB803070473141592627182818 -DFLAG=,EF_ARM_BE8 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
# RUN: yaml2obj --docnum=2 -DCONTENT=FA000002E59F100CE0800001E12FFF1E4802EB00308047703141592627182818 %s | llvm-objdump --no-print-imm-hex -d --triple=armv7r - | FileCheck %s
## Test llvm-objdump disassembly of all three kinds of
## AAELF32-compliant big-endian ELF file.
##
## In image files, by default AArch32 ELF stores the instructions
## big-endian ('BE32' style), unless the EF_ARM_BE8 flag is set in the
## ELF header, which indicates that instructions are stored
## little-endian ('BE8' style). llvm-objdump should detect the flag and
## handle both types, using the $a, $t and $d mapping symbols to
## distinguish Arm instructions, Thumb instructions, and data.
##
## Relocatable object files always use the BE32 style. (The linker is
## expected to byte-swap code sections, using the same the mapping
## symbols to decide how, if it's going to generate an image with BE8
## instruction endianness and the BE8 flag set.)
##
## This test checks all three cases of this. It provides llvm-objdump
## with the BE32 and BE8 versions of the same image file, with the code
## section byte-swapped, and the EF_ARM_BE8 flag absent and present
## respectively to indicate that. We also provide a matching object
## file. We expect the identical disassembly from both, apart from the
## detail that addresses in the ELF images start at 0x8000 and section
## offsets in the object start at 0.
# CHECK: 0: fa000002 blx
# CHECK-NEXT: 4: e59f100c ldr r1, [pc, #12]
# CHECK-NEXT: 8: e0800001 add r0, r0, r1
# CHECK-NEXT: c: e12fff1e bx lr
# CHECK: 10: 4802 ldr r0, [pc, #8]
# CHECK-NEXT: 12: eb00 3080 add.w r0, r0, r0, lsl #14
# CHECK-NEXT: 16: 4770 bx lr
# CHECK: 18: 31 41 59 26 .word 0x31415926
# CHECK-NEXT: 1c: 27 18 28 18 .word 0x27182818
--- !ELF
FileHeader:
Class: ELFCLASS32
Data: ELFDATA2MSB
Type: ET_EXEC
Machine: EM_ARM
Flags: [ EF_ARM_EABI_UNKNOWN[[FLAG=]] ]
Entry: 0x8000
ProgramHeaders:
- Type: PT_LOAD
Flags: [ PF_X, PF_R ]
FirstSec: .text
LastSec: .text
VAddr: 0x8000
Align: 0x4
Sections:
- Name: .text
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
Address: 0x8000
AddressAlign: 0x4
Content: [[CONTENT]]
Symbols:
- Name: '$a'
Section: .text
Value: 0x8000
- Name: '$t'
Section: .text
Value: 0x8010
- Name: '$d'
Section: .text
Value: 0x8018
--- !ELF
FileHeader:
Class: ELFCLASS32
Data: ELFDATA2MSB
Type: ET_REL
Machine: EM_ARM
Sections:
- Name: .text
Type: SHT_PROGBITS
Flags: [ SHF_ALLOC, SHF_EXECINSTR ]
AddressAlign: 0x4
Content: [[CONTENT]]
Symbols:
- Name: '$a'
Section: .text
- Name: '$t'
Section: .text
Value: 0x10
- Name: '$d'
Section: .text
Value: 0x18