xref: /llvm-project/llvm/test/tools/llvm-objdump/X86/elf-disassemble-symbololize-operands.yaml (revision e510860656bb81bd90ae3cf8bb5ef4dc8cd33c18)
1# RUN: yaml2obj %s -o %t
2# RUN: llvm-objdump %t -d --symbolize-operands -M intel --no-show-raw-insn --no-leading-addr | \
3# RUN:   FileCheck %s --match-full-lines --check-prefix=INTEL
4# RUN: llvm-objdump %t -d --symbolize-operands -M att --no-show-raw-insn --no-leading-addr | \
5# RUN:   FileCheck %s --match-full-lines --check-prefix=ATT
6
7## Expect to find the branch labels and global variable name.
8# ATT:      <_start>:
9# ATT-NEXT:   pushq %rax
10# ATT-NEXT: <L1>:
11# ATT-NEXT:   cmpl  , %eax <symbol>
12# ATT-NEXT:   jge    <L0>
13# ATT-NEXT:   jmp    <L1>
14# ATT-NEXT: <L0>:
15# ATT-NEXT:   retq
16
17# INTEL:      <_start>:
18# INTEL-NEXT:   push rax
19# INTEL-NEXT: <L1>:
20# INTEL-NEXT:   cmp  eax, dword ptr <symbol>
21# INTEL-NEXT:   jge   <L0>
22# INTEL-NEXT:   jmp   <L1>
23# INTEL-NEXT: <L0>:
24# INTEL-NEXT:   ret
25
26--- !ELF
27FileHeader:
28  Class:   ELFCLASS64
29  Data:    ELFDATA2LSB
30  Type:    ET_EXEC
31  Machine: EM_X86_64
32Sections:
33  - Name:    .text
34    Type:    SHT_PROGBITS
35    Address: 0x4000
36    Flags:   [SHF_ALLOC, SHF_EXECINSTR]
37    Content: '503b05051000007d02ebf6c3'
38  - Name:    .data
39    Type:    SHT_PROGBITS
40    Flags:   [SHF_ALLOC, SHF_WRITE]
41    Address: 0x5000
42Symbols:
43  - Name:    _start
44    Section: .text
45    Value:   0x4000
46  - Name:    symbol
47    Section: .data
48    Value:   0x500c
49