Bug 14020 - ARM: objdump wrongly disassembles illegal pc-relative T3 or T4 encodings of STR as valid
Summary: ARM: objdump wrongly disassembles illegal pc-relative T3 or T4 encodings of S...
Status: NEW
Alias: None
Product: binutils
Classification: Unclassified
Component: binutils (show other bugs)
Version: 2.22
: P2 minor
Target Milestone: ---
Assignee: Not yet assigned to anyone
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2012-04-25 11:03 UTC by Albert ARIBAUD
Modified: 2012-04-25 11:10 UTC (History)
1 user (show)

See Also:
Host:
Target:
Build:
Last reconfirmed:


Attachments
Assembly language test case (76 bytes, application/octet-stream)
2012-04-25 11:05 UTC, Albert ARIBAUD
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Albert ARIBAUD 2012-04-25 11:03:31 UTC
Objdump displays ARM instructions of the form 0xf84fnnnn or 0xf8cfnnnn as "str.w rN,[PC, -nnn]" whereas these forms are illegal encodings of STR, T4 and T3 respectively. These instructions should be decoded as e.g. ".inst ..." to let readers know the instructions are undefined.
Comment 1 Albert ARIBAUD 2012-04-25 11:05:09 UTC
Created attachment 6367 [details]
Assembly language test case

Assemble this file then objdump it to see wrong objdump decoding