⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 arm9debug.txt

📁 自己写的S3C2410的bootload
💻 TXT
📖 第 1 页 / 共 5 页
字号:

================================================================================

Image Symbol Table

    Mapping Symbols

    Sym    Value        Execution Region

    $a     0x30000000   ER_RO
    $d     0x30000020   ER_RO
    $f     0x30000020   ER_RO
    $f     0x30000024   ER_RO
    $f     0x30000028   ER_RO
    $f     0x3000002c   ER_RO
    $f     0x30000030   ER_RO
    $f     0x30000034   ER_RO
    $f     0x30000038   ER_RO
    $a     0x3000003c   ER_RO
    $d     0x300000e4   ER_RO
    $a     0x300000fc   ER_RO
    $d     0x30000154   ER_RO
    $a     0x3000015c   ER_RO
    $d     0x300001f4   ER_RO
    $a     0x30000204   ER_RO
    $d     0x30000254   ER_RO
    $a     0x30000258   ER_RO
    $p     0x300002b0   ER_RO
    $d     0x300002bc   ER_RO
    $a     0x30000304   ER_RO
    $d     0x30000698   ER_RO
    $a     0x300006f0   ER_RO
    $d     0x30000b38   ER_RO
    $a     0x30000b44   ER_RO
    $d     0x30001494   ER_RO
    $f     0x3000149c   ER_RO
    $f     0x300014a4   ER_RO
    $f     0x300014a8   ER_RO
    $f     0x300014ac   ER_RO
    $f     0x300014b0   ER_RO
    $f     0x300014b4   ER_RO
    $f     0x300014b8   ER_RO
    $a     0x300014fc   ER_RO
    $d     0x30001768   ER_RO
    $a     0x30001788   ER_RO
    $p     0x300017a8   ER_RO
    $d     0x300017c8   ER_RO
    $a     0x300017d4   ER_RO
    $d     0x300017ec   ER_RO
    $a     0x300017f8   ER_RO
    $d     0x30001844   ER_RO
    $f     0x30001844   ER_RO
    $a     0x30001848   ER_RO
    $d     0x30001a40   ER_RO
    $a     0x30001a44   ER_RO
    $d     0x30001a94   ER_RO
    $f     0x30001a94   ER_RO
    $f     0x30001a98   ER_RO
    $a     0x30001a9c   ER_RO
    $p     0x30001adc   ER_RO
    $p     0x30001d60   ER_RO
    $p     0x30001d7c   ER_RO
    $p     0x30001da8   ER_RO
    $p     0x30001ed0   ER_RO
    $p     0x30001f08   ER_RO
    $p     0x30001f44   ER_RO
    $p     0x3000223c   ER_RO
    $d     0x30002258   ER_RO
    $a     0x300022a4   ER_RO
    $p     0x300025cc   ER_RO
    $p     0x300025f8   ER_RO
    $p     0x3000264c   ER_RO
    $p     0x300026c4   ER_RO
    $p     0x300026f4   ER_RO
    $p     0x3000271c   ER_RO
    $p     0x30002750   ER_RO
    $p     0x30002780   ER_RO
    $p     0x300027b8   ER_RO
    $a     0x300027d4   ER_RO
    $d     0x3000284c   ER_RO
    $a     0x30002854   ER_RO
    $d     0x3000285c   ER_RO
    $a     0x30002860   ER_RO
    $d     0x30002cb4   ER_RO
    $a     0x30002cc4   ER_RO
    $d     0x3000300c   ER_RO
    $a     0x30003024   ER_RO
    $d     0x30003484   ER_RO
    $a     0x30003488   ER_RO
    $d     0x30003660   ER_RO
    $a     0x30003664   ER_RO
    $d     0x30003710   ER_RO
    $f     0x30003710   ER_RO
    $a     0x30003718   ER_RO
    $p     0x30003768   ER_RO
    $d     0x30003774   ER_RO
    $a     0x3000377c   ER_RO
    $d     0x30003948   ER_RO
    $a     0x30003958   ER_RO
    $d     0x3000398c   ER_RO
    $a     0x30003994   ER_RO
    $d     0x30003a1c   ER_RO
    $a     0x30003a20   ER_RO
    $d     0x30003a6c   ER_RO
    $a     0x30003a74   ER_RO
    $d     0x30003b58   ER_RO
    $a     0x30003bd4   ER_RO
    $d     0x30004584   ER_RO
    $a     0x30004608   ER_RO
    $d     0x300046bc   ER_RO
    $f     0x300046e8   ER_RO
    $a     0x30004724   ER_RO
    $d     0x3000476c   ER_RO
    $a     0x30004780   ER_RO
    $d     0x300047a0   ER_RO
    $a     0x300047a8   ER_RO
    $d     0x30004c34   ER_RO
    $a     0x30004c44   ER_RO
    $d     0x300051bc   ER_RO
    $a     0x3000524c   ER_RO
    $d     0x300052ec   ER_RO
    $a     0x300052f0   ER_RO
    $d     0x300055fc   ER_RO
    $a     0x30005608   ER_RO
    $d     0x30005978   ER_RO
    $a     0x3000599c   ER_RO
    $d     0x300059e8   ER_RO
    $a     0x300059ec   ER_RO
    $d     0x30005a80   ER_RO
    $a     0x30005a88   ER_RO
    $d     0x30005b2c   ER_RO
    $d     0x30f00000   ER_RW
    $d     0x30f00004   ER_ZI

    Local Symbols

    Symbol Name                              Value     Ov Type        Size  Object(Section)

    D:\Study\2410bootload\APP_CODE\cpu_s\vectors.s 0x00000000   Number         0  vectors.o ABSOLUTE
    <Anonymous Symbol>                       0x00000000   Data         124  vectors.o(.debug_info)
    <Anonymous Symbol>                       0x00000000   Data          16  vectors.o(.debug_abbrev)
    Vect                                     0x30000000   ARM Code     348  vectors.o(Vect)
    <Anonymous Symbol>                       0x00000000   Data         188  vectors.o(.debug_line)
    BIT_EINT0                                0x00000001   Number         0  vectors.o ABSOLUTE
    BIT_EINT1                                0x00000002   Number         0  vectors.o ABSOLUTE
    M_SDIV                                   0x00000002   Number         0  vectors.o ABSOLUTE
    BIT_EINT2                                0x00000004   Number         0  vectors.o ABSOLUTE
    M_PDIV                                   0x00000004   Number         0  vectors.o ABSOLUTE
    BIT_EINT3                                0x00000008   Number         0  vectors.o ABSOLUTE
    BIT_EINT4_7                              0x00000010   Number         0  vectors.o ABSOLUTE
    IRQMODE                                  0x00000012   Number         0  vectors.o ABSOLUTE
    SVCMODE                                  0x00000013   Number         0  vectors.o ABSOLUTE
    BIT_EINT8_23                             0x00000020   Number         0  vectors.o ABSOLUTE
    BIT_NOTUSED6                             0x00000040   Number         0  vectors.o ABSOLUTE
    M_MDIV                                   0x0000005c   Number         0  vectors.o ABSOLUTE
    BIT_BAT_FLT                              0x00000080   Number         0  vectors.o ABSOLUTE
    NOINT                                    0x000000c0   Number         0  vectors.o ABSOLUTE
    BIT_TICK                                 0x00000100   Number         0  vectors.o ABSOLUTE

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -