📄 os_sem.lst
字号:
72 00 74 00
3A 00 32 00
35 00 2C 00
33 00 36 00
38 00 2C 00
33 00 32 00
3B 00 4F 00
53 00 54 00
43 00 42 00
53 00 74 00
6B 00 42 00
61 00 73 00
65 00 3A 00
34 00 30 00
2C 00 34 00
30 00 30 00
2C 00 31 00
36 00 3B 00
5C 00 5C 00
22 00 2C 00
31 00 32 00
38 00 2C 00
30 00 2C 00
30 00 2C 00
30 00 0D 00
0A 00
00000A24 2E 00 73 00 .DW '.stabs "OSTCBStkUsed:25,416,32;OSTCBTaskName:43=ar1;0;31;21,448,512;;",128,0,0,0',0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
4F 00 53 00
54 00 43 00
42 00 53 00
74 00 6B 00
55 00 73 00
65 00 64 00
3A 00 32 00
35 00 2C 00
34 00 31 00
36 00 2C 00
33 00 32 00
3B 00 4F 00
53 00 54 00
43 00 42 00
54 00 61 00
73 00 6B 00
4E 00 61 00
6D 00 65 00
3A 00 34 00
33 00 3D 00
61 00 72 00
31 00 3B 00
30 00 3B 00
33 00 31 00
3B 00 32 00
31 00 2C 00
34 00 34 00
38 00 2C 00
35 00 31 00
32 00 3B 00
3B 00 22 00
2C 00 31 00
32 00 38 00
2C 00 30 00
2C 00 30 00
2C 00 30 00
0D 00 0A 00
0000982B .CODE
00000A76 .debug
00000A76 2E 00 73 00 .dw '.stabs "OS_TCB:t44=39",128,0,0,0',0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
4F 00 53 00
5F 00 54 00
43 00 42 00
3A 00 74 00
34 00 34 00
3D 00 33 00
39 00 22 00
2C 00 31 00
32 00 38 00
2C 00 30 00
2C 00 30 00
2C 00 30 00
0D 00 0A 00
0000982B .CODE
0000982B .code
00000A98 .debug
00000A98 2E 00 73 00 .dw '.stabs "OSSemAccept:F23",36,0,0,',0,0,offset _OSSemAccept,seg _OSSemAccept,0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
4F 00 53 00
53 00 65 00
6D 00 41 00
63 00 63 00
65 00 70 00
74 00 3A 00
46 00 32 00
33 00 22 00
2C 00 33 00
36 00 2C 00
30 00 2C 00
30 00 2C 00
00 00 00 00
00 00 00 00
0D 00 0A 00
0000982B .CODE
.public _OSSemAccept
_OSSemAccept: .proc
00000ABE .debug
00000ABE 2E 00 73 00 .dw '.stabn 0x44,0,41,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
34 00 31 00
2C 00 00 00
00 00
00000AD1 00 00 00 00 .dd LM1-_OSSemAccept
00000AD3 0D 00 0A 00 .dw 0x0d,0x0a
0000982B .code
LM1:
// total=2, vars=2
// frame_pointer_needed: 1
0000982B 88 DA push bp to [sp]
0000982C 42 20 sp-=2
0000982D 08 0B 01 00 bp=sp+1
0000982F 0D 03 05 00 R1=BP+5
00009831 01 D2 [bp+1]=R1 // QImode move
00000AD5 .debug
00000AD5 2E 00 73 00 .dw '.stabn 0x44,0,42,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
34 00 32 00
2C 00 00 00
00 00
00000AE8 07 00 00 00 .dd LM2-_OSSemAccept
00000AEA 0D 00 0A 00 .dw 0x0d,0x0a
00009832 .code
LM2:
LBB2:
00000AEC .debug
00000AEC 2E 00 73 00 .dw '.stabn 0x44,0,50,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 30 00
2C 00 00 00
00 00
00000AFF 07 00 00 00 .dd LM3-_OSSemAccept
00000B01 0D 00 0A 00 .dw 0x0d,0x0a
00009832 .code
LM3:
00009832 01 94 R2=[bp+1] // QImode move
00009833 C2 92 R1=[R2] // QImode move
00009834 40 42 CMP R1,0 // QImode test
00009835 05 4E 01 EE NSJNZ L3 //QImode NE
00 EE
00000B03 .debug
00000B03 2E 00 73 00 .dw '.stabn 0x44,0,51,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 31 00
2C 00 00 00
00 00
00000B16 0D 00 00 00 .dd LM4-_OSSemAccept
00000B18 0D 00 0A 00 .dw 0x0d,0x0a
00009838 .code
LM4:
00009838 40 92 R1=0 // QImode move
00009839 0F 9F 6C 98 pc=L2 // Indirect jump
L3:
00000B1A .debug
00000B1A 2E 00 73 00 .dw '.stabn 0x44,0,54,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 34 00
2C 00 00 00
00 00
00000B2D 10 00 00 00 .dd LM5-_OSSemAccept
00000B2F 0D 00 0A 00 .dw 0x0d,0x0a
0000983B .code
LM5:
0000983B 01 96 R3=[bp+1] // QImode move
0000983C C3 92 R1=[R3] // QImode move
0000983D 01 99 R4=R1 // QImode move
0000983E C4 94 R2=[R4] // QImode move
0000983F 43 44 CMP R2,3 // QImode compare
00009840 05 5E 01 EE NSJZ L4 //QImode EQ
00 EE
00000B31 .debug
00000B31 2E 00 73 00 .dw '.stabn 0x44,0,55,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 35 00
2C 00 00 00
00 00
00000B44 18 00 00 00 .dd LM6-_OSSemAccept
00000B46 0D 00 0A 00 .dw 0x0d,0x0a
00009843 .code
LM6:
00009843 40 92 R1=0 // QImode move
00009844 0F 9F 6C 98 pc=L2 // Indirect jump
L4:
00000B48 .debug
00000B48 2E 00 73 00 .dw '.stabn 0x44,0,57,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 37 00
2C 00 00 00
00 00
00000B5B 1B 00 00 00 .dd LM7-_OSSemAccept
00000B5D 0D 00 0A 00 .dw 0x0d,0x0a
00009846 .code
LM7:
00009846 40 F0 99 9F call _Critical_in // call with return value
00000B5F .debug
00000B5F 2E 00 73 00 .dw '.stabn 0x44,0,58,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 38 00
2C 00 00 00
00 00
00000B72 1D 00 00 00 .dd LM8-_OSSemAccept
00000B74 0D 00 0A 00 .dw 0x0d,0x0a
00009848 .code
LM8:
00009848 01 92 R1=[bp+1] // QImode move
00009849 C1 94 R2=[R1] // QImode move
0000984A 02 93 R1=R2 // QImode move
0000984B 42 04 R2=R2+2
0000984C 02 97 R3=R2 // QImode move
0000984D C3 92 R1=[R3] // QImode move
0000984E C5 D2 [BP]=R1 // QImode move
00000B76 .debug
00000B76 2E 00 73 00 .dw '.stabn 0x44,0,59,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
35 00 39 00
2C 00 00 00
00 00
00000B89 24 00 00 00 .dd LM9-_OSSemAccept
00000B8B 0D 00 0A 00 .dw 0x0d,0x0a
0000984F .code
LM9:
0000984F C5 92 R1=[BP] // QImode move
00009850 40 42 CMP R1,0 // QImode test
00009851 14 5E 01 EE NSJZ L5 //QImode EQ
00 EE
00000B8D .debug
00000B8D 2E 00 73 00 .dw '.stabn 0x44,0,60,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
36 00 30 00
2C 00 00 00
00 00
00000BA0 29 00 00 00 .dd LM10-_OSSemAccept
00000BA2 0D 00 0A 00 .dw 0x0d,0x0a
00009854 .code
LM10:
00009854 01 98 R4=[bp+1] // QImode move
00009855 C4 94 R2=[R4] // QImode move
00009856 02 93 R1=R2 // QImode move
00009857 42 04 R2=R2+2
00009858 01 94 R2=[bp+1] // QImode move
00009859 C2 92 R1=[R2] // QImode move
0000985A 01 95 R2=R1 // QImode move
0000985B 42 02 R1=R1+2
0000985C 01 98 R4=[bp+1] // QImode move
0000985D C4 96 R3=[R4] // QImode move
0000985E 03 95 R2=R3 // QImode move
0000985F 42 06 R3=R3+2
00009860 03 99 R4=R3 // QImode move
00009861 C4 94 R2=[R4] // QImode move
00009862 0A 07 FF FF R3=R2+(-1)
00009864 01 95 R2=R1 // QImode move
00009865 C2 D6 [R2]=R3 // QImode move
L5:
00000BA4 .debug
00000BA4 2E 00 73 00 .dw '.stabn 0x44,0,62,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
36 00 32 00
2C 00 00 00
00 00
00000BB7 3B 00 00 00 .dd LM11-_OSSemAccept
00000BB9 0D 00 0A 00 .dw 0x0d,0x0a
00009866 .code
LM11:
00009866 40 F0 A6 9F call _Critical_out // call with return value
00000BBB .debug
00000BBB 2E 00 73 00 .dw '.stabn 0x44,0,63,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
36 00 33 00
2C 00 00 00
00 00
00000BCE 3D 00 00 00 .dd LM12-_OSSemAccept
00000BD0 0D 00 0A 00 .dw 0x0d,0x0a
00009868 .code
LM12:
00009868 C5 94 R2=[BP] // QImode move
00009869 02 93 R1=R2 // QImode move
0000986A 0F 9F 6C 98 pc=L2 // Indirect jump
00000BD2 .debug
00000BD2 2E 00 73 00 .dw '.stabn 0x44,0,64,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
36 00 34 00
2C 00 00 00
00 00
00000BE5 41 00 00 00 .dd LM13-_OSSemAccept
00000BE7 0D 00 0A 00 .dw 0x0d,0x0a
0000986C .code
LM13:
LBE2:
00000BE9 .debug
00000BE9 2E 00 73 00 .dw '.stabn 0x44,0,64,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
36 00 34 00
2C 00 00 00
00 00
00000BFC 41 00 00 00 .dd LM14-_OSSemAccept
00000BFE 0D 00 0A 00 .dw 0x0d,0x0a
0000986C .code
LM14:
L2:
0000986C 42 00 sp+=2
0000986D 88 98 pop bp from [sp]
0000986E 90 9A retf
.endp // end of OSSemAccept
00000C00 .debug
00000C00 2E 00 73 00 .dw '.stabs "pevent:p42",160,0,0,5',0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
70 00 65 00
76 00 65 00
6E 00 74 00
3A 00 70 00
34 00 32 00
22 00 2C 00
31 00 36 00
30 00 2C 00
30 00 2C 00
30 00 2C 00
35 00 0D 00
0A 00
0000986F .CODE
00000C1F .debug
00000C1F 2E 00 73 00 .dw '.stabn 0xc0,0,0,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 63 00
30 00 2C 00
30 00 2C 00
30 00 2C 00
00 00 00 00
00000C31 07 00 00 00 .dd LBB2-_OSSemAccept
00000C33 0D 00 0A 00 .dw 0x0d,0x0a
0000986F .code
00000C35 .debug
00000C35 2E 00 73 00 .dw '.stabs "cnt:23",128,0,0,0',0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
63 00 6E 00
74 00 3A 00
32 00 33 00
22 00 2C 00
31 00 32 00
38 00 2C 00
30 00 2C 00
30 00 2C 00
30 00 0D 00
0A 00
0000986F .CODE
00000C50 .debug
00000C50 2E 00 73 00 .dw '.stabn 0xe0,0,0,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 65 00
30 00 2C 00
30 00 2C 00
30 00 2C 00
00 00 00 00
00000C62 41 00 00 00 .dd LBE2-_OSSemAccept
00000C64 0D 00 0A 00 .dw 0x0d,0x0a
0000986F .code
00000C66 .debug
00000C66 2E 00 73 00 .dw '.stabf ',0,0
74 00 61 00
62 00 66 00
20 00 00 00
00 00
00000C6F 44 00 00 00 .dd LME1-_OSSemAccept
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -