📄 ucos2avr.lss
字号:
uCOS2AVR.elf: file format elf32-avr
Sections:
Idx Name Size VMA LMA File off Algn
0 .data 000000de 00800100 000021a0 00002234 2**0
CONTENTS, ALLOC, LOAD, DATA
1 .text 000021a0 00000000 00000000 00000094 2**0
CONTENTS, ALLOC, LOAD, READONLY, CODE
2 .bss 000003db 008001de 008001de 00002312 2**0
ALLOC
3 .noinit 00000000 008005b9 008005b9 00002312 2**0
CONTENTS
4 .eeprom 00000000 00810000 00810000 00002312 2**0
CONTENTS
5 .stab 00006384 00000000 00000000 00002314 2**2
CONTENTS, READONLY, DEBUGGING
6 .stabstr 00001f4f 00000000 00000000 00008698 2**0
CONTENTS, READONLY, DEBUGGING
Disassembly of section .text:
00000000 <__vectors>:
0: 0c 94 fc 00 jmp 0x1f8
4: 0c 94 e4 0f jmp 0x1fc8
8: 0c 94 33 10 jmp 0x2066
c: 0c 94 19 01 jmp 0x232
10: 0c 94 19 01 jmp 0x232
14: 0c 94 19 01 jmp 0x232
18: 0c 94 19 01 jmp 0x232
1c: 0c 94 19 01 jmp 0x232
20: 0c 94 19 01 jmp 0x232
24: 0c 94 19 01 jmp 0x232
28: 0c 94 19 01 jmp 0x232
2c: 0c 94 19 01 jmp 0x232
30: 0c 94 19 01 jmp 0x232
34: 0c 94 19 01 jmp 0x232
38: 0c 94 19 01 jmp 0x232
3c: 0c 94 8f 0f jmp 0x1f1e
40: 0c 94 19 01 jmp 0x232
44: 0c 94 19 01 jmp 0x232
48: 0c 94 19 01 jmp 0x232
4c: 0c 94 19 01 jmp 0x232
50: 0c 94 19 01 jmp 0x232
54: 0c 94 19 01 jmp 0x232
58: 0c 94 19 01 jmp 0x232
5c: 0c 94 19 01 jmp 0x232
60: 0c 94 19 01 jmp 0x232
64: 0c 94 19 01 jmp 0x232
68: 0c 94 19 01 jmp 0x232
6c: 0c 94 19 01 jmp 0x232
70: 0c 94 19 01 jmp 0x232
74: 0c 94 19 01 jmp 0x232
78: 0c 94 19 01 jmp 0x232
7c: 0c 94 19 01 jmp 0x232
80: 0c 94 19 01 jmp 0x232
84: 0c 94 19 01 jmp 0x232
88: 0c 94 19 01 jmp 0x232
0000008c <OSUnMapTbl>:
8c: 00 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
9c: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
ac: 05 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
bc: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
cc: 06 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
dc: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
ec: 05 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
fc: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
10c: 07 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
11c: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
12c: 05 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
13c: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
14c: 06 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
15c: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
16c: 05 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
17c: 04 00 01 00 02 00 01 00 03 00 01 00 02 00 01 00 ................
0000018c <OSMapTbl>:
18c: 01 02 04 08 10 20 40 80 ..... @.
00000194 <adress_table>:
194: 80 81 82 83 84 85 86 87 90 91 92 93 94 95 96 97 ................
1a4: 88 89 8a 8b 8c 8d 8e 8f 98 99 9a 9b 9c 9d 9e 9f ................
000001b4 <sse>:
1b4: 2a 2a b0 e6 b1 be ba c5 20 56 30 2e 31 31 2a 2a **...... V0.11**
...
000001c5 <ssd>:
1c5: d6 c7 c4 dc d3 cd cf e4 bf d8 d6 c6 cf b5 cd b3 ................
...
000001d6 <ssa>:
1d6: 2d 2d 2d 2d b9 e2 c3 a2 b5 e7 d7 d3 2d 2d 2d 2d ----........----
...
000001e7 <ssb>:
1e7: b1 b1 bb aa ba bd cc ec b9 a4 d2 b5 d1 a7 d4 ba ................
...
000001f8 <__init>:
1f8: 11 24 eor r1, r1
1fa: 1f be out 0x3f, r1 ; 63
1fc: cf ef ldi r28, 0xFF ; 255
1fe: d0 e1 ldi r29, 0x10 ; 16
200: de bf out 0x3e, r29 ; 62
202: cd bf out 0x3d, r28 ; 61
00000204 <__do_copy_data>:
204: 11 e0 ldi r17, 0x01 ; 1
206: a0 e0 ldi r26, 0x00 ; 0
208: b1 e0 ldi r27, 0x01 ; 1
20a: e0 ea ldi r30, 0xA0 ; 160
20c: f1 e2 ldi r31, 0x21 ; 33
20e: 00 e0 ldi r16, 0x00 ; 0
210: 0b bf out 0x3b, r16 ; 59
212: 02 c0 rjmp .+4 ; 0x218
00000214 <.__do_copy_data_loop>:
214: 07 90 elpm r0, Z+
216: 0d 92 st X+, r0
00000218 <.__do_copy_data_start>:
218: ae 3d cpi r26, 0xDE ; 222
21a: b1 07 cpc r27, r17
21c: d9 f7 brne .-10 ; 0x214
0000021e <__do_clear_bss>:
21e: 15 e0 ldi r17, 0x05 ; 5
220: ae ed ldi r26, 0xDE ; 222
222: b1 e0 ldi r27, 0x01 ; 1
224: 01 c0 rjmp .+2 ; 0x228
00000226 <.do_clear_bss_loop>:
226: 1d 92 st X+, r1
00000228 <.do_clear_bss_start>:
228: a9 3b cpi r26, 0xB9 ; 185
22a: b1 07 cpc r27, r17
22c: e1 f7 brne .-8 ; 0x226
22e: 0c 94 68 0d jmp 0x1ad0
00000232 <__bad_interrupt>:
232: 0c 94 00 00 jmp 0x0
00000236 <OS_StrCopy>:
*/
#if (OS_EVENT_NAME_SIZE > 1) || (OS_FLAG_NAME_SIZE > 1) || (OS_MEM_NAME_SIZE > 1) || (OS_TASK_NAME_SIZE > 1)
INT8U OS_StrCopy (char *pdest, char *psrc)
{
236: dc 01 movw r26, r24
238: fb 01 movw r30, r22
INT8U len;
len = 0;
23a: 90 e0 ldi r25, 0x00 ; 0
while (*psrc != OS_ASCII_NUL) {
*pdest++ = *psrc++;
len++;
23c: 80 81 ld r24, Z
23e: 88 23 and r24, r24
240: 21 f0 breq .+8 ; 0x24a
242: 81 91 ld r24, Z+
244: 8d 93 st X+, r24
246: 9f 5f subi r25, 0xFF ; 255
248: f9 cf rjmp .-14 ; 0x23c
}
*pdest = OS_ASCII_NUL;
24a: 1c 92 st X, r1
return (len);
}
24c: 89 2f mov r24, r25
24e: 99 27 eor r25, r25
250: 08 95 ret
00000252 <OSEventNameGet>:
252: cf 93 push r28
254: df 93 push r29
256: fc 01 movw r30, r24
258: 9b 01 movw r18, r22
25a: ea 01 movw r28, r20
25c: 0f b6 in r0, 0x3f ; 63
25e: f8 94 cli
260: 0f 92 push r0
262: 89 2b or r24, r25
264: 21 f4 brne .+8 ; 0x26e
266: 0f 90 pop r0
268: 0f be out 0x3f, r0 ; 63
26a: 84 e0 ldi r24, 0x04 ; 4
26c: 0e c0 rjmp .+28 ; 0x28a
26e: 67 2b or r22, r23
270: 21 f4 brne .+8 ; 0x27a
272: 0f 90 pop r0
274: 0f be out 0x3f, r0 ; 63
276: 8f e0 ldi r24, 0x0F ; 15
278: 08 c0 rjmp .+16 ; 0x28a
27a: 80 81 ld r24, Z
27c: 99 27 eor r25, r25
27e: 01 97 sbiw r24, 0x01 ; 1
280: 04 97 sbiw r24, 0x04 ; 4
282: 38 f0 brcs .+14 ; 0x292
284: 0f 90 pop r0
286: 0f be out 0x3f, r0 ; 63
288: 81 e0 ldi r24, 0x01 ; 1
28a: 88 83 st Y, r24
28c: 80 e0 ldi r24, 0x00 ; 0
28e: 90 e0 ldi r25, 0x00 ; 0
290: 09 c0 rjmp .+18 ; 0x2a4
292: 3e 96 adiw r30, 0x0e ; 14
294: bf 01 movw r22, r30
296: c9 01 movw r24, r18
298: 0e 94 1b 01 call 0x236
29c: 0f 90 pop r0
29e: 0f be out 0x3f, r0 ; 63
2a0: 18 82 st Y, r1
2a2: 99 27 eor r25, r25
2a4: df 91 pop r29
2a6: cf 91 pop r28
2a8: 08 95 ret
000002aa <OS_StrLen>:
#endif
/*$PAGE*/
/*
*********************************************************************************************************
* DETERMINE THE LENGTH OF AN ASCII STRING
*
* Description: This function is called by other uC/OS-II services to determine the size of an ASCII string
* (excluding the NUL character).
*
* Arguments : psrc is a pointer to the string for which we need to know the size.
*
* Returns : The size of the string (excluding the NUL terminating character)
*
* Notes : 1) This function is INTERNAL to uC/OS-II and your application should not call it.
* 2) The string to check must be less than 255 characters long.
*********************************************************************************************************
*/
#if (OS_EVENT_NAME_SIZE > 1) || (OS_FLAG_NAME_SIZE > 1) || (OS_MEM_NAME_SIZE > 1) || (OS_TASK_NAME_SIZE > 1)
INT8U OS_StrLen (char *psrc)
{
2aa: fc 01 movw r30, r24
INT8U len;
len = 0;
2ac: 90 e0 ldi r25, 0x00 ; 0
while (*psrc != OS_ASCII_NUL) {
psrc++;
len++;
2ae: 80 81 ld r24, Z
2b0: 88 23 and r24, r24
2b2: 19 f0 breq .+6 ; 0x2ba
2b4: 31 96 adiw r30, 0x01 ; 1
2b6: 9f 5f subi r25, 0xFF ; 255
2b8: fa cf rjmp .-12 ; 0x2ae
}
return (len);
}
2ba: 89 2f mov r24, r25
2bc: 99 27 eor r25, r25
2be: 08 95 ret
000002c0 <OSEventNameSet>:
2c0: ef 92 push r14
2c2: ff 92 push r15
2c4: 0f 93 push r16
2c6: 1f 93 push r17
2c8: cf 93 push r28
2ca: df 93 push r29
2cc: 8c 01 movw r16, r24
2ce: eb 01 movw r28, r22
2d0: 7a 01 movw r14, r20
2d2: 0f b6 in r0, 0x3f ; 63
2d4: f8 94 cli
2d6: 0f 92 push r0
2d8: 00 97 sbiw r24, 0x00 ; 0
2da: 21 f4 brne .+8 ; 0x2e4
2dc: 0f 90 pop r0
2de: 0f be out 0x3f, r0 ; 63
2e0: 84 e0 ldi r24, 0x04 ; 4
2e2: 19 c0 rjmp .+50 ; 0x316
2e4: 61 15 cp r22, r1
2e6: 71 05 cpc r23, r1
2e8: 21 f4 brne .+8 ; 0x2f2
2ea: 0f 90 pop r0
2ec: 0f be out 0x3f, r0 ; 63
2ee: 8f e0 ldi r24, 0x0F ; 15
2f0: 12 c0 rjmp .+36 ; 0x316
2f2: fc 01 movw r30, r24
2f4: 80 81 ld r24, Z
2f6: 99 27 eor r25, r25
2f8: 01 97 sbiw r24, 0x01 ; 1
2fa: 04 97 sbiw r24, 0x04 ; 4
2fc: 20 f0 brcs .+8 ; 0x306
2fe: 0f 90 pop r0
300: 0f be out 0x3f, r0 ; 63
302: 81 e0 ldi r24, 0x01 ; 1
304: 08 c0 rjmp .+16 ; 0x316
306: cb 01 movw r24, r22
308: 0e 94 55 01 call 0x2aa
30c: 88 30 cpi r24, 0x08 ; 8
30e: 30 f0 brcs .+12 ; 0x31c
310: 0f 90 pop r0
312: 0f be out 0x3f, r0 ; 63
314: 8c e0 ldi r24, 0x0C ; 12
316: f7 01 movw r30, r14
318: 80 83 st Z, r24
31a: 09 c0 rjmp .+18 ; 0x32e
31c: be 01 movw r22, r28
31e: c8 01 movw r24, r16
320: 0e 96 adiw r24, 0x0e ; 14
322: 0e 94 1b 01 call 0x236
326: 0f 90 pop r0
328: 0f be out 0x3f, r0 ; 63
32a: f7 01 movw r30, r14
32c: 10 82 st Z, r1
32e: df 91 pop r29
330: cf 91 pop r28
332: 1f 91 pop r17
334: 0f 91 pop r16
336: ff 90 pop r15
338: ef 90 pop r14
33a: 08 95 ret
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -