⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 fft.xml

📁 基于ADSP sharc系列的DSP ts201浮点数程序源代码
💻 XML
📖 第 1 页 / 共 4 页
字号:
<SYMBOL name='restore_state' address='0xc640' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='first_pass_complex' address='0xc654' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='complex_group_loop' address='0xc668' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='first_pass_real' address='0xc66c' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='real_group_loop' address='0xc67c' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='.____cfftcore.end' address='0xc680' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='.____rfftcore.end' address='0xc680' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016E8010' name='seg_pmco' start_address='0xc680' size='0x9' element_at='0x0' >
<INPUT_FILE><![CDATA[libdsp.dlb[fft256.doj]]]></INPUT_FILE>
<SYMBOL name='_ifft256' address='0xc680' size='0x3' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='._ifft256.end' address='0xc683' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_cfft256' address='0xc683' size='0x3' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='._cfft256.end' address='0xc686' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_rfft256' address='0xc686' size='0x3' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='._rfft256.end' address='0xc689' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016F85A0' name='seg_pmco' start_address='0xc689' size='0x24' element_at='0x0' >
<INPUT_FILE><![CDATA[libdsp.dlb[fft_sprt.doj]]]></INPUT_FILE>
<SYMBOL name='___lib_bitrev' address='0xc689' size='0x24' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='skip' address='0xc69d' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='bit_rev' address='0xc69f' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='two_buffers' address='0xc6a3' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='rev_copy' address='0xc6a9' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='.___lib_bitrev.end' address='0xc6ad' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016F62E8' name='seg_pmco' start_address='0xc6ad' size='0x76' element_at='0x0' >
<INPUT_FILE><![CDATA[libdsp.dlb[ifft.doj]]]></INPUT_FILE>
<SYMBOL name='____ifftcore' address='0xc6ad' size='0x76' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='first_pass' address='0xc6c9' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='complex_group_loop' address='0xc6da' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='middle_passes' address='0xc6dd' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='butterfly_mloop' address='0xc6f2' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='group_loop' address='0xc6f6' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='stage_loop' address='0xc6fa' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='last_pass' address='0xc6fb' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='butterfly_loop' address='0xc70e' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='restore_state' address='0xc70f' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='.____ifftcore.end' address='0xc723' size='0x0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<MEMORY id='00C9A170' name='seg_pmda' start_address='0xd800' end_address='0xd8c0' type='PM' qualifier='RAM' width='0x20' words_used='0xc0' words_unused='0x1' >
<OUTPUT_SECTIONS>
<OUTPUT_SECTION id='016FC298' name='seg_pmda' type='SHT_PROGBITS' start_address='0xd800' word_size='0xc0' word_size_unmapped='0x0' >
<INPUT_SECTIONS>
<INPUT_SECTION id='016E8B90' name='seg_pmda' start_address='0xd800' size='0xc0' element_at='0x0' >
<INPUT_FILE><![CDATA[libdsp.dlb[fft256.doj]]]></INPUT_FILE>
<SYMBOL name='twids' address='0xd800' size='0xc0' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<MEMORY id='00C99F38' name='seg_dmda' start_address='0x3008000' end_address='0x30fdeff' type='DM' qualifier='RAM' width='0x20' words_used='0x321' words_unused='0xf5bdf' >
<OUTPUT_SECTIONS>
<OUTPUT_SECTION id='016FCAF8' name='seg_dmda' type='SHT_PROGBITS' start_address='0x3008000' word_size='0x321' word_size_unmapped='0x0' >
<INPUT_SECTIONS>
<INPUT_SECTION id='00D7C868' name='seg_dmda' start_address='0x3008000' size='0x205' element_at='0x0' >
<INPUT_FILE><![CDATA[.\Debug\FFT.doj]]></INPUT_FILE>
<SYMBOL name='_FFT' address='0x3008000' size='0x1' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_data_count' address='0x3008001' size='0x1' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_out_count' address='0x3008002' size='0x1' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_data' address='0x3008003' size='0x100' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_mode' address='0x3008103' size='0x1' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_scale' address='0x3008104' size='0x1' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_tempdata' address='0x3008105' size='0x100' binding='WEAK'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016F0EA8' name='seg_dmda' start_address='0x3008205' size='0x4' element_at='0x0' >
<INPUT_FILE><![CDATA[libc.dlb[errno.doj]]]></INPUT_FILE>
<SYMBOL name='_errno' address='0x3008205' size='0x4' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016EAF78' name='seg_dmda' start_address='0x3008209' size='0x20' element_at='0x0' >
<INPUT_FILE><![CDATA[libc.dlb[exit.doj]]]></INPUT_FILE>
<SYMBOL name='___lib_exit_table' address='0x3008209' size='0x20' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016E2C80' name='seg_dmda' start_address='0x3008229' size='0xea' element_at='0x0' >
<INPUT_FILE><![CDATA[libc.dlb[int_tabl.doj]]]></INPUT_FILE>
<SYMBOL name='___lib_int_table' address='0x3008229' size='0xea' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016E97A0' name='seg_dmda' start_address='0x3008313' size='0x8' element_at='0x0' >
<INPUT_FILE><![CDATA[libc.dlb[logsf.doj]]]></INPUT_FILE>
<SYMBOL name='logs_data' address='0x3008313' size='0x8' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
<INPUT_SECTION id='016F3F50' name='seg_dmda' start_address='0x300831b' size='0x6' element_at='0x0' >
<INPUT_FILE><![CDATA[libc.dlb[set_args.doj]]]></INPUT_FILE>
<SYMBOL name='___lib_argv' address='0x300831b' size='0x2' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='___lib_arg1' address='0x300831d' size='0x4' binding='LOCAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<MEMORY id='00C9E758' name='seg_heap' start_address='0x30fdf00' end_address='0x30feeff' type='DM' qualifier='RAM' width='0x20' words_used='0x0' words_unused='0x1000' >
<OUTPUT_SECTIONS>
<OUTPUT_SECTION id='016FDA68' name='heap' type='SHT_PROGBITS' start_address='0x30fdf00' word_size='0x0' word_size_unmapped='0x0' >
<INPUT_SECTIONS>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<MEMORY id='00C9A990' name='seg_stak' start_address='0x30fef00' end_address='0x30ffeff' type='DM' qualifier='RAM' width='0x20' words_used='0x0' words_unused='0x1000' >
<OUTPUT_SECTIONS>
<OUTPUT_SECTION id='016FD798' name='stackseg' type='SHT_PROGBITS' start_address='0x30fef00' word_size='0x0' word_size_unmapped='0x0' >
<INPUT_SECTIONS>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<MEMORY id='00D2BAE8' name='seg_bnk3' start_address='0x30fff00' end_address='0x30fffff' type='DM' qualifier='RAM' width='0x20' words_used='0x11' words_unused='0xef' >
<OUTPUT_SECTIONS>
<OUTPUT_SECTION id='016FC6C8' name='seg_bnk3' type='SHT_PROGBITS' start_address='0x30fff00' word_size='0x11' word_size_unmapped='0x0' >
<INPUT_SECTIONS>
<INPUT_SECTION id='00D7BE18' name='seg_bnk3' start_address='0x30fff00' size='0x11' element_at='0x0' >
<INPUT_FILE><![CDATA[.\Debug\BUFFERS.doj]]></INPUT_FILE>
<SYMBOL name='_user_tx_buf' address='0x30fff00' size='0x6' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_tx_ready' address='0x30fff06' size='0x1' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_rx_buf' address='0x30fff07' size='0x6' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_rx_ready' address='0x30fff0d' size='0x1' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_data_out_ptr' address='0x30fff0e' size='0x1' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_num_data' address='0x30fff0f' size='0x1' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='_user_data_type' address='0x30fff10' size='0x1' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</INPUT_SECTION>
</INPUT_SECTIONS>
</OUTPUT_SECTION>
</OUTPUT_SECTIONS>
</MEMORY>
<LDF_SYMBOLS>
<SYMBOL name='ldf_stack_space' address='0x30fef00' size='0x0' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='ldf_stack_length' address='0x1000' size='0x0' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='ldf_heap_space' address='0x30fdf00' size='0x0' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='ldf_heap_end' address='0x30feeff' size='0x0' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
<SYMBOL name='ldf_heap_length' address='0xfff' size='0x0' binding='GLOBAL'><DEMANGLED_NAME><![CDATA[]]></DEMANGLED_NAME></SYMBOL>
</LDF_SYMBOLS>
</LINKPROJECT>
</DOCUMENT>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -