⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spearhead.code.svn-base

📁 Spearhead2000 的 USB驱动程序
💻 SVN-BASE
📖 第 1 页 / 共 5 页
字号:
=========================================================** ELF Header Information    Machine class: 32-bit (1)    Data encoding: Little endian (1)    Header version: 1    File Type: Executable (2)    Machine: ARM (40)    Image Entry point: 0x00000000    Program header offset: 95312 (0x00017450)    Section header offset: 95408 (0x000174b0)    Flags: EF_ARM_HASENTRY (0x00000002)    Header size: 52 bytes (0x34)    Program header entry size: 32 bytes (0x20)    Program header entries: 3    Section header entry size: 40 bytes (0x28)    Section header entries: 15    String table section index: 14=========================================================** Program header #1 (PT_LOAD) [PF_X + PF_R]    Size : 27256 bytes    Virtual address: 0x00000000========================** Program header #2 (PT_LOAD) [PF_W + PF_R]    Size : 1076 bytes    Virtual address: 0x00006a78========================** Program header #3 (PT_LOAD) [PF_W + PF_R]    Size : 228268 bytes (0 bytes in file)    Virtual address: 0x00006eac=========================================================** Section #1 'FLASH' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR + SHF_LOADREGION]    Size   : 27256 bytes    INIT        EXPORT INIT$$Base    INIT$$Base        0x000000:    ea000007    ....    B        0x24        0x000004:    ea000005    ....    B        0x20        0x000008:    ea000004    ....    B        0x20        0x00000c:    ea000003    ....    B        0x20        0x000010:    ea000002    ....    B        0x20        0x000014:    ea000001    ....    B        0x20        0x000018:    ea000092    ....    B        0x268        0x00001c:    ea00009d    ....    B        0x298    soft_handler    pabort_handler    dabort_handler    reserved_handler    here    undefined_handler        0x000020:    eafffffe    ....    B        0x20        0x000024:    eb000019    ....    BL       0x90        0x000028:    eb00001f    ....    BL       0xac        0x00002c:    eb00001d    ....    BL       0xa8        0x000030:    e59fe0dc    ....    LDR      r14,0x114        0x000034:    e1a0f00e    ....    MOV      pc,r14        0x000038:    e3a0403f    ?@..    MOV      r4,#0x3f        0x00003c:    ee064f10    .O..    MCR      p15,0x0,r4,c6,c0,0        0x000040:    ee064f30    0O..    MCR      p15,0x0,r4,c6,c0,1        0x000044:    e3a04031    1@..    MOV      r4,#0x31        0x000048:    ee064f11    .O..    MCR      p15,0x0,r4,c6,c1,0        0x00004c:    e59f40c4    .@..    LDR      r4,0x118        0x000050:    ee064f12    .O..    MCR      p15,0x0,r4,c6,c2,0        0x000054:    e59f40c0    .@..    LDR      r4,0x11c        0x000058:    ee064f13    .O..    MCR      p15,0x0,r4,c6,c3,0        0x00005c:    e3a040ff    .@..    MOV      r4,#0xff        0x000060:    ee054f10    .O..    MCR      p15,0x0,r4,c5,c0,0        0x000064:    ee054f30    0O..    MCR      p15,0x0,r4,c5,c0,1        0x000068:    e3a04006    .@..    MOV      r4,#6        0x00006c:    ee024f10    .O..    MCR      p15,0x0,r4,c2,c0,0        0x000070:    e3a04002    .@..    MOV      r4,#2        0x000074:    ee024f30    0O..    MCR      p15,0x0,r4,c2,c0,1        0x000078:    ee110f10    ....    MRC      p15,0x0,r0,c1,c0,0        0x00007c:    e59f109c    ....    LDR      r1,0x120        0x000080:    e1800001    ....    ORR      r0,r0,r1        0x000084:    ee010f10    ....    MCR      p15,0x0,r0,c1,c0,0        0x000088:    e1a0f00e    ....    MOV      pc,r14        0x00008c:    e1a0f00e    ....    MOV      pc,r14        0x000090:    e3e02000    . ..    MVN      r2,#0        0x000094:    e3a0c412    ....    MOV      r12,#0x12000000        0x000098:    e58c2020      ..    STR      r2,[r12,#0x20]        0x00009c:    e58c2040    @ ..    STR      r2,[r12,#0x40]        0x0000a0:    e1a0f00e    ....    MOV      pc,r14        0x0000a4:    e1a0f00e    ....    MOV      pc,r14        0x0000a8:    e1a0f00e    ....    MOV      pc,r14        0x0000ac:    e3a0d301    ....    MOV      r13,#0x4000000        0x0000b0:    e1a0300e    .0..    MOV      r3,r14        0x0000b4:    e10f0000    ....    MRS      r0,CPSR        0x0000b8:    e3c0001f    ....    BIC      r0,r0,#0x1f        0x0000bc:    e38010d1    ....    ORR      r1,r0,#0xd1        0x0000c0:    e121f001    ..!.    MSR      CPSR_c,r1        0x0000c4:    e59fd058    X...    LDR      r13,0x124        0x0000c8:    e10f0000    ....    MRS      r0,CPSR        0x0000cc:    e3c0001f    ....    BIC      r0,r0,#0x1f        0x0000d0:    e38010d2    ....    ORR      r1,r0,#0xd2        0x0000d4:    e121f001    ..!.    MSR      CPSR_c,r1        0x0000d8:    e59fd048    H...    LDR      r13,0x128        0x0000dc:    e3c0001f    ....    BIC      r0,r0,#0x1f        0x0000e0:    e38010d7    ....    ORR      r1,r0,#0xd7        0x0000e4:    e121f001    ..!.    MSR      CPSR_c,r1        0x0000e8:    e59fd03c    <...    LDR      r13,0x12c        0x0000ec:    e3c0001f    ....    BIC      r0,r0,#0x1f        0x0000f0:    e38010db    ....    ORR      r1,r0,#0xdb        0x0000f4:    e121f001    ..!.    MSR      CPSR_c,r1        0x0000f8:    e59fd02c    ,...    LDR      r13,0x12c        0x0000fc:    e3c0001f    ....    BIC      r0,r0,#0x1f        0x000100:    e3c000c0    ....    BIC      r0,r0,#0xc0        0x000104:    e3801010    ....    ORR      r1,r0,#0x10        0x000108:    e121f001    ..!.    MSR      CPSR_c,r1        0x00010c:    e59fd018    ....    LDR      r13,0x12c        0x000110:    e1a0f003    ....    MOV      pc,r3    x$litpool$1        0x000114:    00003cbc    .<..    STREQH   r3,[r0],-r12        0x000118:    10000035    5...    ANDNE    r0,r0,r5,LSR r0        0x00011c:    18000035    5...    STMNEDA  r0,{r0,r2,r4,r5}        0x000120:    00001005    ....    ANDEQ    r1,r0,r5        0x000124:    03fffe00    ....    MVNEQS   pc,#0 ; ? Rn = 0xf        0x000128:    03fffc00    ....    MVNEQS   pc,#0 ; ? Rn = 0xf        0x00012c:    03fff400    ....    MVNEQS   pc,#0 ; ? Rn = 0xf        0x000130:    00000000    ....    ANDEQ    r0,r0,r0        0x000134:    00000000    ....    ANDEQ    r0,r0,r0    x$litpool_e$1    x$litpool$0        EXPORT INIT$$Limit    INIT$$Limit        EXPORT C$$code$$Base    C$$code$$Base        EXPORT intctlInit    intctlInit        0x000138:    e3a010c0    ....    MOV      r1,#0xc0        0x00013c:    e3a00a0b    ....    MOV      r0,#0xb000        0x000140:    e2800201    ....    ADD      r0,r0,#0x10000000        0x000144:    e580100c    ....    STR      r1,[r0,#0xc]        0x000148:    e59f1004    ....    LDR      r1,0x154        0x00014c:    e5801034    4...    STR      r1,[r0,#0x34]        0x000150:    e1a0f00e    ....    MOV      pc,r14        0x000154:    000002fc    ....    ANDEQ    r0,r0,r12,ROR r2 ; ? Bad load/store extension op    x$litpool_e$0        EXPORT intctlIntRegister    intctlIntRegister        0x000158:    e92d4000    .@-.    STMDB    r13!,{r14}        0x00015c:    e3a03000    .0..    MOV      r3,#0        0x000160:    e353001f    ..S.    CMP      r3,#0x1f        0x000164:    ba000002    ....    BLT      0x174        0x000168:    ea000017    ....    B        0x1cc        0x00016c:    e2833001    .0..    ADD      r3,r3,#1        0x000170:    eafffffa    ....    B        0x160        0x000174:    e3a0c001    ....    MOV      r12,#1        0x000178:    e110031c    ....    TST      r0,r12,LSL r3        0x00017c:    0a000011    ....    BEQ      0x1c8        0x000180:    e3520000    ..R.    CMP      r2,#0        0x000184:    0a000006    ....    BEQ      0x1a4        0x000188:    e3a0c201    ....    MOV      r12,#0x10000000        0x00018c:    e28cccb1    ....    ADD      r12,r12,#0xb100        0x000190:    e78c1103    ....    STR      r1,[r12,r3,LSL #2]        0x000194:    e383e020     ...    ORR      r14,r3,#0x20        0x000198:    e28ccc01    ....    ADD      r12,r12,#0x100        0x00019c:    e78ce103    ....    STR      r14,[r12,r3,LSL #2]        0x0001a0:    ea000001    ....    B        0x1ac        0x0001a4:    e59fc024    $...    LDR      r12,0x1d0        0x0001a8:    e78c1103    ....    STR      r1,[r12,r3,LSL #2]        0x0001ac:    e3a0ca0b    ....    MOV      r12,#0xb000        0x0001b0:    e28cc201    ....    ADD      r12,r12,#0x10000000        0x0001b4:    e59cc010    ....    LDR      r12,[r12,#0x10]        0x0001b8:    e18cc000    ....    ORR      r12,r12,r0        0x0001bc:    e3a0ea0b    ....    MOV      r14,#0xb000        0x0001c0:    e28ee201    ....    ADD      r14,r14,#0x10000000        0x0001c4:    e58ec010    ....    STR      r12,[r14,#0x10]        0x0001c8:    eaffffe7    ....    B        0x16c        0x0001cc:    e8bd8000    ....    LDMIA    r13!,{pc}    x$litpool$1        0x0001d0:    00006a78    xj..    ANDEQ    r6,r0,r8,ROR r10    x$litpool_e$1        EXPORT intctlIntRegister_1    intctlIntRegister_1        0x0001d4:    e92d4000    .@-.    STMDB    r13!,{r14}        0x0001d8:    e3a03000    .0..    MOV      r3,#0        0x0001dc:    e353001f    ..S.    CMP      r3,#0x1f        0x0001e0:    ba000002    ....    BLT      0x1f0        0x0001e4:    ea000011    ....    B        0x230        0x0001e8:    e2833001    .0..    ADD      r3,r3,#1        0x0001ec:    eafffffa    ....    B        0x1dc        0x0001f0:    e3a0c001    ....    MOV      r12,#1        0x0001f4:    e110031c    ....    TST      r0,r12,LSL r3        0x0001f8:    0a00000b    ....    BEQ      0x22c        0x0001fc:    e3a0c201    ....    MOV      r12,#0x10000000        0x000200:    e28cccb1    ....    ADD      r12,r12,#0xb100        0x000204:    e78c1102    ....    STR      r1,[r12,r2,LSL #2]        0x000208:    e383e020     ...    ORR      r14,r3,#0x20        0x00020c:    e28ccc01    ....    ADD      r12,r12,#0x100        0x000210:    e78ce102    ....    STR      r14,[r12,r2,LSL #2]        0x000214:    e24ccc02    ..L.    SUB      r12,r12,#0x200        0x000218:    e59cc010    ....    LDR      r12,[r12,#0x10]        0x00021c:    e18cc000    ....    ORR      r12,r12,r0        0x000220:    e3a0ea0b    ....    MOV      r14,#0xb000        0x000224:    e28ee201    ....    ADD      r14,r14,#0x10000000        0x000228:    e58ec010    ....    STR      r12,[r14,#0x10]        0x00022c:    eaffffed    ....    B        0x1e8        0x000230:    e8bd8000    ....    LDMIA    r13!,{pc}        EXPORT intctlIntClear    intctlIntClear        0x000234:    e1a0f00e    ....    MOV      pc,r14        EXPORT intctlIntDisable    intctlIntDisable        0x000238:    e3a01a0b    ....    MOV      r1,#0xb000        0x00023c:    e2811201    ....    ADD      r1,r1,#0x10000000        0x000240:    e5810014    ....    STR      r0,[r1,#0x14]        0x000244:    e1a0f00e    ....    MOV      pc,r14        EXPORT intctlIntEnable    intctlIntEnable        0x000248:    e3a01a0b    ....    MOV      r1,#0xb000        0x00024c:    e2811201    ....    ADD      r1,r1,#0x10000000        0x000250:    e5911010    ....    LDR      r1,[r1,#0x10]        0x000254:    e1811000    ....    ORR      r1,r1,r0        0x000258:    e3a02a0b    .*..    MOV      r2,#0xb000        0x00025c:    e2822201    ."..    ADD      r2,r2,#0x10000000        0x000260:    e5821010    ....    STR      r1,[r2,#0x10]        0x000264:    e1a0f00e    ....    MOV      pc,r14        EXPORT IRQGeneralHandler    IRQGeneralHandler        0x000268:    e92d501f    .P-.    STMDB    r13!,{r0-r4,r12,r14}        0x00026c:    e3a00a0b    ....    MOV      r0,#0xb000        0x000270:    e2800201    ....    ADD      r0,r0,#0x10000000        0x000274:    e5904030    0@..    LDR      r4,[r0,#0x30]        0x000278:    e1a0e00f    ....    MOV      r14,pc

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -