📄 spearhead.code.svn-base
字号:
=========================================================** ELF Header Information Machine class: 32-bit (1) Data encoding: Little endian (1) Header version: 1 File Type: Executable (2) Machine: ARM (40) Image Entry point: 0x00000000 Program header offset: 95312 (0x00017450) Section header offset: 95408 (0x000174b0) Flags: EF_ARM_HASENTRY (0x00000002) Header size: 52 bytes (0x34) Program header entry size: 32 bytes (0x20) Program header entries: 3 Section header entry size: 40 bytes (0x28) Section header entries: 15 String table section index: 14=========================================================** Program header #1 (PT_LOAD) [PF_X + PF_R] Size : 27256 bytes Virtual address: 0x00000000========================** Program header #2 (PT_LOAD) [PF_W + PF_R] Size : 1076 bytes Virtual address: 0x00006a78========================** Program header #3 (PT_LOAD) [PF_W + PF_R] Size : 228268 bytes (0 bytes in file) Virtual address: 0x00006eac=========================================================** Section #1 'FLASH' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR + SHF_LOADREGION] Size : 27256 bytes INIT EXPORT INIT$$Base INIT$$Base 0x000000: ea000007 .... B 0x24 0x000004: ea000005 .... B 0x20 0x000008: ea000004 .... B 0x20 0x00000c: ea000003 .... B 0x20 0x000010: ea000002 .... B 0x20 0x000014: ea000001 .... B 0x20 0x000018: ea000092 .... B 0x268 0x00001c: ea00009d .... B 0x298 soft_handler pabort_handler dabort_handler reserved_handler here undefined_handler 0x000020: eafffffe .... B 0x20 0x000024: eb000019 .... BL 0x90 0x000028: eb00001f .... BL 0xac 0x00002c: eb00001d .... BL 0xa8 0x000030: e59fe0dc .... LDR r14,0x114 0x000034: e1a0f00e .... MOV pc,r14 0x000038: e3a0403f ?@.. MOV r4,#0x3f 0x00003c: ee064f10 .O.. MCR p15,0x0,r4,c6,c0,0 0x000040: ee064f30 0O.. MCR p15,0x0,r4,c6,c0,1 0x000044: e3a04031 1@.. MOV r4,#0x31 0x000048: ee064f11 .O.. MCR p15,0x0,r4,c6,c1,0 0x00004c: e59f40c4 .@.. LDR r4,0x118 0x000050: ee064f12 .O.. MCR p15,0x0,r4,c6,c2,0 0x000054: e59f40c0 .@.. LDR r4,0x11c 0x000058: ee064f13 .O.. MCR p15,0x0,r4,c6,c3,0 0x00005c: e3a040ff .@.. MOV r4,#0xff 0x000060: ee054f10 .O.. MCR p15,0x0,r4,c5,c0,0 0x000064: ee054f30 0O.. MCR p15,0x0,r4,c5,c0,1 0x000068: e3a04006 .@.. MOV r4,#6 0x00006c: ee024f10 .O.. MCR p15,0x0,r4,c2,c0,0 0x000070: e3a04002 .@.. MOV r4,#2 0x000074: ee024f30 0O.. MCR p15,0x0,r4,c2,c0,1 0x000078: ee110f10 .... MRC p15,0x0,r0,c1,c0,0 0x00007c: e59f109c .... LDR r1,0x120 0x000080: e1800001 .... ORR r0,r0,r1 0x000084: ee010f10 .... MCR p15,0x0,r0,c1,c0,0 0x000088: e1a0f00e .... MOV pc,r14 0x00008c: e1a0f00e .... MOV pc,r14 0x000090: e3e02000 . .. MVN r2,#0 0x000094: e3a0c412 .... MOV r12,#0x12000000 0x000098: e58c2020 .. STR r2,[r12,#0x20] 0x00009c: e58c2040 @ .. STR r2,[r12,#0x40] 0x0000a0: e1a0f00e .... MOV pc,r14 0x0000a4: e1a0f00e .... MOV pc,r14 0x0000a8: e1a0f00e .... MOV pc,r14 0x0000ac: e3a0d301 .... MOV r13,#0x4000000 0x0000b0: e1a0300e .0.. MOV r3,r14 0x0000b4: e10f0000 .... MRS r0,CPSR 0x0000b8: e3c0001f .... BIC r0,r0,#0x1f 0x0000bc: e38010d1 .... ORR r1,r0,#0xd1 0x0000c0: e121f001 ..!. MSR CPSR_c,r1 0x0000c4: e59fd058 X... LDR r13,0x124 0x0000c8: e10f0000 .... MRS r0,CPSR 0x0000cc: e3c0001f .... BIC r0,r0,#0x1f 0x0000d0: e38010d2 .... ORR r1,r0,#0xd2 0x0000d4: e121f001 ..!. MSR CPSR_c,r1 0x0000d8: e59fd048 H... LDR r13,0x128 0x0000dc: e3c0001f .... BIC r0,r0,#0x1f 0x0000e0: e38010d7 .... ORR r1,r0,#0xd7 0x0000e4: e121f001 ..!. MSR CPSR_c,r1 0x0000e8: e59fd03c <... LDR r13,0x12c 0x0000ec: e3c0001f .... BIC r0,r0,#0x1f 0x0000f0: e38010db .... ORR r1,r0,#0xdb 0x0000f4: e121f001 ..!. MSR CPSR_c,r1 0x0000f8: e59fd02c ,... LDR r13,0x12c 0x0000fc: e3c0001f .... BIC r0,r0,#0x1f 0x000100: e3c000c0 .... BIC r0,r0,#0xc0 0x000104: e3801010 .... ORR r1,r0,#0x10 0x000108: e121f001 ..!. MSR CPSR_c,r1 0x00010c: e59fd018 .... LDR r13,0x12c 0x000110: e1a0f003 .... MOV pc,r3 x$litpool$1 0x000114: 00003cbc .<.. STREQH r3,[r0],-r12 0x000118: 10000035 5... ANDNE r0,r0,r5,LSR r0 0x00011c: 18000035 5... STMNEDA r0,{r0,r2,r4,r5} 0x000120: 00001005 .... ANDEQ r1,r0,r5 0x000124: 03fffe00 .... MVNEQS pc,#0 ; ? Rn = 0xf 0x000128: 03fffc00 .... MVNEQS pc,#0 ; ? Rn = 0xf 0x00012c: 03fff400 .... MVNEQS pc,#0 ; ? Rn = 0xf 0x000130: 00000000 .... ANDEQ r0,r0,r0 0x000134: 00000000 .... ANDEQ r0,r0,r0 x$litpool_e$1 x$litpool$0 EXPORT INIT$$Limit INIT$$Limit EXPORT C$$code$$Base C$$code$$Base EXPORT intctlInit intctlInit 0x000138: e3a010c0 .... MOV r1,#0xc0 0x00013c: e3a00a0b .... MOV r0,#0xb000 0x000140: e2800201 .... ADD r0,r0,#0x10000000 0x000144: e580100c .... STR r1,[r0,#0xc] 0x000148: e59f1004 .... LDR r1,0x154 0x00014c: e5801034 4... STR r1,[r0,#0x34] 0x000150: e1a0f00e .... MOV pc,r14 0x000154: 000002fc .... ANDEQ r0,r0,r12,ROR r2 ; ? Bad load/store extension op x$litpool_e$0 EXPORT intctlIntRegister intctlIntRegister 0x000158: e92d4000 .@-. STMDB r13!,{r14} 0x00015c: e3a03000 .0.. MOV r3,#0 0x000160: e353001f ..S. CMP r3,#0x1f 0x000164: ba000002 .... BLT 0x174 0x000168: ea000017 .... B 0x1cc 0x00016c: e2833001 .0.. ADD r3,r3,#1 0x000170: eafffffa .... B 0x160 0x000174: e3a0c001 .... MOV r12,#1 0x000178: e110031c .... TST r0,r12,LSL r3 0x00017c: 0a000011 .... BEQ 0x1c8 0x000180: e3520000 ..R. CMP r2,#0 0x000184: 0a000006 .... BEQ 0x1a4 0x000188: e3a0c201 .... MOV r12,#0x10000000 0x00018c: e28cccb1 .... ADD r12,r12,#0xb100 0x000190: e78c1103 .... STR r1,[r12,r3,LSL #2] 0x000194: e383e020 ... ORR r14,r3,#0x20 0x000198: e28ccc01 .... ADD r12,r12,#0x100 0x00019c: e78ce103 .... STR r14,[r12,r3,LSL #2] 0x0001a0: ea000001 .... B 0x1ac 0x0001a4: e59fc024 $... LDR r12,0x1d0 0x0001a8: e78c1103 .... STR r1,[r12,r3,LSL #2] 0x0001ac: e3a0ca0b .... MOV r12,#0xb000 0x0001b0: e28cc201 .... ADD r12,r12,#0x10000000 0x0001b4: e59cc010 .... LDR r12,[r12,#0x10] 0x0001b8: e18cc000 .... ORR r12,r12,r0 0x0001bc: e3a0ea0b .... MOV r14,#0xb000 0x0001c0: e28ee201 .... ADD r14,r14,#0x10000000 0x0001c4: e58ec010 .... STR r12,[r14,#0x10] 0x0001c8: eaffffe7 .... B 0x16c 0x0001cc: e8bd8000 .... LDMIA r13!,{pc} x$litpool$1 0x0001d0: 00006a78 xj.. ANDEQ r6,r0,r8,ROR r10 x$litpool_e$1 EXPORT intctlIntRegister_1 intctlIntRegister_1 0x0001d4: e92d4000 .@-. STMDB r13!,{r14} 0x0001d8: e3a03000 .0.. MOV r3,#0 0x0001dc: e353001f ..S. CMP r3,#0x1f 0x0001e0: ba000002 .... BLT 0x1f0 0x0001e4: ea000011 .... B 0x230 0x0001e8: e2833001 .0.. ADD r3,r3,#1 0x0001ec: eafffffa .... B 0x1dc 0x0001f0: e3a0c001 .... MOV r12,#1 0x0001f4: e110031c .... TST r0,r12,LSL r3 0x0001f8: 0a00000b .... BEQ 0x22c 0x0001fc: e3a0c201 .... MOV r12,#0x10000000 0x000200: e28cccb1 .... ADD r12,r12,#0xb100 0x000204: e78c1102 .... STR r1,[r12,r2,LSL #2] 0x000208: e383e020 ... ORR r14,r3,#0x20 0x00020c: e28ccc01 .... ADD r12,r12,#0x100 0x000210: e78ce102 .... STR r14,[r12,r2,LSL #2] 0x000214: e24ccc02 ..L. SUB r12,r12,#0x200 0x000218: e59cc010 .... LDR r12,[r12,#0x10] 0x00021c: e18cc000 .... ORR r12,r12,r0 0x000220: e3a0ea0b .... MOV r14,#0xb000 0x000224: e28ee201 .... ADD r14,r14,#0x10000000 0x000228: e58ec010 .... STR r12,[r14,#0x10] 0x00022c: eaffffed .... B 0x1e8 0x000230: e8bd8000 .... LDMIA r13!,{pc} EXPORT intctlIntClear intctlIntClear 0x000234: e1a0f00e .... MOV pc,r14 EXPORT intctlIntDisable intctlIntDisable 0x000238: e3a01a0b .... MOV r1,#0xb000 0x00023c: e2811201 .... ADD r1,r1,#0x10000000 0x000240: e5810014 .... STR r0,[r1,#0x14] 0x000244: e1a0f00e .... MOV pc,r14 EXPORT intctlIntEnable intctlIntEnable 0x000248: e3a01a0b .... MOV r1,#0xb000 0x00024c: e2811201 .... ADD r1,r1,#0x10000000 0x000250: e5911010 .... LDR r1,[r1,#0x10] 0x000254: e1811000 .... ORR r1,r1,r0 0x000258: e3a02a0b .*.. MOV r2,#0xb000 0x00025c: e2822201 .".. ADD r2,r2,#0x10000000 0x000260: e5821010 .... STR r1,[r2,#0x10] 0x000264: e1a0f00e .... MOV pc,r14 EXPORT IRQGeneralHandler IRQGeneralHandler 0x000268: e92d501f .P-. STMDB r13!,{r0-r4,r12,r14} 0x00026c: e3a00a0b .... MOV r0,#0xb000 0x000270: e2800201 .... ADD r0,r0,#0x10000000 0x000274: e5904030 0@.. LDR r4,[r0,#0x30] 0x000278: e1a0e00f .... MOV r14,pc
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -