📄 my1.lst
字号:
========================================================================
** ELF Header Information
File Name: my1.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00008000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM C Compiler, ADS1.2 [Build 805]
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 9
Program header offset: 5588 (0x000015d4)
Section header offset: 5620 (0x000015f4)
Section header string table index: 8
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 1184 bytes (1088 bytes in file)
Virtual address: 0x00008000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 1088 bytes (alignment 4)
Address: 0x00008000
$a
SelfBoot
0x00008000: e59f0028 (... LDR r0,0x8030
0x00008004: e59f1028 (... LDR r1,0x8034
0x00008008: e5801000 .... STR r1,[r0,#0]
0x0000800c: e3a01b80 .... MOV r1,#0x20000
0x00008010: e59f0020 ... LDR r0,0x8038
0x00008014: e5801000 .... STR r1,[r0,#0]
0x00008018: e3a000d3 .... MOV r0,#0xd3
0x0000801c: e12ff000 ../. MSR CPSR_cxsf,r0
0x00008020: e3a0da80 .... MOV r13,#0x80000
0x00008024: e3a00053 S... MOV r0,#0x53
0x00008028: e121f000 ..!. MSR CPSR_c,r0
0x0000802c: ea00002c ,... B main ; 0x80e4
$d
0x00008030: 03ff5000 .P.. DCD 67063808
0x00008034: 0003ffff .... DCD 262143
0x00008038: 03ff5008 .P.. DCD 67063816
__main
$a
!!!
0x0000803c: e28f8090 .... ADD r8,pc,#0x90 ; #0x80d4
0x00008040: e898000f .... LDMIA r8,{r0-r3}
0x00008044: e0800008 .... ADD r0,r0,r8
0x00008048: e0811008 .... ADD r1,r1,r8
0x0000804c: e0822008 . .. ADD r2,r2,r8
0x00008050: e0833008 .0.. ADD r3,r3,r8
0x00008054: e240b001 ..@. SUB r11,r0,#1
0x00008058: e242c001 ..B. SUB r12,r2,#1
_move_region
0x0000805c: e1500001 ..P. CMP r0,r1
0x00008060: 0a00000e .... BEQ _zero_region ; 0x80a0
0x00008064: e8b00070 p... LDMIA r0!,{r4-r6}
0x00008068: e1540005 ..T. CMP r4,r5
0x0000806c: 0afffffa .... BEQ _move_region ; 0x805c
0x00008070: e3140001 .... TST r4,#1
0x00008074: 1084400b .@.. ADDNE r4,r4,r11
0x00008078: e3150001 .... TST r5,#1
0x0000807c: 1085500b .P.. ADDNE r5,r5,r11
0x00008080: e3150002 .... TST r5,#2
0x00008084: 10855009 .P.. ADDNE r5,r5,r9
0x00008088: e3c55003 .P.. BIC r5,r5,#3
_move_loop
0x0000808c: e2566004 .`V. SUBS r6,r6,#4
0x00008090: 24947004 .p.$ LDRCS r7,[r4],#4
0x00008094: 24857004 .p.$ STRCS r7,[r5],#4
0x00008098: 8afffffb .... BHI _move_loop ; 0x808c
0x0000809c: eaffffee .... B _move_region ; 0x805c
_zero_region
0x000080a0: e1520003 ..R. CMP r2,r3
0x000080a4: 0b000024 $... BLEQ __rt_entry ; 0x813c
0x000080a8: e3a07000 .p.. MOV r7,#0
0x000080ac: e8b20030 0... LDMIA r2!,{r4,r5}
0x000080b0: e3140001 .... TST r4,#1
0x000080b4: 1084400c .@.. ADDNE r4,r4,r12
0x000080b8: e3140002 .... TST r4,#2
0x000080bc: 10844009 .@.. ADDNE r4,r4,r9
0x000080c0: e3c44003 .@.. BIC r4,r4,#3
_zero_loop
0x000080c4: e2555004 .PU. SUBS r5,r5,#4
0x000080c8: 24847004 .p.$ STRCS r7,[r4],#4
0x000080cc: 8afffffc .... BHI _zero_loop ; 0x80c4
0x000080d0: eafffff2 .... B _zero_region ; 0x80a0
_region_table
$d
0x000080d4: 00000330 0... DCD 816
0x000080d8: 00000354 T... DCD 852
0x000080dc: 00000354 T... DCD 852
0x000080e0: 0000036c l... DCD 876
main
$a
.text
0x000080e4: e92d4070 p@-. STMFD r13!,{r4-r6,r14}
0x000080e8: e59f6040 @`.. LDR r6,0x8130
0x000080ec: e59f4038 8@.. LDR r4,0x812c
0x000080f0: e3a05000 .P.. MOV r5,#0
0x000080f4: e5846000 .`.. STR r6,[r4,#0]
0x000080f8: eb000002 .... BL delay ; 0x8108
0x000080fc: e5845000 .P.. STR r5,[r4,#0]
0x00008100: eb000000 .... BL delay ; 0x8108
0x00008104: eafffffa .... B 0x80f4
delay
0x00008108: e3a01000 .... MOV r1,#0
0x0000810c: e3a00000 .... MOV r0,#0
0x00008110: e2800001 .... ADD r0,r0,#1
0x00008114: e3500b40 @.P. CMP r0,#0x10000
0x00008118: bafffffc .... BLT 0x8110
0x0000811c: e2811001 .... ADD r1,r1,#1
0x00008120: e3510064 d.Q. CMP r1,#0x64
0x00008124: bafffff8 .... BLT 0x810c
0x00008128: e1a0f00e .... MOV pc,r14
$d
0x0000812c: 03ff5008 .P.. DCD 67063816
0x00008130: 00020070 p... DCD 131184
_main_redirection
$a
.text
0x00008134: e1a0f00e .... MOV pc,r14
_main
0x00008138: e1a0f00e .... MOV pc,r14
__rt_entry
.text
0x0000813c: eb00004d M... BL __rt_stackheap_init ; 0x8278
0x00008140: eb00000d .... BL __rt_lib_init ; 0x817c
0x00008144: ebffffe6 .... BL main ; 0x80e4
0x00008148: ea000005 .... B exit ; 0x8164
__32__rt_exit
__rt_exit
0x0000814c: e92d4001 .@-. STMFD r13!,{r0,r14}
0x00008150: eb000042 B... BL __rt_lib_shutdown ; 0x8260
0x00008154: e8bd4001 .@.. LDMFD r13!,{r0,r14}
0x00008158: ea000000 .... B __rt_abort1 ; 0x8160
__32__rt_abort
__rt_abort
0x0000815c: e3e00000 .... MVN r0,#0
__rt_abort1
0x00008160: ea000083 .... B _sys_exit ; 0x8374
exit
.text
0x00008164: e92d4010 .@-. STMFD r13!,{r4,r14}
0x00008168: e1a04000 .@.. MOV r4,r0
0x0000816c: ebffffff .... BL 0x8170
0x00008170: e1a00004 .... MOV r0,r4
0x00008174: e8bd4010 .@.. LDMFD r13!,{r4,r14}
0x00008178: eafffff3 .... B __32__rt_exit ; 0x814c
__rt_lib_init
.text
0x0000817c: e92d40f0 .@-. STMFD r13!,{r4-r7,r14}
0x00008180: e24dd00c ..M. SUB r13,r13,#0xc
0x00008184: e1a05001 .P.. MOV r5,r1
0x00008188: e1a04000 .@.. MOV r4,r0
0x0000818c: eb000097 .... BL _fp_init ; 0x83f0
0x00008190: e3a00000 .... MOV r0,#0
0x00008194: e58d4000 .@.. STR r4,[r13,#0]
0x00008198: e58d5004 .P.. STR r5,[r13,#4]
0x0000819c: ebffffff .... BL 0x81a0
0x000081a0: e58d0008 .... STR r0,[r13,#8]
0x000081a4: e59f00c8 .... LDR r0,0x8274
0x000081a8: e1a0100d .... MOV r1,r13
0x000081ac: e08f0000 .... ADD r0,pc,r0
0x000081b0: ebffffff .... BL 0x81b4
0x000081b4: e1a05000 .P.. MOV r5,r0
0x000081b8: e1a06001 .`.. MOV r6,r1
0x000081bc: e89d0003 .... LDMIA r13,{r0,r1}
0x000081c0: ebffffff .... BL 0x81c4
0x000081c4: ebffffff .... BL 0x81c8
0x000081c8: ebffffff .... BL 0x81cc
0x000081cc: e3a01000 .... MOV r1,#0
0x000081d0: e3a00000 .... MOV r0,#0
0x000081d4: ebffffff .... BL 0x81d8
0x000081d8: e1a07000 .p.. MOV r7,r0
0x000081dc: eb00006a j... BL __user_libspace ; 0x838c
0x000081e0: e1a04000 .@.. MOV r4,r0
0x000081e4: e5807020 p.. STR r7,[r0,#0x20]
0x000081e8: e3a00000 .... MOV r0,#0
0x000081ec: e3a01000 .... MOV r1,#0
0x000081f0: ebffffff .... BL 0x81f4
0x000081f4: e2801001 .... ADD r1,r0,#1
0x000081f8: e5841024 $... STR r1,[r4,#0x24]
0x000081fc: e3a01000 .... MOV r1,#0
0x00008200: e3a00000 .... MOV r0,#0
0x00008204: ebffffff .... BL 0x8208
0x00008208: e5840028 (... STR r0,[r4,#0x28]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -