⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 my1.lst

📁 arm汇编语言程序和一些实验代码
💻 LST
📖 第 1 页 / 共 2 页
字号:

========================================================================

** ELF Header Information

    File Name: my1.axf

    Machine class: ELFCLASS32 (32-bit)
    Data encoding: ELFDATA2LSB (Little endian)
    Header version: EV_CURRENT (Current version)
    File Type: ET_EXEC (Executable) (2)
    Machine: EM_ARM (ARM)

    Image Entry point: 0x00008000
    Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)

    EABI conformance : ARM EABI Version 2.

    Built with
    ARM C Compiler, ADS1.2 [Build 805]
    ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
    ARM Linker, ADS1.2 [Build 805] 

    Header size: 52 bytes (0x34)
    Program header entry size: 32 bytes (0x20)
    Section header entry size: 40 bytes (0x28)

    Program header entries: 1
    Section header entries: 9

    Program header offset: 5588 (0x000015d4)
    Section header offset: 5620 (0x000015f4)

    Section header string table index: 8

========================================================================

** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
    Size : 1184 bytes (1088 bytes in file)
    Virtual address: 0x00008000


========================================================================

** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
    Size   : 1088 bytes (alignment 4)
    Address: 0x00008000

    $a
    SelfBoot
        0x00008000:    e59f0028    (...    LDR      r0,0x8030
        0x00008004:    e59f1028    (...    LDR      r1,0x8034
        0x00008008:    e5801000    ....    STR      r1,[r0,#0]
        0x0000800c:    e3a01b80    ....    MOV      r1,#0x20000
        0x00008010:    e59f0020     ...    LDR      r0,0x8038
        0x00008014:    e5801000    ....    STR      r1,[r0,#0]
        0x00008018:    e3a000d3    ....    MOV      r0,#0xd3
        0x0000801c:    e12ff000    ../.    MSR      CPSR_cxsf,r0
        0x00008020:    e3a0da80    ....    MOV      r13,#0x80000
        0x00008024:    e3a00053    S...    MOV      r0,#0x53
        0x00008028:    e121f000    ..!.    MSR      CPSR_c,r0
        0x0000802c:    ea00002c    ,...    B        main  ; 0x80e4
    $d
        0x00008030:    03ff5000    .P..    DCD    67063808
        0x00008034:    0003ffff    ....    DCD    262143
        0x00008038:    03ff5008    .P..    DCD    67063816
    __main
    $a
    !!!
        0x0000803c:    e28f8090    ....    ADD      r8,pc,#0x90 ; #0x80d4
        0x00008040:    e898000f    ....    LDMIA    r8,{r0-r3}
        0x00008044:    e0800008    ....    ADD      r0,r0,r8
        0x00008048:    e0811008    ....    ADD      r1,r1,r8
        0x0000804c:    e0822008    . ..    ADD      r2,r2,r8
        0x00008050:    e0833008    .0..    ADD      r3,r3,r8
        0x00008054:    e240b001    ..@.    SUB      r11,r0,#1
        0x00008058:    e242c001    ..B.    SUB      r12,r2,#1
    _move_region
        0x0000805c:    e1500001    ..P.    CMP      r0,r1
        0x00008060:    0a00000e    ....    BEQ      _zero_region  ; 0x80a0
        0x00008064:    e8b00070    p...    LDMIA    r0!,{r4-r6}
        0x00008068:    e1540005    ..T.    CMP      r4,r5
        0x0000806c:    0afffffa    ....    BEQ      _move_region  ; 0x805c
        0x00008070:    e3140001    ....    TST      r4,#1
        0x00008074:    1084400b    .@..    ADDNE    r4,r4,r11
        0x00008078:    e3150001    ....    TST      r5,#1
        0x0000807c:    1085500b    .P..    ADDNE    r5,r5,r11
        0x00008080:    e3150002    ....    TST      r5,#2
        0x00008084:    10855009    .P..    ADDNE    r5,r5,r9
        0x00008088:    e3c55003    .P..    BIC      r5,r5,#3
    _move_loop
        0x0000808c:    e2566004    .`V.    SUBS     r6,r6,#4
        0x00008090:    24947004    .p.$    LDRCS    r7,[r4],#4
        0x00008094:    24857004    .p.$    STRCS    r7,[r5],#4
        0x00008098:    8afffffb    ....    BHI      _move_loop  ; 0x808c
        0x0000809c:    eaffffee    ....    B        _move_region  ; 0x805c
    _zero_region
        0x000080a0:    e1520003    ..R.    CMP      r2,r3
        0x000080a4:    0b000024    $...    BLEQ     __rt_entry  ; 0x813c
        0x000080a8:    e3a07000    .p..    MOV      r7,#0
        0x000080ac:    e8b20030    0...    LDMIA    r2!,{r4,r5}
        0x000080b0:    e3140001    ....    TST      r4,#1
        0x000080b4:    1084400c    .@..    ADDNE    r4,r4,r12
        0x000080b8:    e3140002    ....    TST      r4,#2
        0x000080bc:    10844009    .@..    ADDNE    r4,r4,r9
        0x000080c0:    e3c44003    .@..    BIC      r4,r4,#3
    _zero_loop
        0x000080c4:    e2555004    .PU.    SUBS     r5,r5,#4
        0x000080c8:    24847004    .p.$    STRCS    r7,[r4],#4
        0x000080cc:    8afffffc    ....    BHI      _zero_loop  ; 0x80c4
        0x000080d0:    eafffff2    ....    B        _zero_region  ; 0x80a0
    _region_table
    $d
        0x000080d4:    00000330    0...    DCD    816
        0x000080d8:    00000354    T...    DCD    852
        0x000080dc:    00000354    T...    DCD    852
        0x000080e0:    0000036c    l...    DCD    876
    main
    $a
    .text
        0x000080e4:    e92d4070    p@-.    STMFD    r13!,{r4-r6,r14}
        0x000080e8:    e59f6040    @`..    LDR      r6,0x8130
        0x000080ec:    e59f4038    8@..    LDR      r4,0x812c
        0x000080f0:    e3a05000    .P..    MOV      r5,#0
        0x000080f4:    e5846000    .`..    STR      r6,[r4,#0]
        0x000080f8:    eb000002    ....    BL       delay  ; 0x8108
        0x000080fc:    e5845000    .P..    STR      r5,[r4,#0]
        0x00008100:    eb000000    ....    BL       delay  ; 0x8108
        0x00008104:    eafffffa    ....    B        0x80f4
    delay
        0x00008108:    e3a01000    ....    MOV      r1,#0
        0x0000810c:    e3a00000    ....    MOV      r0,#0
        0x00008110:    e2800001    ....    ADD      r0,r0,#1
        0x00008114:    e3500b40    @.P.    CMP      r0,#0x10000
        0x00008118:    bafffffc    ....    BLT      0x8110
        0x0000811c:    e2811001    ....    ADD      r1,r1,#1
        0x00008120:    e3510064    d.Q.    CMP      r1,#0x64
        0x00008124:    bafffff8    ....    BLT      0x810c
        0x00008128:    e1a0f00e    ....    MOV      pc,r14
    $d
        0x0000812c:    03ff5008    .P..    DCD    67063816
        0x00008130:    00020070    p...    DCD    131184
    _main_redirection
    $a
    .text
        0x00008134:    e1a0f00e    ....    MOV      pc,r14
    _main
        0x00008138:    e1a0f00e    ....    MOV      pc,r14
    __rt_entry
    .text
        0x0000813c:    eb00004d    M...    BL       __rt_stackheap_init  ; 0x8278
        0x00008140:    eb00000d    ....    BL       __rt_lib_init  ; 0x817c
        0x00008144:    ebffffe6    ....    BL       main  ; 0x80e4
        0x00008148:    ea000005    ....    B        exit  ; 0x8164
    __32__rt_exit
    __rt_exit
        0x0000814c:    e92d4001    .@-.    STMFD    r13!,{r0,r14}
        0x00008150:    eb000042    B...    BL       __rt_lib_shutdown  ; 0x8260
        0x00008154:    e8bd4001    .@..    LDMFD    r13!,{r0,r14}
        0x00008158:    ea000000    ....    B        __rt_abort1  ; 0x8160
    __32__rt_abort
    __rt_abort
        0x0000815c:    e3e00000    ....    MVN      r0,#0
    __rt_abort1
        0x00008160:    ea000083    ....    B        _sys_exit  ; 0x8374
    exit
    .text
        0x00008164:    e92d4010    .@-.    STMFD    r13!,{r4,r14}
        0x00008168:    e1a04000    .@..    MOV      r4,r0
        0x0000816c:    ebffffff    ....    BL       0x8170
        0x00008170:    e1a00004    ....    MOV      r0,r4
        0x00008174:    e8bd4010    .@..    LDMFD    r13!,{r4,r14}
        0x00008178:    eafffff3    ....    B        __32__rt_exit  ; 0x814c
    __rt_lib_init
    .text
        0x0000817c:    e92d40f0    .@-.    STMFD    r13!,{r4-r7,r14}
        0x00008180:    e24dd00c    ..M.    SUB      r13,r13,#0xc
        0x00008184:    e1a05001    .P..    MOV      r5,r1
        0x00008188:    e1a04000    .@..    MOV      r4,r0
        0x0000818c:    eb000097    ....    BL       _fp_init  ; 0x83f0
        0x00008190:    e3a00000    ....    MOV      r0,#0
        0x00008194:    e58d4000    .@..    STR      r4,[r13,#0]
        0x00008198:    e58d5004    .P..    STR      r5,[r13,#4]
        0x0000819c:    ebffffff    ....    BL       0x81a0
        0x000081a0:    e58d0008    ....    STR      r0,[r13,#8]
        0x000081a4:    e59f00c8    ....    LDR      r0,0x8274
        0x000081a8:    e1a0100d    ....    MOV      r1,r13
        0x000081ac:    e08f0000    ....    ADD      r0,pc,r0
        0x000081b0:    ebffffff    ....    BL       0x81b4
        0x000081b4:    e1a05000    .P..    MOV      r5,r0
        0x000081b8:    e1a06001    .`..    MOV      r6,r1
        0x000081bc:    e89d0003    ....    LDMIA    r13,{r0,r1}
        0x000081c0:    ebffffff    ....    BL       0x81c4
        0x000081c4:    ebffffff    ....    BL       0x81c8
        0x000081c8:    ebffffff    ....    BL       0x81cc
        0x000081cc:    e3a01000    ....    MOV      r1,#0
        0x000081d0:    e3a00000    ....    MOV      r0,#0
        0x000081d4:    ebffffff    ....    BL       0x81d8
        0x000081d8:    e1a07000    .p..    MOV      r7,r0
        0x000081dc:    eb00006a    j...    BL       __user_libspace  ; 0x838c
        0x000081e0:    e1a04000    .@..    MOV      r4,r0
        0x000081e4:    e5807020     p..    STR      r7,[r0,#0x20]
        0x000081e8:    e3a00000    ....    MOV      r0,#0
        0x000081ec:    e3a01000    ....    MOV      r1,#0
        0x000081f0:    ebffffff    ....    BL       0x81f4
        0x000081f4:    e2801001    ....    ADD      r1,r0,#1
        0x000081f8:    e5841024    $...    STR      r1,[r4,#0x24]
        0x000081fc:    e3a01000    ....    MOV      r1,#0
        0x00008200:    e3a00000    ....    MOV      r0,#0
        0x00008204:    ebffffff    ....    BL       0x8208
        0x00008208:    e5840028    (...    STR      r0,[r4,#0x28]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -