📄 my2.lst
字号:
========================================================================
** ELF Header Information
File Name: my2.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00008000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM C Compiler, ADS1.2 [Build 805]
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 9
Program header offset: 5588 (0x000015d4)
Section header offset: 5620 (0x000015f4)
Section header string table index: 8
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 1184 bytes (1088 bytes in file)
Virtual address: 0x00008000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 1088 bytes (alignment 4)
Address: 0x00008000
__main
$a
!!!
0x00008000: e28f8090 .... ADD r8,pc,#0x90 ; #0x8098
0x00008004: e898000f .... LDMIA r8,{r0-r3}
0x00008008: e0800008 .... ADD r0,r0,r8
0x0000800c: e0811008 .... ADD r1,r1,r8
0x00008010: e0822008 . .. ADD r2,r2,r8
0x00008014: e0833008 .0.. ADD r3,r3,r8
0x00008018: e240b001 ..@. SUB r11,r0,#1
0x0000801c: e242c001 ..B. SUB r12,r2,#1
_move_region
0x00008020: e1500001 ..P. CMP r0,r1
0x00008024: 0a00000e .... BEQ _zero_region ; 0x8064
0x00008028: e8b00070 p... LDMIA r0!,{r4-r6}
0x0000802c: e1540005 ..T. CMP r4,r5
0x00008030: 0afffffa .... BEQ _move_region ; 0x8020
0x00008034: e3140001 .... TST r4,#1
0x00008038: 1084400b .@.. ADDNE r4,r4,r11
0x0000803c: e3150001 .... TST r5,#1
0x00008040: 1085500b .P.. ADDNE r5,r5,r11
0x00008044: e3150002 .... TST r5,#2
0x00008048: 10855009 .P.. ADDNE r5,r5,r9
0x0000804c: e3c55003 .P.. BIC r5,r5,#3
_move_loop
0x00008050: e2566004 .`V. SUBS r6,r6,#4
0x00008054: 24947004 .p.$ LDRCS r7,[r4],#4
0x00008058: 24857004 .p.$ STRCS r7,[r5],#4
0x0000805c: 8afffffb .... BHI _move_loop ; 0x8050
0x00008060: eaffffee .... B _move_region ; 0x8020
_zero_region
0x00008064: e1520003 ..R. CMP r2,r3
0x00008068: 0b000024 $... BLEQ __rt_entry ; 0x8100
0x0000806c: e3a07000 .p.. MOV r7,#0
0x00008070: e8b20030 0... LDMIA r2!,{r4,r5}
0x00008074: e3140001 .... TST r4,#1
0x00008078: 1084400c .@.. ADDNE r4,r4,r12
0x0000807c: e3140002 .... TST r4,#2
0x00008080: 10844009 .@.. ADDNE r4,r4,r9
0x00008084: e3c44003 .@.. BIC r4,r4,#3
_zero_loop
0x00008088: e2555004 .PU. SUBS r5,r5,#4
0x0000808c: 24847004 .p.$ STRCS r7,[r4],#4
0x00008090: 8afffffc .... BHI _zero_loop ; 0x8088
0x00008094: eafffff2 .... B _zero_region ; 0x8064
_region_table
$d
0x00008098: 0000036c l... DCD 876
0x0000809c: 00000390 .... DCD 912
0x000080a0: 00000390 .... DCD 912
0x000080a4: 000003a8 .... DCD 936
main
$a
.text
0x000080a8: e92d4070 p@-. STMFD r13!,{r4-r6,r14}
0x000080ac: e59f6040 @`.. LDR r6,0x80f4
0x000080b0: e59f4038 8@.. LDR r4,0x80f0
0x000080b4: e3a05000 .P.. MOV r5,#0
0x000080b8: e5846000 .`.. STR r6,[r4,#0]
0x000080bc: eb000002 .... BL delay ; 0x80cc
0x000080c0: e5845000 .P.. STR r5,[r4,#0]
0x000080c4: eb000000 .... BL delay ; 0x80cc
0x000080c8: eafffffa .... B 0x80b8
delay
0x000080cc: e3a01000 .... MOV r1,#0
0x000080d0: e3a00000 .... MOV r0,#0
0x000080d4: e2800001 .... ADD r0,r0,#1
0x000080d8: e3500b40 @.P. CMP r0,#0x10000
0x000080dc: bafffffc .... BLT 0x80d4
0x000080e0: e2811001 .... ADD r1,r1,#1
0x000080e4: e3510064 d.Q. CMP r1,#0x64
0x000080e8: bafffff8 .... BLT 0x80d0
0x000080ec: e1a0f00e .... MOV pc,r14
$d
0x000080f0: 03ff5008 .P.. DCD 67063816
0x000080f4: 00020070 p... DCD 131184
_main_redirection
$a
.text
0x000080f8: e1a0f00e .... MOV pc,r14
_main
0x000080fc: e1a0f00e .... MOV pc,r14
__rt_entry
.text
0x00008100: eb00004d M... BL __rt_stackheap_init ; 0x823c
0x00008104: eb00000d .... BL __rt_lib_init ; 0x8140
0x00008108: ebffffe6 .... BL main ; 0x80a8
0x0000810c: ea000005 .... B exit ; 0x8128
__32__rt_exit
__rt_exit
0x00008110: e92d4001 .@-. STMFD r13!,{r0,r14}
0x00008114: eb000042 B... BL __rt_lib_shutdown ; 0x8224
0x00008118: e8bd4001 .@.. LDMFD r13!,{r0,r14}
0x0000811c: ea000000 .... B __rt_abort1 ; 0x8124
__32__rt_abort
__rt_abort
0x00008120: e3e00000 .... MVN r0,#0
__rt_abort1
0x00008124: ea000083 .... B _sys_exit ; 0x8338
exit
.text
0x00008128: e92d4010 .@-. STMFD r13!,{r4,r14}
0x0000812c: e1a04000 .@.. MOV r4,r0
0x00008130: ebffffff .... BL 0x8134
0x00008134: e1a00004 .... MOV r0,r4
0x00008138: e8bd4010 .@.. LDMFD r13!,{r4,r14}
0x0000813c: eafffff3 .... B __32__rt_exit ; 0x8110
__rt_lib_init
.text
0x00008140: e92d40f0 .@-. STMFD r13!,{r4-r7,r14}
0x00008144: e24dd00c ..M. SUB r13,r13,#0xc
0x00008148: e1a05001 .P.. MOV r5,r1
0x0000814c: e1a04000 .@.. MOV r4,r0
0x00008150: eb0000a6 .... BL _fp_init ; 0x83f0
0x00008154: e3a00000 .... MOV r0,#0
0x00008158: e58d4000 .@.. STR r4,[r13,#0]
0x0000815c: e58d5004 .P.. STR r5,[r13,#4]
0x00008160: ebffffff .... BL 0x8164
0x00008164: e58d0008 .... STR r0,[r13,#8]
0x00008168: e59f00c8 .... LDR r0,0x8238
0x0000816c: e1a0100d .... MOV r1,r13
0x00008170: e08f0000 .... ADD r0,pc,r0
0x00008174: ebffffff .... BL 0x8178
0x00008178: e1a05000 .P.. MOV r5,r0
0x0000817c: e1a06001 .`.. MOV r6,r1
0x00008180: e89d0003 .... LDMIA r13,{r0,r1}
0x00008184: ebffffff .... BL 0x8188
0x00008188: ebffffff .... BL 0x818c
0x0000818c: ebffffff .... BL 0x8190
0x00008190: e3a01000 .... MOV r1,#0
0x00008194: e3a00000 .... MOV r0,#0
0x00008198: ebffffff .... BL 0x819c
0x0000819c: e1a07000 .p.. MOV r7,r0
0x000081a0: eb00006a j... BL __user_libspace ; 0x8350
0x000081a4: e1a04000 .@.. MOV r4,r0
0x000081a8: e5807020 p.. STR r7,[r0,#0x20]
0x000081ac: e3a00000 .... MOV r0,#0
0x000081b0: e3a01000 .... MOV r1,#0
0x000081b4: ebffffff .... BL 0x81b8
0x000081b8: e2801001 .... ADD r1,r0,#1
0x000081bc: e5841024 $... STR r1,[r4,#0x24]
0x000081c0: e3a01000 .... MOV r1,#0
0x000081c4: e3a00000 .... MOV r0,#0
0x000081c8: ebffffff .... BL 0x81cc
0x000081cc: e5840028 (... STR r0,[r4,#0x28]
0x000081d0: e3a00000 .... MOV r0,#0
0x000081d4: e3a01000 .... MOV r1,#0
0x000081d8: ebffffff .... BL 0x81dc
0x000081dc: e584002c ,... STR r0,[r4,#0x2c]
0x000081e0: e3a00000 .... MOV r0,#0
0x000081e4: e3a01000 .... MOV r1,#0
0x000081e8: ebffffff .... BL 0x81ec
0x000081ec: e5840030 0... STR r0,[r4,#0x30]
0x000081f0: ebffffff .... BL 0x81f4
0x000081f4: ebffffff .... BL 0x81f8
0x000081f8: ebffffff .... BL 0x81fc
0x000081fc: ebffffff .... BL 0x8200
0x00008200: ebffffff .... BL 0x8204
0x00008204: ebffffff .... BL 0x8208
0x00008208: ebffffff .... BL 0x820c
0x0000820c: ebffffff .... BL 0x8210
0x00008210: e1a00005 .... MOV r0,r5
0x00008214: e1a01006 .... MOV r1,r6
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -