⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 my2.lst

📁 arm汇编语言程序和一些实验代码
💻 LST
📖 第 1 页 / 共 2 页
字号:
        0x00008218:    e28dd00c    ....    ADD      r13,r13,#0xc
        0x0000821c:    e8bd00f0    ....    LDMFD    r13!,{r4-r7}
        0x00008220:    e49df004    ....    LDR      pc,[r13],#4
    __rt_lib_shutdown
        0x00008224:    e92d4008    .@-.    STMFD    r13!,{r3,r14}
        0x00008228:    ebffffff    ....    BL       0x822c
        0x0000822c:    ebffffff    ....    BL       0x8230
        0x00008230:    ebffffff    ....    BL       0x8234
        0x00008234:    e8bd8008    ....    LDMFD    r13!,{r3,pc}
    $d
        0x00008238:    000000c0    ....    DCD    192
    __rt_stackheap_init
    $a
    .text
        0x0000823c:    e1a0500e    .P..    MOV      r5,r14
        0x00008240:    eb000042    B...    BL       __user_libspace  ; 0x8350
        0x00008244:    e1a0e005    ....    MOV      r14,r5
        0x00008248:    e1a04000    .@..    MOV      r4,r0
        0x0000824c:    e1a0100d    ....    MOV      r1,r13
        0x00008250:    e1a0300a    .0..    MOV      r3,r10
        0x00008254:    e3c00007    ....    BIC      r0,r0,#7
        0x00008258:    e280d060    `...    ADD      r13,r0,#0x60
        0x0000825c:    e92d4010    .@-.    STMFD    r13!,{r4,r14}
        0x00008260:    eb00003d    =...    BL       __user_initial_stackheap  ; 0x835c
        0x00008264:    e8bd4010    .@..    LDMFD    r13!,{r4,r14}
        0x00008268:    e3c1d007    ....    BIC      r13,r1,#7
        0x0000826c:    e3a06000    .`..    MOV      r6,#0
        0x00008270:    e3a07000    .p..    MOV      r7,#0
        0x00008274:    e3a08000    ....    MOV      r8,#0
        0x00008278:    e3a0b000    ....    MOV      r11,#0
        0x0000827c:    e1a0c004    ....    MOV      r12,r4
        0x00008280:    e8ac09c0    ....    STMIA    r12!,{r6-r8,r11}
        0x00008284:    e8ac09c0    ....    STMIA    r12!,{r6-r8,r11}
        0x00008288:    e8ac09c0    ....    STMIA    r12!,{r6-r8,r11}
        0x0000828c:    e8ac09c0    ....    STMIA    r12!,{r6-r8,r11}
        0x00008290:    e92d4013    .@-.    STMFD    r13!,{r0,r1,r4,r14}
        0x00008294:    e3a00000    ....    MOV      r0,#0
        0x00008298:    e3a01000    ....    MOV      r1,#0
        0x0000829c:    ebffffff    ....    BL       0x82a0
        0x000082a0:    e2811040    @...    ADD      r1,r1,#0x40
        0x000082a4:    e0802001    . ..    ADD      r2,r0,r1
        0x000082a8:    e2822f44    D/..    ADD      r2,r2,#0x110
        0x000082ac:    e584201c    . ..    STR      r2,[r4,#0x1c]
        0x000082b0:    e5841018    ....    STR      r1,[r4,#0x18]
        0x000082b4:    e3a00001    ....    MOV      r0,#1
        0x000082b8:    e5840010    ....    STR      r0,[r4,#0x10]
        0x000082bc:    e8bd4013    .@..    LDMFD    r13!,{r0,r1,r4,r14}
        0x000082c0:    e5840014    ....    STR      r0,[r4,#0x14]
        0x000082c4:    e1a01000    ....    MOV      r1,r0
        0x000082c8:    e1a0f00e    ....    MOV      pc,r14
    __rt_heap_extend
        0x000082cc:    e92d4010    .@-.    STMFD    r13!,{r4,r14}
        0x000082d0:    e92d0003    ..-.    STMFD    r13!,{r0,r1}
        0x000082d4:    eb00001d    ....    BL       __user_libspace  ; 0x8350
        0x000082d8:    e1a04000    .@..    MOV      r4,r0
        0x000082dc:    e8bd0003    ....    LDMFD    r13!,{r0,r1}
        0x000082e0:    e594301c    .0..    LDR      r3,[r4,#0x1c]
        0x000082e4:    e04d3003    .0M.    SUB      r3,r13,r3
        0x000082e8:    e5942014    . ..    LDR      r2,[r4,#0x14]
        0x000082ec:    e5812000    . ..    STR      r2,[r1,#0]
        0x000082f0:    e082e000    ....    ADD      r14,r2,r0
        0x000082f4:    e15e0003    ..^.    CMP      r14,r3
        0x000082f8:    8a00000a    ....    BHI      _heap_overflow  ; 0x8328
        0x000082fc:    e093300e    .0..    ADDS     r3,r3,r14
        0x00008300:    e1a03063    c0..    MOV      r3,r3,RRX
        0x00008304:    e3c33007    .0..    BIC      r3,r3,#7
        0x00008308:    e28e1d40    @...    ADD      r1,r14,#0x1000
        0x0000830c:    e2811007    ....    ADD      r1,r1,#7
        0x00008310:    e3c11007    ....    BIC      r1,r1,#7
        0x00008314:    e1510003    ..Q.    CMP      r1,r3
        0x00008318:    81a01003    ....    MOVHI    r1,r3
        0x0000831c:    e0410002    ..A.    SUB      r0,r1,r2
        0x00008320:    e5841014    ....    STR      r1,[r4,#0x14]
        0x00008324:    e8bd8010    ....    LDMFD    r13!,{r4,pc}
    _heap_overflow
        0x00008328:    e1a02000    . ..    MOV      r2,r0
        0x0000832c:    e3a00000    ....    MOV      r0,#0
        0x00008330:    ebffffff    ....    BL       0x8334
        0x00008334:    e8bd8010    ....    LDMFD    r13!,{r4,pc}
    _sys_exit
    .text
        0x00008338:    e3a00018    ....    MOV      r0,#0x18
        0x0000833c:    e59f1008    ....    LDR      r1,0x834c
        0x00008340:    ef123456    V4..    SWI      0x123456
        0x00008344:    e1a0f00e    ....    MOV      pc,r14
    $d
    $f
        0x00008348:    00000058    X...    DCD    88
        0x0000834c:    00020026    &...    DCD    131110
    __user_libspace
    $a
    .text
        0x00008350:    e59f0000    ....    LDR      r0,0x8358
        0x00008354:    e1a0f00e    ....    MOV      pc,r14
    $d
        0x00008358:    00008440    @...    DCD    33856
    __user_initial_stackheap
    $a
    .text
        0x0000835c:    e92d4000    .@-.    STMFD    r13!,{r14}
        0x00008360:    e24dd014    ..M.    SUB      r13,r13,#0x14
        0x00008364:    e1a0100d    ....    MOV      r1,r13
        0x00008368:    e28d2004    . ..    ADD      r2,r13,#4
        0x0000836c:    e5812000    . ..    STR      r2,[r1,#0]
        0x00008370:    e3a00016    ....    MOV      r0,#0x16
        0x00008374:    ef123456    V4..    SWI      0x123456
        0x00008378:    e59d0004    ....    LDR      r0,[r13,#4]
        0x0000837c:    e59d100c    ....    LDR      r1,[r13,#0xc]
        0x00008380:    e59d2008    . ..    LDR      r2,[r13,#8]
        0x00008384:    e59d3010    .0..    LDR      r3,[r13,#0x10]
        0x00008388:    e3500000    ..P.    CMP      r0,#0
        0x0000838c:    059f0008    ....    LDREQ    r0,0x839c
        0x00008390:    e28dd014    ....    ADD      r13,r13,#0x14
        0x00008394:    e8bd8000    ....    LDMFD    r13!,{pc}
    $d
    $f
        0x00008398:    00000008    ....    DCD    8
    _RW_Limit
        0x0000839c:    000084a0    ....    DCD    33952
    __32__I_use_semihosting_swi
    __I_use_semihosting_swi
    __semihosting_swi_guard
    $a
    .text
        0x000083a0:    e1a0f00e    ....    MOV      pc,r14
    __rt_fp_status_addr
    .text
        0x000083a4:    e92d4010    .@-.    STMFD    r13!,{r4,r14}
        0x000083a8:    ebffffe8    ....    BL       __user_libspace  ; 0x8350
        0x000083ac:    e2800004    ....    ADD      r0,r0,#4
        0x000083b0:    e8bd8010    ....    LDMFD    r13!,{r4,pc}
    SelfBoot
        0x000083b4:    e59f0028    (...    LDR      r0,0x83e4
        0x000083b8:    e59f1028    (...    LDR      r1,0x83e8
        0x000083bc:    e5801000    ....    STR      r1,[r0,#0]
        0x000083c0:    e3a01b80    ....    MOV      r1,#0x20000
        0x000083c4:    e59f0020     ...    LDR      r0,0x83ec
        0x000083c8:    e5801000    ....    STR      r1,[r0,#0]
        0x000083cc:    e3a000d3    ....    MOV      r0,#0xd3
        0x000083d0:    e12ff000    ../.    MSR      CPSR_cxsf,r0
        0x000083d4:    e3a0da80    ....    MOV      r13,#0x80000
        0x000083d8:    e3a00053    S...    MOV      r0,#0x53
        0x000083dc:    e121f000    ..!.    MSR      CPSR_c,r0
        0x000083e0:    eaffff30    0...    B        main  ; 0x80a8
    $d
        0x000083e4:    03ff5000    .P..    DCD    67063808
        0x000083e8:    0003ffff    ....    DCD    262143
        0x000083ec:    03ff5008    .P..    DCD    67063816
    _fp_init
    $a
    x$fpl$fpinit
        0x000083f0:    e92d4010    .@-.    STMFD    r13!,{r4,r14}
        0x000083f4:    ebffffea    ....    BL       __rt_fp_status_addr  ; 0x83a4
        0x000083f8:    e3a01000    ....    MOV      r1,#0
        0x000083fc:    e5801000    ....    STR      r1,[r0,#0]
    __fplib_config_pureend_doubles
        0x00008400:    e8bd8010    ....    LDMFD    r13!,{r4,pc}
    Region$$Table$$Base
    $d
        0x00008404:    00000000    ....    DCD    0
        0x00008408:    00000000    ....    DCD    0
        0x0000840c:    00000000    ....    DCD    0
        0x00008410:    00000000    ....    DCD    0
        0x00008414:    00000000    ....    DCD    0
        0x00008418:    00000000    ....    DCD    0
        0x0000841c:    00000000    ....    DCD    0
        0x00008420:    00000000    ....    DCD    0
        0x00008424:    00000000    ....    DCD    0
    Region$$Table$$Limit
    ZISection$$Table$$Base
        0x00008428:    00008440    @...    DCD    33856
        0x0000842c:    00000000    ....    DCD    0
        0x00008430:    00008440    @...    DCD    33856
        0x00008434:    00000000    ....    DCD    0
        0x00008438:    00008440    @...    DCD    33856
        0x0000843c:    00000060    `...    DCD    96
    ZISection$$Table$$Limit

** Section #2 'ER_ZI' (SHT_NOBITS) [SHF_ALLOC + SHF_WRITE]
    Size   : 96 bytes (alignment 4)
    Address: 0x00008440


** Section #3 '.debug_frame' (SHT_PROGBITS)
    Size   : 1072 bytes


** Section #4 '.symtab' (SHT_SYMTAB)
    Size   : 1424 bytes (alignment 4)
    String table '.strtab'
    Last local symbol no. 57


** Section #5 '.strtab' (SHT_STRTAB)
    Size   : 880 bytes


** Section #6 '.note' (SHT_NOTE)
    Size   : 24 bytes (alignment 4)


** Section #7 '.comment' (SHT_PROGBITS)
    Size   : 964 bytes


** Section #8 '.shstrtab' (SHT_STRTAB)
    Size   : 84 bytes


⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -