========================================================================
** ELF Header Information
File Name: .\obj\led.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
Operating System ABI: none
ABI Version: 0
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00000169
Flags: EF_ARM_HASENTRY (0x05000002)
ARM ELF revision: 5 (ABI version 2)
Built with
ARM C/C++ Compiler, 4.1 [Build 894]
ARM Assembler, 4.1 [Build 894]
ARM Linker, 4.1 [Build 894]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 16
Program header offset: 143636 (0x00023114)
Section header offset: 143668 (0x00023134)
Section header string table index: 15
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 2560 bytes (1948 bytes in file)
Virtual address: 0x00000000 (Alignment 8)
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 1936 bytes (alignment 4)
Address: 0x00000000
$d.realdata
RESET
__Vectors
0x00000000: 20000270 p.. DCD 536871536
0x00000004: 00000169 i... DCD 361
0x00000008: 0000016d m... DCD 365
0x0000000c: 0000016f o... DCD 367
0x00000010: 00000000 .... DCD 0
0x00000014: 00000000 .... DCD 0
0x00000018: 00000000 .... DCD 0
0x0000001c: 00000000 .... DCD 0
0x00000020: 00000000 .... DCD 0
0x00000024: 00000000 .... DCD 0
0x00000028: 00000000 .... DCD 0
0x0000002c: 00000171 q... DCD 369
0x00000030: 00000000 .... DCD 0
0x00000034: 00000000 .... DCD 0
0x00000038: 00000173 s... DCD 371
0x0000003c: 00000175 u... DCD 373
0x00000040: 00000177 w... DCD 375
0x00000044: 00000177 w... DCD 375
0x00000048: 00000177 w... DCD 375
0x0000004c: 00000177 w... DCD 375
0x00000050: 00000177 w... DCD 375
0x00000054: 00000177 w... DCD 375
0x00000058: 00000177 w... DCD 375
0x0000005c: 00000177 w... DCD 375
0x00000060: 00000177 w... DCD 375
0x00000064: 00000177 w... DCD 375
0x00000068: 00000177 w... DCD 375
0x0000006c: 00000177 w... DCD 375
0x00000070: 00000177 w... DCD 375
0x00000074: 00000177 w... DCD 375
0x00000078: 00000177 w... DCD 375
0x0000007c: 00000177 w... DCD 375
0x00000080: 00000177 w... DCD 375
0x00000084: 00000177 w... DCD 375
0x00000088: 00000177 w... DCD 375
0x0000008c: 00000177 w... DCD 375
0x00000090: 00000177 w... DCD 375
0x00000094: 00000177 w... DCD 375
0x00000098: 00000177 w... DCD 375
0x0000009c: 00000177 w... DCD 375
0x000000a0: 00000177 w... DCD 375
0x000000a4: 00000177 w... DCD 375
0x000000a8: 00000177 w... DCD 375
0x000000ac: 00000177 w... DCD 375
0x000000b0: 00000177 w... DCD 375
0x000000b4: 00000177 w... DCD 375
0x000000b8: 00000177 w... DCD 375
0x000000bc: 00000177 w... DCD 375
$t
!!!main
__main
0x000000c0: f000f802 .... BL __scatterload ; 0xc8
0x000000c4: f000f840 ..@. BL __rt_entry ; 0x148
!!!scatter
__scatterload
__scatterload_rt2
__scatterload_rt2_thumb_only
0x000000c8: a00c .. ADR r0,{pc}+0x34 ; 0xfc
0x000000ca: c830 0. LDM r0!,{r4,r5}
0x000000cc: 3808 .8 SUBS r0,r0,#8
0x000000ce: 1824 $. ADDS r4,r4,r0
0x000000d0: 182d -. ADDS r5,r5,r0
0x000000d2: 46a2 .F MOV r10,r4
0x000000d4: 1e67 g. SUBS r7,r4,#1
0x000000d6: 46ab .F MOV r11,r5
__scatterload_null
0x000000d8: 4654 TF MOV r4,r10
0x000000da: 465d ]F MOV r5,r11
0x000000dc: 42ac .B CMP r4,r5
0x000000de: d101 .. BNE 0xe4 ; __scatterload_null + 12
0x000000e0: f000f832 ..2. BL __rt_entry ; 0x148
0x000000e4: 467e ~F MOV r6,pc
0x000000e6: 3e0f .> SUBS r6,r6,#0xf
0x000000e8: cc0f .. LDM r4!,{r0-r3}
0x000000ea: 46b6 .F MOV lr,r6
0x000000ec: 2601 .& MOVS r6,#1
0x000000ee: 4233 3B TST r3,r6
0x000000f0: d000 .. BEQ 0xf4 ; __scatterload_null + 28
0x000000f2: 1afb .. SUBS r3,r7,r3
0x000000f4: 46a2 .F MOV r10,r4
0x000000f6: 46ab .F MOV r11,r5
0x000000f8: 4333 3C ORRS r3,r3,r6
0x000000fa: 4718 .G BX r3
$d
0x000000fc: 00000674 t... DCD 1652
0x00000100: 00000694 .... DCD 1684
$t
!!handler_copy
__scatterload_copy
0x00000104: 3a10 .: SUBS r2,r2,#0x10
0x00000106: d302 .. BCC 0x10e ; __scatterload_copy + 10
0x00000108: c878 x. LDM r0!,{r3-r6}
0x0000010a: c178 x. STM r1!,{r3-r6}
0x0000010c: d8fa .. BHI __scatterload_copy ; 0x104
0x0000010e: 0752 R. LSLS r2,r2,#29
0x00000110: d301 .. BCC 0x116 ; __scatterload_copy + 18
0x00000112: c830 0. LDM r0!,{r4,r5}
0x00000114: c130 0. STM r1!,{r4,r5}
0x00000116: d501 .. BPL 0x11c ; __scatterload_copy + 24
0x00000118: 6804 .h LDR r4,[r0,#0]
0x0000011a: 600c .` STR r4,[r1,#0]
0x0000011c: 4770 pG BX lr
0x0000011e: 0000 .. MOVS r0,r0
!!handler_zi
__scatterload_zeroinit
0x00000120: 2300 .# MOVS r3,#0
0x00000122: 2400 .$ MOVS r4,#0
0x00000124: 2500 .% MOVS r5,#0
0x00000126: 2600 .& MOVS r6,#0
0x00000128: 3a10 .: SUBS r2,r2,#0x10
0x0000012a: d301 .. BCC 0x130 ; __scatterload_zeroinit + 16
0x0000012c: c178 x. STM r1!,{r3-r6}
0x0000012e: d8fb .. BHI 0x128 ; __scatterload_zeroinit + 8
0x00000130: 0752 R. LSLS r2,r2,#29
0x00000132: d300 .. BCC 0x136 ; __scatterload_zeroinit + 22
0x00000134: c130 0. STM r1!,{r4,r5}
0x00000136: d500 .. BPL 0x13a ; __sca
SFP.zip_SFP_SFP光模块_SFP光模块例程_光模块_新唐单片机
版权申诉
5星 · 超过95%的资源 173 浏览量
2022-07-15
07:24:42
上传
评论 4
收藏 1.08MB ZIP 举报
局外狗
- 粉丝: 64
- 资源: 1万+
评论6