======================================================================== ** ELF Header Information File Name: code.axf Machine class: ELFCLASS32 (32-bit) Data encoding: ELFDATA2LSB (Little endian) Header version: EV_CURRENT (Current version) Operating System ABI: none ABI Version: 0 File Type: ET_EXEC (Executable) (2) Machine: EM_ARM (ARM) Image Entry point: 0x00000081 Flags: EF_ARM_HASENTRY (0x00000002) ARM ELF revision: 0 (SDT / legacy GNU / unspecified) Built with Component: ARM Compiler 5.04 update 1 (build 49) Tool: armasm [5040049] Component: ARM Compiler 5.04 update 1 (build 49) Tool: armlink [5040049] Header size: 52 bytes (0x34) Program header entry size: 32 bytes (0x20) Section header entry size: 40 bytes (0x28) Program header entries: 1 Section header entries: 11 Program header offset: 1752 (0x000006d8) Section header offset: 1784 (0x000006f8) Section header string table index: 10 ======================================================================== ** Program header #0 Type : PT_LOAD (1) File Offset : 52 (0x34) Virtual Addr : 0x00000000 Physical Addr : 0x00000000 Size in file : 212 bytes (0xd4) Size in memory: 212 bytes (0xd4) Flags : PF_X + PF_R + PF_ARM_ENTRY (0x80000005) Alignment : 4 ======================================================================== ** Section #1 Name : ER_RO Type : SHT_PROGBITS (0x00000001) Flags : SHF_ALLOC + SHF_EXECINSTR (0x00000006) Addr : 0x00000000 File Offset : 52 (0x34) Size : 212 bytes (0xd4) Link : SHN_UNDEF Info : 0 Alignment : 4 Entry Size : 0 $d.realdata RESET __Vectors 0x00000000: 0000fffc .... DCD 65532 0x00000004: 00000081 .... DCD 129 0x00000008: 00000000 .... DCD 0 0x0000000c: 00000000 .... DCD 0 0x00000010: 00000000 .... DCD 0 0x00000014: 00000000 .... DCD 0 0x00000018: 00000000 .... DCD 0 0x0000001c: 00000000 .... DCD 0 0x00000020: 00000000 .... DCD 0 0x00000024: 00000000 .... DCD 0 0x00000028: 00000000 .... DCD 0 0x0000002c: 00000000 .... DCD 0 0x00000030: 00000000 .... DCD 0 0x00000034: 00000000 .... DCD 0 0x00000038: 00000000 .... DCD 0 0x0000003c: 00000000 .... DCD 0 0x00000040: 00000000 .... DCD 0 0x00000044: 00000000 .... DCD 0 0x00000048: 00000000 .... DCD 0 0x0000004c: 00000000 .... DCD 0 0x00000050: 00000000 .... DCD 0 0x00000054: 00000000 .... DCD 0 0x00000058: 00000000 .... DCD 0 0x0000005c: 00000000 .... DCD 0 0x00000060: 00000000 .... DCD 0 0x00000064: 00000000 .... DCD 0 0x00000068: 00000000 .... DCD 0 0x0000006c: 00000000 .... DCD 0 0x00000070: 00000000 .... DCD 0 0x00000074: 00000000 .... DCD 0 0x00000078: 00000000 .... DCD 0 0x0000007c: 00000000 .... DCD 0 $t .text Reset_Handler 0x00000080: 4a11 .J LDR r2,[pc,#68] ; [0xc8] = 0x50000000 0x00000082: 2077 w MOVS r0,#0x77 0x00000084: 6010 .` STR r0,[r2,#0] 0x00000086: 4a11 .J LDR r2,[pc,#68] ; [0xcc] = 0x51000000 0x00000088: 200a . MOVS r0,#0xa 0x0000008a: 6010 .` STR r0,[r2,#0] 0x0000008c: 4a0f .J LDR r2,[pc,#60] ; [0xcc] = 0x51000000 0x0000008e: 200d . MOVS r0,#0xd 0x00000090: 6010 .` STR r0,[r2,#0] 0x00000092: 4a0e .J LDR r2,[pc,#56] ; [0xcc] = 0x51000000 0x00000094: 2054 T MOVS r0,#0x54 0x00000096: 6010 .` STR r0,[r2,#0] 0x00000098: 4a0c .J LDR r2,[pc,#48] ; [0xcc] = 0x51000000 0x0000009a: 2045 E MOVS r0,#0x45 0x0000009c: 6010 .` STR r0,[r2,#0] 0x0000009e: 4a0b .J LDR r2,[pc,#44] ; [0xcc] = 0x51000000 0x000000a0: 2053 S MOVS r0,#0x53 0x000000a2: 6010 .` STR r0,[r2,#0] 0x000000a4: 4a09 .J LDR r2,[pc,#36] ; [0xcc] = 0x51000000 0x000000a6: 2054 T MOVS r0,#0x54 0x000000a8: 6010 .` STR r0,[r2,#0] 0x000000aa: 4a08 .J LDR r2,[pc,#32] ; [0xcc] = 0x51000000 0x000000ac: 203a : MOVS r0,#0x3a 0x000000ae: 6010 .` STR r0,[r2,#0] 0x000000b0: 4907 .I LDR r1,[pc,#28] ; [0xd0] = 0x51000004 0x000000b2: 6808 .h LDR r0,[r1,#0] 0x000000b4: 2101 .! MOVS r1,#1 0x000000b6: 4008 .@ ANDS r0,r0,r1 0x000000b8: 2800 .( CMP r0,#0 0x000000ba: d1f9 .. BNE 0xb0 ; Reset_Handler + 48 0x000000bc: 4903 .I LDR r1,[pc,#12] ; [0xcc] = 0x51000000 0x000000be: 4a02 .J LDR r2,[pc,#8] ; [0xc8] = 0x50000000 0x000000c0: 6808 .h LDR r0,[r1,#0] 0x000000c2: 6008 .` STR r0,[r1,#0] 0x000000c4: 6010 .` STR r0,[r2,#0] 0x000000c6: e7de .. B 0x86 ; Reset_Handler + 6 $d 0x000000c8: 50000000 ...P DCD 1342177280 0x000000cc: 51000000 ...Q DCD 1358954496 0x000000d0: 51000004 ...Q DCD 1358954500 ==================================== ** Section #2 Name : .debug_abbrev Type : SHT_PROGBITS (0x00000001) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 264 (0x108) Size : 32 bytes (0x20) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ==================================== ** Section #3 Name : .debug_frame Type : SHT_PROGBITS (0x00000001) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 296 (0x128) Size : 68 bytes (0x44) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ==================================== ** Section #4 Name : .debug_info Type : SHT_PROGBITS (0x00000001) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 364 (0x16c) Size : 228 bytes (0xe4) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ==================================== ** Section #5 Name : .debug_line Type : SHT_PROGBITS (0x00000001) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 592 (0x250) Size : 96 bytes (0x60) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ==================================== ** Section #6 Name : .symtab Type : SHT_SYMTAB (0x00000002) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 688 (0x2b0) Size : 160 bytes (0xa0) Link : Section 7 (.strtab) Info : Last local symbol no = 6 Alignment : 4 Entry Size : 16 ==================================== ** Section #7 Name : .strtab Type : SHT_STRTAB (0x00000003) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 848 (0x350) Size : 188 bytes (0xbc) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ==================================== ** Section #8 Name : .note Type : SHT_NOTE (0x00000007) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 1036 (0x40c) Size : 20 bytes (0x14) Link : SHN_UNDEF Info : 0 Alignment : 4 Entry Size : 0 Section Segment ==================================== 1 0 ==================================== ** Section #9 Name : .comment Type : SHT_PROGBITS (0x00000001) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 1056 (0x420) Size : 584 bytes (0x248) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 Component: ARM Compiler 5.04 update 1 (build 49) Tool: armlink [5040049] ArmLink --strict --callgraph --map --symbols --xref --ro_base=0x0 --cpu=Cortex-M0 --fpu=SoftVFP --first=__Vectors --list=.\code.map --output=.\code.axf --entry=Reset_Handler --info=summarysizes,sizes,totals,unused,veneers Input Comments: cm0dsasm.o Component: ARM Compiler 5.04 update 1 (build 49) Tool: armasm [5040049] ArmAsm --debug --xref --cpu=Cortex-M0 --apcs=interwork --depend=.\cm0dsasm.d -IC:\Keil_v5\ARM\RV31\INC -IC:\Keil_v5\ARM\CMSIS\Include --predefine="__EVAL SETA 1" --list=.\cm0dsasm.lst ==================================== ** Section #10 Name : .shstrtab Type : SHT_STRTAB (0x00000003) Flags : None (0x00000000) Addr : 0x00000000 File Offset : 1640 (0x668) Size : 112 bytes (0x70) Link : SHN_UNDEF Info : 0 Alignment : 1 Entry Size : 0 ====================================