From 7ee048b66078fd2214e7ae1db4396d9e13bfef63 Mon Sep 17 00:00:00 2001 From: zhyinch <zhyinch@gmail.com> Date: 星期四, 26 十一月 2020 14:23:36 +0800 Subject: [PATCH] V2.11 注册模式 --- MDK-ARM/L051/L051.htm | 12 ++++++------ 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/MDK-ARM/L051/L051.htm b/MDK-ARM/L051/L051.htm index caee4c1..09d98c7 100644 --- a/MDK-ARM/L051/L051.htm +++ b/MDK-ARM/L051/L051.htm @@ -3,7 +3,7 @@ <title>Static Call Graph - [L051\L051.axf]</title></head> <body><HR> <H1>Static Call Graph for image L051\L051.axf</H1><HR> -<BR><P>#<CALLGRAPH># ARM Linker, 5060750: Last Updated: Thu Nov 26 14:21:57 2020 +<BR><P>#<CALLGRAPH># ARM Linker, 5060750: Last Updated: Thu Nov 26 14:23:10 2020 <BR><P> <H3>Maximum Stack Usage = 216 bytes + Unknown(Cycles, Untraceable Function Pointers)</H3><H3> Call chain for Maximum Stack Depth:</H3> @@ -626,8 +626,8 @@ <LI><a href="#[64]">>></a> dwt_setrxaftertxdelay <LI><a href="#[6b]">>></a> dwt_readrxdata <LI><a href="#[69]">>></a> dwt_read32bitoffsetreg -<LI><a href="#[6c]">>></a> memcmp <LI><a href="#[6d]">>></a> __aeabi_memcpy +<LI><a href="#[6c]">>></a> memcmp </UL> <BR>[Called By]<UL><LI><a href="#[dc]">>></a> Tag_App </UL> @@ -1375,9 +1375,9 @@ <LI><a href="#[6b]">>></a> dwt_readrxdata <LI><a href="#[69]">>></a> dwt_read32bitoffsetreg <LI><a href="#[ce]">>></a> dwt_forcetrxoff -<LI><a href="#[6c]">>></a> memcmp <LI><a href="#[6d]">>></a> __aeabi_memcpy <LI><a href="#[ca]">>></a> ceil +<LI><a href="#[6c]">>></a> memcmp </UL> <BR>[Called By]<UL><LI><a href="#[dc]">>></a> Tag_App </UL> @@ -1415,8 +1415,8 @@ <LI><a href="#[d0]">>></a> dwt_setdelayedtrxtime <LI><a href="#[6b]">>></a> dwt_readrxdata <LI><a href="#[69]">>></a> dwt_read32bitoffsetreg -<LI><a href="#[6c]">>></a> memcmp <LI><a href="#[6d]">>></a> __aeabi_memcpy +<LI><a href="#[6c]">>></a> memcmp </UL> <BR>[Called By]<UL><LI><a href="#[dc]">>></a> Tag_App </UL> @@ -1463,9 +1463,9 @@ <LI><a href="#[64]">>></a> dwt_setrxaftertxdelay <LI><a href="#[6b]">>></a> dwt_readrxdata <LI><a href="#[69]">>></a> dwt_read32bitoffsetreg -<LI><a href="#[6c]">>></a> memcmp <LI><a href="#[6d]">>></a> __aeabi_memcpy <LI><a href="#[47]">>></a> __aeabi_uidivmod +<LI><a href="#[6c]">>></a> memcmp </UL> <BR>[Called By]<UL><LI><a href="#[dc]">>></a> Tag_App </UL> @@ -1494,7 +1494,7 @@ <BR>[Called By]<UL><LI><a href="#[25]">>></a> UsartParseDataHandler </UL> -<P><STRONG><a name="[88]"></a>SetNextPollTime</STRONG> (Thumb, 112 bytes, Stack size 8 bytes, main.o(i.SetNextPollTime)) +<P><STRONG><a name="[88]"></a>SetNextPollTime</STRONG> (Thumb, 110 bytes, Stack size 8 bytes, main.o(i.SetNextPollTime)) <BR><BR>[Stack]<UL><LI>Max Depth = 80<LI>Call Chain = SetNextPollTime ⇒ __aeabi_i2d ⇒ _double_epilogue ⇒ __aeabi_llsr </UL> <BR>[Calls]<UL><LI><a href="#[3c]">>></a> __aeabi_ddiv -- Gitblit v1.9.3