📄 test_usb.lst
字号:
========================================================================
** ELF Header Information
File Name: test_usb.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00008000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM C Compiler, ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 15
Program header offset: 13592 (0x00003518)
Section header offset: 13624 (0x00003538)
Section header string table index: 14
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 4412 bytes (4408 bytes in file)
Virtual address: 0x00008000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 4408 bytes (alignment 4)
Address: 0x00008000
__init
$a
asm_code
0x00008000: e3a0da80 .... MOV r13,#0x80000
0x00008004: e59fe008 .... LDR r14,0x8014
0x00008008: e1a0f00e .... MOV pc,r14
0x0000800c: e59f0004 .... LDR r0,0x8018
0x00008010: e1a0f000 .... MOV pc,r0
$d
$f
0x00008014: 000081e8 .... DCD 33256
0x00008018: 01805390 .S.. DCD 25187216
Delay
$a
.text
0x0000801c: e3a02000 . .. MOV r2,#0
0x00008020: ea000004 .... B 0x8038
0x00008024: e3a01000 .... MOV r1,#0
0x00008028: e2811001 .... ADD r1,r1,#1
0x0000802c: e3510002 ..Q. CMP r1,#2
0x00008030: bafffffc .... BLT 0x8028
0x00008034: e2822001 . .. ADD r2,r2,#1
0x00008038: e1520000 ..R. CMP r2,r0
0x0000803c: bafffff8 .... BLT 0x8024
0x00008040: e1a0f00e .... MOV pc,r14
USBTest
0x00008044: e92d4070 p@-. STMFD r13!,{r4-r6,r14}
0x00008048: e28f0070 p... ADD r0,pc,#0x70 ; #0x80c0
0x0000804c: eb000074 t... BL _printf ; 0x8224
0x00008050: e59f407c |@.. LDR r4,0x80d4
0x00008054: e3a000fd .... MOV r0,#0xfd
0x00008058: e5c40001 .... STRB r0,[r4,#1]
0x0000805c: e5d40000 .... LDRB r0,[r4,#0]
0x00008060: e5d41000 .... LDRB r1,[r4,#0]
0x00008064: e0800401 .... ADD r0,r0,r1,LSL #8
0x00008068: e3c01b40 @... BIC r1,r0,#0x10000
0x0000806c: e28f0064 d... ADD r0,pc,#0x64 ; #0x80d8
0x00008070: eb00006b k... BL _printf ; 0x8224
0x00008074: e3a050f3 .P.. MOV r5,#0xf3
0x00008078: e5c45001 .P.. STRB r5,[r4,#1]
0x0000807c: e3a00002 .... MOV r0,#2
0x00008080: e5c40000 .... STRB r0,[r4,#0]
0x00008084: e3a06043 C`.. MOV r6,#0x43
0x00008088: e5c46000 .`.. STRB r6,[r4,#0]
0x0000808c: e59f0064 d... LDR r0,0x80f8
0x00008090: ebffffe1 .... BL Delay ; 0x801c
0x00008094: e28f0060 `... ADD r0,pc,#0x60 ; #0x80fc
0x00008098: eb000061 a... BL _printf ; 0x8224
0x0000809c: e5c45001 .P.. STRB r5,[r4,#1]
0x000080a0: e3a00012 .... MOV r0,#0x12
0x000080a4: e5c40000 .... STRB r0,[r4,#0]
0x000080a8: e5c46000 .`.. STRB r6,[r4,#0]
0x000080ac: e59f0064 d... LDR r0,0x8118
0x000080b0: ebffffd9 .... BL Delay ; 0x801c
0x000080b4: e28f0060 `... ADD r0,pc,#0x60 ; #0x811c
0x000080b8: e8bd4070 p@.. LDMFD r13!,{r4-r6,r14}
0x000080bc: ea000058 X... B _printf ; 0x8224
$d
0x000080c0: 72617453 Star DCD 1918989395
0x000080c4: 53552074 t US DCD 1398087796
0x000080c8: 65542042 B Te DCD 1700012098
0x000080cc: 20217473 st! DCD 539063411
0x000080d0: 00000a0d .... DCD 2573
0x000080d4: 07fd0000 .... DCD 134021120
0x000080d8: 20746547 Get DCD 544499015
0x000080dc: 20425355 USB DCD 541217621
0x000080e0: 20323144 D12 DCD 540160324
0x000080e4: 70696843 Chip DCD 1885956163
0x000080e8: 3a444920 ID: DCD 977553696
0x000080ec: 25783020 0x% DCD 628633632
0x000080f0: 0a0d2078 x .. DCD 168632440
0x000080f4: 00000000 .... DCD 0
0x000080f8: 00002710 .'.. DCD 10000
0x000080fc: 64616552 Read DCD 1684104530
0x00008100: 6f742079 y to DCD 1869881465
0x00008104: 666f7320 sof DCD 1718580000
0x00008108: 6f632074 t co DCD 1868767348
0x0000810c: 63656e6e nnec DCD 1667591790
0x00008110: 0d202174 t! . DCD 220209524
0x00008114: 0000000a .... DCD 10
0x00008118: 000186a0 .... DCD 100000
0x0000811c: 696e6946 Fini DCD 1768843590
0x00008120: 55206873 sh U DCD 1428187251
0x00008124: 54204253 SB T DCD 1411400275
0x00008128: 21747365 est! DCD 561279845
0x0000812c: 000a0d20 ... DCD 658720
delay
$a
.text
0x00008130: e3a01000 .... MOV r1,#0
0x00008134: e3a00000 .... MOV r0,#0
0x00008138: e2800001 .... ADD r0,r0,#1
0x0000813c: e3500b40 @.P. CMP r0,#0x10000
0x00008140: bafffffc .... BLT 0x8138
0x00008144: e2811001 .... ADD r1,r1,#1
0x00008148: e3510032 2.Q. CMP r1,#0x32
0x0000814c: bafffff8 .... BLT 0x8134
0x00008150: e1a0f00e .... MOV pc,r14
loop
0x00008154: e52de004 ..-. STR r14,[r13,#-4]!
0x00008158: e59f20b4 . .. LDR r2,0x8214
0x0000815c: e5920008 .... LDR r0,[r2,#8]
0x00008160: e3800080 .... ORR r0,r0,#0x80
0x00008164: e3800040 @... ORR r0,r0,#0x40
0x00008168: e3800020 ... ORR r0,r0,#0x20
0x0000816c: e3800010 .... ORR r0,r0,#0x10
0x00008170: e5820008 .... STR r0,[r2,#8]
0x00008174: ebffffed .... BL delay ; 0x8130
0x00008178: e5920008 .... LDR r0,[r2,#8]
0x0000817c: e2200080 .. . EOR r0,r0,#0x80
0x00008180: e2200040 @. . EOR r0,r0,#0x40
0x00008184: e2200020 . . EOR r0,r0,#0x20
0x00008188: e2200010 .. . EOR r0,r0,#0x10
0x0000818c: e5820008 .... STR r0,[r2,#8]
0x00008190: ebffffe6 .... BL delay ; 0x8130
0x00008194: e5920008 .... LDR r0,[r2,#8]
0x00008198: e3800080 .... ORR r0,r0,#0x80
0x0000819c: e3800040 @... ORR r0,r0,#0x40
0x000081a0: e3800020 ... ORR r0,r0,#0x20
0x000081a4: e3800010 .... ORR r0,r0,#0x10
0x000081a8: e5820008 .... STR r0,[r2,#8]
0x000081ac: e49df004 .... LDR pc,[r13],#4
putchar_uart0
0x000081b0: e59f2060 ` .. LDR r2,0x8218
0x000081b4: e5921008 .... LDR r1,[r2,#8]
0x000081b8: e3110040 @... TST r1,#0x40
0x000081bc: 0afffffc .... BEQ 0x81b4
0x000081c0: e582000c .... STR r0,[r2,#0xc]
0x000081c4: e1a0f00e .... MOV pc,r14
fputc
0x000081c8: e52de004 ..-. STR r14,[r13,#-4]!
0x000081cc: e1a03000 .0.. MOV r3,r0
0x000081d0: e1a00003 .... MOV r0,r3
0x000081d4: ebfffff5 .... BL putchar_uart0 ; 0x81b0
0x000081d8: e1a00003 .... MOV r0,r3
0x000081dc: e49df004 .... LDR pc,[r13],#4
ferror
0x000081e0: e3e00000 .... MVN r0,#0
0x000081e4: e1a0f00e .... MOV pc,r14
C_Entry
0x000081e8: e92d4008 .@-. STMFD r13!,{r3,r14}
0x000081ec: e59f1020 ... LDR r1,0x8214
0x000081f0: e3e00000 .... MVN r0,#0
0x000081f4: e5810000 .... STR r0,[r1,#0]
0x000081f8: e59f001c .... LDR r0,0x821c
0x000081fc: e2411d80 ..A. SUB r1,r1,#0x2000
0x00008200: e5810010 .... STR r0,[r1,#0x10]
0x00008204: ebffff8e .... BL USBTest ; 0x8044
0x00008208: e59f0010 .... LDR r0,0x8220
0x0000820c: eb000004 .... BL _printf ; 0x8224
0x00008210: eafffffe .... B 0x8210
$d
0x00008214: 03ff5000 .P.. DCD 67063808
0x00008218: 03ffd000 .... DCD 67096576
0x0000821c: 0fdff556 V... DCD 266335574
0x00008220: 000090e8 .... DCD 37096
_printf
$a
.text
0x00008224: e92d000f ..-. STMFD r13!,{r0-r3}
0x00008228: e52de004 ..-. STR r14,[r13,#-4]!
0x0000822c: e24dd03c <.M. SUB r13,r13,#0x3c
0x00008230: e28d0044 D... ADD r0,r13,#0x44
0x00008234: e58d0038 8... STR r0,[r13,#0x38]
0x00008238: e59f002c ,... LDR r0,0x826c
0x0000823c: e08f0000 .... ADD r0,pc,r0
0x00008240: e58d0020 ... STR r0,[r13,#0x20]
0x00008244: e59f0024 $... LDR r0,0x8270
0x00008248: e08f0000 .... ADD r0,pc,r0
0x0000824c: e58d0024 $... STR r0,[r13,#0x24]
0x00008250: e59f001c .... LDR r0,0x8274
0x00008254: e28d3004 .0.. ADD r3,r13,#4
0x00008258: e28d2038 8 .. ADD r2,r13,#0x38
0x0000825c: e59d1040 @... LDR r1,[r13,#0x40]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -