⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ucos.lst

📁 uC_OSII移植源码lumit_Ucosii_110.src.zip
💻 LST
📖 第 1 页 / 共 5 页
字号:
        0x00008594:    e5d4002f    /...    LDRB     r0,[r4,#0x2f]
        0x00008598:    e59f1710    ....    LDR      r1,0x8cb0
        0x0000859c:    e7d10000    ....    LDRB     r0,[r1,r0]
        0x000085a0:    e5c40031    1...    STRB     r0,[r4,#0x31]
        0x000085a4:    e2050007    ....    AND      r0,r5,#7
        0x000085a8:    e5c4002e    ....    STRB     r0,[r4,#0x2e]
        0x000085ac:    e5d4002e    ....    LDRB     r0,[r4,#0x2e]
        0x000085b0:    e59f16f8    ....    LDR      r1,0x8cb0
        0x000085b4:    e7d10000    ....    LDRB     r0,[r1,r0]
        0x000085b8:    e5c40030    0...    STRB     r0,[r4,#0x30]
        0x000085bc:    e3a00000    ....    MOV      r0,#0
        0x000085c0:    e584001c    ....    STR      r0,[r4,#0x1c]
        0x000085c4:    e3a00000    ....    MOV      r0,#0
        0x000085c8:    e5840024    $...    STR      r0,[r4,#0x24]
        0x000085cc:    e3a00000    ....    MOV      r0,#0
        0x000085d0:    e5840020     ...    STR      r0,[r4,#0x20]
        0x000085d4:    e1a00004    ....    MOV      r0,r4
        0x000085d8:    eb000a72    r...    BL       OSTCBInitHook  ; 0xafa8
        0x000085dc:    e1a00004    ....    MOV      r0,r4
        0x000085e0:    eb000a60    `...    BL       OSTaskCreateHook  ; 0xaf68
        0x000085e4:    eb00101b    ....    BL       ARMDisableInt  ; 0xc658
        0x000085e8:    e59f06b0    ....    LDR      r0,0x8ca0
        0x000085ec:    e7804105    .A..    STR      r4,[r0,r5,LSL #2]
        0x000085f0:    e59f06bc    ....    LDR      r0,0x8cb4
        0x000085f4:    e5900000    ....    LDR      r0,[r0,#0]
        0x000085f8:    e5840014    ....    STR      r0,[r4,#0x14]
        0x000085fc:    e3a00000    ....    MOV      r0,#0
        0x00008600:    e5840018    ....    STR      r0,[r4,#0x18]
        0x00008604:    e59f06a8    ....    LDR      r0,0x8cb4
        0x00008608:    e5900000    ....    LDR      r0,[r0,#0]
        0x0000860c:    e3500000    ..P.    CMP      r0,#0
        0x00008610:    0a000002    ....    BEQ      0x8620
        0x00008614:    e59f0698    ....    LDR      r0,0x8cb4
        0x00008618:    e5900000    ....    LDR      r0,[r0,#0]
        0x0000861c:    e5804018    .@..    STR      r4,[r0,#0x18]
        0x00008620:    e59f068c    ....    LDR      r0,0x8cb4
        0x00008624:    e5804000    .@..    STR      r4,[r0,#0]
        0x00008628:    e5d40031    1...    LDRB     r0,[r4,#0x31]
        0x0000862c:    e59f165c    \...    LDR      r1,0x8c90
        0x00008630:    e5d11000    ....    LDRB     r1,[r1,#0]
        0x00008634:    e1800001    ....    ORR      r0,r0,r1
        0x00008638:    e59f1650    P...    LDR      r1,0x8c90
        0x0000863c:    e5c10000    ....    STRB     r0,[r1,#0]
        0x00008640:    e5d4102f    /...    LDRB     r1,[r4,#0x2f]
        0x00008644:    e59f2648    H&..    LDR      r2,0x8c94
        0x00008648:    e0810002    ....    ADD      r0,r1,r2
        0x0000864c:    e5d01000    ....    LDRB     r1,[r0,#0]
        0x00008650:    e5d42030    0 ..    LDRB     r2,[r4,#0x30]
        0x00008654:    e1811002    ....    ORR      r1,r1,r2
        0x00008658:    e5c01000    ....    STRB     r1,[r0,#0]
        0x0000865c:    eb001002    ....    BL       ARMEnableInt  ; 0xc66c
        0x00008660:    e3a00000    ....    MOV      r0,#0
        0x00008664:    e8bd8ff8    ....    LDMFD    r13!,{r3-r11,pc}
        0x00008668:    eb000fff    ....    BL       ARMEnableInt  ; 0xc66c
        0x0000866c:    e3a00046    F...    MOV      r0,#0x46
        0x00008670:    eafffffb    ....    B        0x8664
    OSTaskCreateExt
        0x00008674:    e92d4fff    .O-.    STMFD    r13!,{r0-r11,r14}
        0x00008678:    e24dd00c    ..M.    SUB      r13,r13,#0xc
        0x0000867c:    e1a04003    .@..    MOV      r4,r3
        0x00008680:    e59d5050    PP..    LDR      r5,[r13,#0x50]
        0x00008684:    e28da048    H...    ADD      r10,r13,#0x48
        0x00008688:    e89a0440    @...    LDMIA    r10,{r6,r10}
        0x0000868c:    e59d7044    Dp..    LDR      r7,[r13,#0x44]
        0x00008690:    e59d9040    @...    LDR      r9,[r13,#0x40]
        0x00008694:    e354000c    ..T.    CMP      r4,#0xc
        0x00008698:    9a000002    ....    BLS      0x86a8
        0x0000869c:    e3a0002a    *...    MOV      r0,#0x2a
        0x000086a0:    e28dd01c    ....    ADD      r13,r13,#0x1c
        0x000086a4:    e8bd8ff0    ....    LDMFD    r13!,{r4-r11,pc}
        0x000086a8:    eb000fea    ....    BL       ARMDisableInt  ; 0xc658
        0x000086ac:    e59f05ec    ....    LDR      r0,0x8ca0
        0x000086b0:    e7900104    ....    LDR      r0,[r0,r4,LSL #2]
        0x000086b4:    e3500000    ..P.    CMP      r0,#0
        0x000086b8:    1a00002b    +...    BNE      0x876c
        0x000086bc:    e3a00001    ....    MOV      r0,#1
        0x000086c0:    e59f15d8    ....    LDR      r1,0x8ca0
        0x000086c4:    e7810104    ....    STR      r0,[r1,r4,LSL #2]
        0x000086c8:    eb000fe7    ....    BL       ARMEnableInt  ; 0xc66c
        0x000086cc:    e3150003    ....    TST      r5,#3
        0x000086d0:    0a000002    ....    BEQ      0x86e0
        0x000086d4:    e1a01106    ....    MOV      r1,r6,LSL #2
        0x000086d8:    e1a00007    ....    MOV      r0,r7
        0x000086dc:    eb000ab3    ....    BL       __rt_memclr_w  ; 0xb1b0
        0x000086e0:    e1a03005    .0..    MOV      r3,r5
        0x000086e4:    e28d200c    . ..    ADD      r2,r13,#0xc
        0x000086e8:    e8920007    ....    LDMIA    r2,{r0-r2}
        0x000086ec:    eb0009d7    ....    BL       OSTaskStkInit  ; 0xae50
        0x000086f0:    e1a0b000    ....    MOV      r11,r0
        0x000086f4:    e1a03009    .0..    MOV      r3,r9
        0x000086f8:    e1a02007    . ..    MOV      r2,r7
        0x000086fc:    e1a0100b    ....    MOV      r1,r11
        0x00008700:    e1a00004    ....    MOV      r0,r4
        0x00008704:    e58d5008    .P..    STR      r5,[r13,#8]
        0x00008708:    e88d0440    @...    STMIA    r13,{r6,r10}
        0x0000870c:    ebffff81    ....    BL       OS_TCBInit  ; 0x8518
        0x00008710:    e1a08000    ....    MOV      r8,r0
        0x00008714:    e3580000    ..X.    CMP      r8,#0
        0x00008718:    1a00000c    ....    BNE      0x8750
        0x0000871c:    eb000fcd    ....    BL       ARMDisableInt  ; 0xc658
        0x00008720:    e59f0590    ....    LDR      r0,0x8cb8
        0x00008724:    e5d00000    ....    LDRB     r0,[r0,#0]
        0x00008728:    e2800001    ....    ADD      r0,r0,#1
        0x0000872c:    e59f1584    ....    LDR      r1,0x8cb8
        0x00008730:    e5c10000    ....    STRB     r0,[r1,#0]
        0x00008734:    eb000fcc    ....    BL       ARMEnableInt  ; 0xc66c
        0x00008738:    e59f057c    |...    LDR      r0,0x8cbc
        0x0000873c:    e5d00000    ....    LDRB     r0,[r0,#0]
        0x00008740:    e3500001    ..P.    CMP      r0,#1
        0x00008744:    1a000006    ....    BNE      0x8764
        0x00008748:    ebffff4b    K...    BL       OS_Sched  ; 0x847c
        0x0000874c:    ea000004    ....    B        0x8764
        0x00008750:    eb000fc0    ....    BL       ARMDisableInt  ; 0xc658
        0x00008754:    e3a00000    ....    MOV      r0,#0
        0x00008758:    e59f1540    @...    LDR      r1,0x8ca0
        0x0000875c:    e7810104    ....    STR      r0,[r1,r4,LSL #2]
        0x00008760:    eb000fc1    ....    BL       ARMEnableInt  ; 0xc66c
        0x00008764:    e1a00008    ....    MOV      r0,r8
        0x00008768:    eaffffcc    ....    B        0x86a0
        0x0000876c:    eb000fbe    ....    BL       ARMEnableInt  ; 0xc66c
        0x00008770:    e3a00028    (...    MOV      r0,#0x28
        0x00008774:    eaffffc9    ....    B        0x86a0
    OS_MemInit
        0x00008778:    e59f0540    @...    LDR      r0,0x8cc0
        0x0000877c:    e3a01000    ....    MOV      r1,#0
        0x00008780:    e3510004    ..Q.    CMP      r1,#4
        0x00008784:    2a000012    ...*    BCS      0x87d4
        0x00008788:    ea000002    ....    B        0x8798
        0x0000878c:    e2812001    . ..    ADD      r2,r1,#1
        0x00008790:    e3c21b40    @...    BIC      r1,r2,#0x10000
        0x00008794:    eafffff9    ....    B        0x8780
        0x00008798:    e0812101    .!..    ADD      r2,r1,r1,LSL #2
        0x0000879c:    e59f351c    .5..    LDR      r3,0x8cc0
        0x000087a0:    e0832102    .!..    ADD      r2,r3,r2,LSL #2
        0x000087a4:    e2822014    . ..    ADD      r2,r2,#0x14
        0x000087a8:    e5802004    . ..    STR      r2,[r0,#4]
        0x000087ac:    e3a02000    . ..    MOV      r2,#0
        0x000087b0:    e5802000    . ..    STR      r2,[r0,#0]
        0x000087b4:    e3a02000    . ..    MOV      r2,#0
        0x000087b8:    e5802010    . ..    STR      r2,[r0,#0x10]
        0x000087bc:    e3a02000    . ..    MOV      r2,#0
        0x000087c0:    e580200c    . ..    STR      r2,[r0,#0xc]
        0x000087c4:    e3a02000    . ..    MOV      r2,#0
        0x000087c8:    e5802008    . ..    STR      r2,[r0,#8]
        0x000087cc:    e2800014    ....    ADD      r0,r0,#0x14
        0x000087d0:    eaffffed    ....    B        0x878c
        0x000087d4:    e3a02000    . ..    MOV      r2,#0
        0x000087d8:    e5802004    . ..    STR      r2,[r0,#4]
        0x000087dc:    e3a02000    . ..    MOV      r2,#0
        0x000087e0:    e5802000    . ..    STR      r2,[r0,#0]
        0x000087e4:    e3a02000    . ..    MOV      r2,#0
        0x000087e8:    e5802010    . ..    STR      r2,[r0,#0x10]
        0x000087ec:    e3a02000    . ..    MOV      r2,#0
        0x000087f0:    e580200c    . ..    STR      r2,[r0,#0xc]
        0x000087f4:    e3a02000    . ..    MOV      r2,#0
        0x000087f8:    e5802008    . ..    STR      r2,[r0,#8]
        0x000087fc:    e59f24bc    .$..    LDR      r2,0x8cc0
        0x00008800:    e59f34bc    .4..    LDR      r3,0x8cc4
        0x00008804:    e5832000    . ..    STR      r2,[r3,#0]
        0x00008808:    e1a0f00e    ....    MOV      pc,r14
    OS_QInit
        0x0000880c:    e59f04b4    ....    LDR      r0,0x8cc8
        0x00008810:    e59f24b4    .$..    LDR      r2,0x8ccc
        0x00008814:    e3a01000    ....    MOV      r1,#0
        0x00008818:    e3510004    ..Q.    CMP      r1,#4
        0x0000881c:    2a000007    ...*    BCS      0x8840
        0x00008820:    ea000002    ....    B        0x8830
        0x00008824:    e2813001    .0..    ADD      r3,r1,#1
        0x00008828:    e3c31b40    @...    BIC      r1,r3,#0x10000
        0x0000882c:    eafffff9    ....    B        0x8818
        0x00008830:    e5802000    . ..    STR      r2,[r0,#0]
        0x00008834:    e2800018    ....    ADD      r0,r0,#0x18
        0x00008838:    e2822018    . ..    ADD      r2,r2,#0x18
        0x0000883c:    eafffff8    ....    B        0x8824
        0x00008840:    e3a03000    .0..    MOV      r3,#0
        0x00008844:    e5803000    .0..    STR      r3,[r0,#0]
        0x00008848:    e59f3478    x4..    LDR      r3,0x8cc8
        0x0000884c:    e59fc47c    |...    LDR      r12,0x8cd0
        0x00008850:    e58c3000    .0..    STR      r3,[r12,#0]
        0x00008854:    e1a0f00e    ....    MOV      pc,r14
    OSInit
        0x00008858:    e92d43f0    .C-.    STMFD    r13!,{r4-r9,r14}
        0x0000885c:    e24dd014    ..M.    SUB      r13,r13,#0x14
        0x00008860:    eb0009ea    ....    BL       OSInitHookBegin  ; 0xb010
        0x00008864:    e3a00000    ....    MOV      r0,#0
        0x00008868:    e59f1464    d...    LDR      r1,0x8cd4
        0x0000886c:    e5810000    ....    STR      r0,[r1,#0]
        0x00008870:    e3a00000    ....    MOV      r0,#0
        0x00008874:    e59f1408    ....    LDR      r1,0x8c84
        0x00008878:    e5c10000    ....    STRB     r0,[r1,#0]
        0x0000887c:    e3a00000    ....    MOV      r0,#0
        0x00008880:    e59f1400    ....    LDR      r1,0x8c88
        0x00008884:    e5c10000    ....    STRB     r0,[r1,#0]
        0x00008888:    e3a00000    ....    MOV      r0,#0
        0x0000888c:    e59f1424    $...    LDR      r1,0x8cb8
        0x00008890:    e5c10000    ....    STRB     r0,[r1,#0]
        0x00008894:    e3a00000    ....    MOV      r0,#0
        0x00008898:    e59f141c    ....    LDR      r1,0x8cbc
        0x0000889c:    e5c10000    ....    STRB     r0,[r1,#0]
        0x000088a0:    e3a00000    ....    MOV      r0,#0
        0x000088a4:    e59f13d4    ....    LDR      r1,0x8c80
        0x000088a8:    e5810000    ....    STR      r0,[r1,#0]
        0x000088ac:    e3a00000    ....    MOV      r0,#0
        0x000088b0:    e59f13f0    ....    LDR      r1,0x8ca8
        0x000088b4:    e5810000    ....    STR      r0,[r1,#0]
        0x000088b8:    e3a00000    ....    MOV      r0,#0
        0x000088bc:    e59f13cc    ....    LDR      r1,0x8c90
        0x000088c0:    e5c10000    ....    STRB     r0,[r1,#0]
        0x000088c4:    e59f93c8    ....    LDR      r9,0x8c94
        0x000088c8:    e3a04000    .@..    MOV      r4,#0
        0x000088cc:    e3540002    ..T.    CMP      r4,#2
        0x000088d0:    2a000006    ...*    BCS      0x88f0
        0x000088d4:    ea000002    ....    B        0x88e4
        0x000088d8:    e2840001    ....    ADD      r0,r4,#1
        0x000088dc:    e3c04b40    @K..    BIC      r4,r0,#0x10000
        0x000088e0:    eafffff9    ....    B        0x88cc
        0x000088e4:    e3a00000    ....    MOV      r0,#0
        0x000088e8:    e4c90001    ....    STRB     r0,[r9],#1
        0x000088ec:    eafffff9    ....    B        0x88d8

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -