📄 test_nandflash.lst
字号:
========================================================================
** ELF Header Information
File Name: test_nandflash.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00008000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM C Compiler, ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 15
Program header offset: 14128 (0x00003730)
Section header offset: 14160 (0x00003750)
Section header string table index: 14
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 4436 bytes (4432 bytes in file)
Virtual address: 0x00008000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 4432 bytes (alignment 4)
Address: 0x00008000
__init
$a
asm_code
0x00008000: e3a0da80 .... MOV r13,#0x80000
0x00008004: e59fe008 .... LDR r14,0x8014
0x00008008: e1a0f00e .... MOV pc,r14
0x0000800c: e59f0004 .... LDR r0,0x8018
0x00008010: e1a0f000 .... MOV pc,r0
$d
$f
0x00008014: 00008248 H... DCD 33352
0x00008018: 01805390 .S.. DCD 25187216
delay
$a
.text
0x0000801c: e3a01000 .... MOV r1,#0
0x00008020: e3a00000 .... MOV r0,#0
0x00008024: e2800001 .... ADD r0,r0,#1
0x00008028: e3500b40 @.P. CMP r0,#0x10000
0x0000802c: bafffffc .... BLT 0x8024
0x00008030: e2811001 .... ADD r1,r1,#1
0x00008034: e3510032 2.Q. CMP r1,#0x32
0x00008038: bafffff8 .... BLT 0x8020
0x0000803c: e1a0f00e .... MOV pc,r14
loop
0x00008040: e52de004 ..-. STR r14,[r13,#-4]!
0x00008044: e59f2188 .!.. LDR r2,0x81d4
0x00008048: e5920008 .... LDR r0,[r2,#8]
0x0000804c: e3800080 .... ORR r0,r0,#0x80
0x00008050: e3800040 @... ORR r0,r0,#0x40
0x00008054: e3800020 ... ORR r0,r0,#0x20
0x00008058: e3800010 .... ORR r0,r0,#0x10
0x0000805c: e5820008 .... STR r0,[r2,#8]
0x00008060: ebffffed .... BL delay ; 0x801c
0x00008064: e5920008 .... LDR r0,[r2,#8]
0x00008068: e2200080 .. . EOR r0,r0,#0x80
0x0000806c: e2200040 @. . EOR r0,r0,#0x40
0x00008070: e2200020 . . EOR r0,r0,#0x20
0x00008074: e2200010 .. . EOR r0,r0,#0x10
0x00008078: e5820008 .... STR r0,[r2,#8]
0x0000807c: ebffffe6 .... BL delay ; 0x801c
0x00008080: e5920008 .... LDR r0,[r2,#8]
0x00008084: e3800080 .... ORR r0,r0,#0x80
0x00008088: e3800040 @... ORR r0,r0,#0x40
0x0000808c: e3800020 ... ORR r0,r0,#0x20
0x00008090: e3800010 .... ORR r0,r0,#0x10
0x00008094: e5820008 .... STR r0,[r2,#8]
0x00008098: e49df004 .... LDR pc,[r13],#4
putchar_uart0
0x0000809c: e59f2134 4!.. LDR r2,0x81d8
0x000080a0: e5921008 .... LDR r1,[r2,#8]
0x000080a4: e3110040 @... TST r1,#0x40
0x000080a8: 0afffffc .... BEQ 0x80a0
0x000080ac: e582000c .... STR r0,[r2,#0xc]
0x000080b0: e1a0f00e .... MOV pc,r14
fputc
0x000080b4: e52de004 ..-. STR r14,[r13,#-4]!
0x000080b8: e1a03000 .0.. MOV r3,r0
0x000080bc: e1a00003 .... MOV r0,r3
0x000080c0: ebfffff5 .... BL putchar_uart0 ; 0x809c
0x000080c4: e1a00003 .... MOV r0,r3
0x000080c8: e49df004 .... LDR pc,[r13],#4
ferror
0x000080cc: e3e00000 .... MVN r0,#0
0x000080d0: e1a0f00e .... MOV pc,r14
Check_Flash_Id
0x000080d4: e59f30f8 .0.. LDR r3,0x81d4
0x000080d8: e5931008 .... LDR r1,[r3,#8]
0x000080dc: e1a00003 .... MOV r0,r3
0x000080e0: e3811c80 .... ORR r1,r1,#0x8000
0x000080e4: e5801008 .... STR r1,[r0,#8]
0x000080e8: e5901008 .... LDR r1,[r0,#8]
0x000080ec: e3c11da0 .... BIC r1,r1,#0x2800
0x000080f0: e5801008 .... STR r1,[r0,#8]
0x000080f4: e59f20e0 . .. LDR r2,0x81dc
0x000080f8: e3a01090 .... MOV r1,#0x90
0x000080fc: e5c21000 .... STRB r1,[r2,#0]
0x00008100: e5901008 .... LDR r1,[r0,#8]
0x00008104: e3811d80 .... ORR r1,r1,#0x2000
0x00008108: e5801008 .... STR r1,[r0,#8]
0x0000810c: e5901008 .... LDR r1,[r0,#8]
0x00008110: e3c11c88 .... BIC r1,r1,#0x8800
0x00008114: e5801008 .... STR r1,[r0,#8]
0x00008118: e3a01000 .... MOV r1,#0
0x0000811c: e5c21000 .... STRB r1,[r2,#0]
0x00008120: e5901008 .... LDR r1,[r0,#8]
0x00008124: e3c11ca8 .... BIC r1,r1,#0xa800
0x00008128: e5801008 .... STR r1,[r0,#8]
0x0000812c: e3a00000 .... MOV r0,#0
0x00008130: e2800001 .... ADD r0,r0,#1
0x00008134: e350000a ..P. CMP r0,#0xa
0x00008138: bafffffc .... BLT 0x8130
0x0000813c: e5d20000 .... LDRB r0,[r2,#0]
0x00008140: e1a00400 .... MOV r0,r0,LSL #8
0x00008144: e5d21000 .... LDRB r1,[r2,#0]
0x00008148: e0810000 .... ADD r0,r1,r0
0x0000814c: e5931008 .... LDR r1,[r3,#8]
0x00008150: e3811e80 .... ORR r1,r1,#0x800
0x00008154: e5831008 .... STR r1,[r3,#8]
0x00008158: e5931008 .... LDR r1,[r3,#8]
0x0000815c: e3c11ca0 .... BIC r1,r1,#0xa000
0x00008160: e5831008 .... STR r1,[r3,#8]
0x00008164: e1a0f00e .... MOV pc,r14
Flash_Reset
0x00008168: e59f0064 d... LDR r0,0x81d4
0x0000816c: e5901008 .... LDR r1,[r0,#8]
0x00008170: e3811c80 .... ORR r1,r1,#0x8000
0x00008174: e5801008 .... STR r1,[r0,#8]
0x00008178: e5901008 .... LDR r1,[r0,#8]
0x0000817c: e3c11da0 .... BIC r1,r1,#0x2800
0x00008180: e5801008 .... STR r1,[r0,#8]
0x00008184: e59f1050 P... LDR r1,0x81dc
0x00008188: e3a000ff .... MOV r0,#0xff
0x0000818c: e5c10000 .... STRB r0,[r1,#0]
0x00008190: e3a00000 .... MOV r0,#0
0x00008194: e2800001 .... ADD r0,r0,#1
0x00008198: e250ce80 ..P. SUBS r12,r0,#0x800
0x0000819c: a25ccfee ..\. SUBGES r12,r12,#0x3b8
0x000081a0: bafffffb .... BLT 0x8194
0x000081a4: e1a0f00e .... MOV pc,r14
read_nand_flash_id
0x000081a8: e92d4008 .@-. STMFD r13!,{r3,r14}
0x000081ac: ebffffed .... BL Flash_Reset ; 0x8168
0x000081b0: e28f0028 (... ADD r0,pc,#0x28 ; #0x81e0
0x000081b4: eb000034 4... BL _printf ; 0x828c
0x000081b8: ebffffc5 .... BL Check_Flash_Id ; 0x80d4
0x000081bc: e1a01000 .... MOV r1,r0
0x000081c0: e28f0048 H... ADD r0,pc,#0x48 ; #0x8210
0x000081c4: eb000030 0... BL _printf ; 0x828c
0x000081c8: e28f0068 h... ADD r0,pc,#0x68 ; #0x8238
0x000081cc: e8bd4008 .@.. LDMFD r13!,{r3,r14}
0x000081d0: ea00002d -... B _printf ; 0x828c
$d
0x000081d4: 03ff5000 .P.. DCD 67063808
0x000081d8: 03ffd000 .... DCD 67096576
0x000081dc: 07fd8000 .... DCD 134053888
0x000081e0: 202a2a2a *** DCD 539634218
0x000081e4: 696d756c lumi DCD 1768781164
0x000081e8: 31353474 t451 DCD 825570420
0x000081ec: 65742030 0 te DCD 1702109232
0x000081f0: 6e207473 st n DCD 1847620723
0x000081f4: 20646e61 and DCD 543452769
0x000081f8: 73616c66 flas DCD 1935764582
0x000081fc: 64692068 h id DCD 1684611176
0x00008200: 6f727020 pro DCD 1869770784
0x00008204: 6d617267 gram DCD 1835102823
0x00008208: 2a2a2a20 *** DCD 707406368
0x0000820c: 00000a0d .... DCD 2573
0x00008210: 646e614e Nand DCD 1684955470
0x00008214: 616c4620 Fla DCD 1634485792
0x00008218: 4b206873 sh K DCD 1260415091
0x0000821c: 38324639 9F28 DCD 942818873
0x00008220: 30513830 08Q0 DCD 810629168
0x00008224: 68632042 B ch DCD 1751326786
0x00008228: 69207069 ip i DCD 1763733609
0x0000822c: 203d2064 d = DCD 540876900
0x00008230: 78257830 0x%x DCD 2015721520
0x00008234: 000a0d20 ... DCD 658720
0x00008238: 202a2a2a *** DCD 539634218
0x0000823c: 20646e65 end DCD 543452773
0x00008240: 0d2a2a2a ***. DCD 220867114
0x00008244: 0000000a .... DCD 10
C_Entry
$a
0x00008248: e92d4008 .@-. STMFD r13!,{r3,r14}
0x0000824c: e59f001c .... LDR r0,0x8270
0x00008250: e590103c <... LDR r1,[r0,#0x3c]
0x00008254: e28f0018 .... ADD r0,pc,#0x18 ; #0x8274
0x00008258: eb00000b .... BL _printf ; 0x828c
0x0000825c: e59f0024 $... LDR r0,0x8288
0x00008260: e51f1094 .... LDR r1,0x81d4
0x00008264: e5810000 .... STR r0,[r1,#0]
0x00008268: ebffffce .... BL read_nand_flash_id ; 0x81a8
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -