⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 test_nandflash.lst

📁 ARM开发代码以及bootloader的初始化程序参考
💻 LST
📖 第 1 页 / 共 5 页
字号:

========================================================================

** ELF Header Information

    File Name: test_nandflash.axf

    Machine class: ELFCLASS32 (32-bit)
    Data encoding: ELFDATA2LSB (Little endian)
    Header version: EV_CURRENT (Current version)
    File Type: ET_EXEC (Executable) (2)
    Machine: EM_ARM (ARM)

    Image Entry point: 0x00008000
    Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)

    EABI conformance : ARM EABI Version 2.

    Built with
    ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
    ARM C Compiler, ADS1.2 [Build 805]
    ARM Linker, ADS1.2 [Build 805] 

    Header size: 52 bytes (0x34)
    Program header entry size: 32 bytes (0x20)
    Section header entry size: 40 bytes (0x28)

    Program header entries: 1
    Section header entries: 15

    Program header offset: 14128 (0x00003730)
    Section header offset: 14160 (0x00003750)

    Section header string table index: 14

========================================================================

** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
    Size : 4436 bytes (4432 bytes in file)
    Virtual address: 0x00008000


========================================================================

** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
    Size   : 4432 bytes (alignment 4)
    Address: 0x00008000

    __init
    $a
    asm_code
        0x00008000:    e3a0da80    ....    MOV      r13,#0x80000
        0x00008004:    e59fe008    ....    LDR      r14,0x8014
        0x00008008:    e1a0f00e    ....    MOV      pc,r14
        0x0000800c:    e59f0004    ....    LDR      r0,0x8018
        0x00008010:    e1a0f000    ....    MOV      pc,r0
    $d
    $f
        0x00008014:    00008248    H...    DCD    33352
        0x00008018:    01805390    .S..    DCD    25187216
    delay
    $a
    .text
        0x0000801c:    e3a01000    ....    MOV      r1,#0
        0x00008020:    e3a00000    ....    MOV      r0,#0
        0x00008024:    e2800001    ....    ADD      r0,r0,#1
        0x00008028:    e3500b40    @.P.    CMP      r0,#0x10000
        0x0000802c:    bafffffc    ....    BLT      0x8024
        0x00008030:    e2811001    ....    ADD      r1,r1,#1
        0x00008034:    e3510032    2.Q.    CMP      r1,#0x32
        0x00008038:    bafffff8    ....    BLT      0x8020
        0x0000803c:    e1a0f00e    ....    MOV      pc,r14
    loop
        0x00008040:    e52de004    ..-.    STR      r14,[r13,#-4]!
        0x00008044:    e59f2188    .!..    LDR      r2,0x81d4
        0x00008048:    e5920008    ....    LDR      r0,[r2,#8]
        0x0000804c:    e3800080    ....    ORR      r0,r0,#0x80
        0x00008050:    e3800040    @...    ORR      r0,r0,#0x40
        0x00008054:    e3800020     ...    ORR      r0,r0,#0x20
        0x00008058:    e3800010    ....    ORR      r0,r0,#0x10
        0x0000805c:    e5820008    ....    STR      r0,[r2,#8]
        0x00008060:    ebffffed    ....    BL       delay  ; 0x801c
        0x00008064:    e5920008    ....    LDR      r0,[r2,#8]
        0x00008068:    e2200080    .. .    EOR      r0,r0,#0x80
        0x0000806c:    e2200040    @. .    EOR      r0,r0,#0x40
        0x00008070:    e2200020     . .    EOR      r0,r0,#0x20
        0x00008074:    e2200010    .. .    EOR      r0,r0,#0x10
        0x00008078:    e5820008    ....    STR      r0,[r2,#8]
        0x0000807c:    ebffffe6    ....    BL       delay  ; 0x801c
        0x00008080:    e5920008    ....    LDR      r0,[r2,#8]
        0x00008084:    e3800080    ....    ORR      r0,r0,#0x80
        0x00008088:    e3800040    @...    ORR      r0,r0,#0x40
        0x0000808c:    e3800020     ...    ORR      r0,r0,#0x20
        0x00008090:    e3800010    ....    ORR      r0,r0,#0x10
        0x00008094:    e5820008    ....    STR      r0,[r2,#8]
        0x00008098:    e49df004    ....    LDR      pc,[r13],#4
    putchar_uart0
        0x0000809c:    e59f2134    4!..    LDR      r2,0x81d8
        0x000080a0:    e5921008    ....    LDR      r1,[r2,#8]
        0x000080a4:    e3110040    @...    TST      r1,#0x40
        0x000080a8:    0afffffc    ....    BEQ      0x80a0
        0x000080ac:    e582000c    ....    STR      r0,[r2,#0xc]
        0x000080b0:    e1a0f00e    ....    MOV      pc,r14
    fputc
        0x000080b4:    e52de004    ..-.    STR      r14,[r13,#-4]!
        0x000080b8:    e1a03000    .0..    MOV      r3,r0
        0x000080bc:    e1a00003    ....    MOV      r0,r3
        0x000080c0:    ebfffff5    ....    BL       putchar_uart0  ; 0x809c
        0x000080c4:    e1a00003    ....    MOV      r0,r3
        0x000080c8:    e49df004    ....    LDR      pc,[r13],#4
    ferror
        0x000080cc:    e3e00000    ....    MVN      r0,#0
        0x000080d0:    e1a0f00e    ....    MOV      pc,r14
    Check_Flash_Id
        0x000080d4:    e59f30f8    .0..    LDR      r3,0x81d4
        0x000080d8:    e5931008    ....    LDR      r1,[r3,#8]
        0x000080dc:    e1a00003    ....    MOV      r0,r3
        0x000080e0:    e3811c80    ....    ORR      r1,r1,#0x8000
        0x000080e4:    e5801008    ....    STR      r1,[r0,#8]
        0x000080e8:    e5901008    ....    LDR      r1,[r0,#8]
        0x000080ec:    e3c11da0    ....    BIC      r1,r1,#0x2800
        0x000080f0:    e5801008    ....    STR      r1,[r0,#8]
        0x000080f4:    e59f20e0    . ..    LDR      r2,0x81dc
        0x000080f8:    e3a01090    ....    MOV      r1,#0x90
        0x000080fc:    e5c21000    ....    STRB     r1,[r2,#0]
        0x00008100:    e5901008    ....    LDR      r1,[r0,#8]
        0x00008104:    e3811d80    ....    ORR      r1,r1,#0x2000
        0x00008108:    e5801008    ....    STR      r1,[r0,#8]
        0x0000810c:    e5901008    ....    LDR      r1,[r0,#8]
        0x00008110:    e3c11c88    ....    BIC      r1,r1,#0x8800
        0x00008114:    e5801008    ....    STR      r1,[r0,#8]
        0x00008118:    e3a01000    ....    MOV      r1,#0
        0x0000811c:    e5c21000    ....    STRB     r1,[r2,#0]
        0x00008120:    e5901008    ....    LDR      r1,[r0,#8]
        0x00008124:    e3c11ca8    ....    BIC      r1,r1,#0xa800
        0x00008128:    e5801008    ....    STR      r1,[r0,#8]
        0x0000812c:    e3a00000    ....    MOV      r0,#0
        0x00008130:    e2800001    ....    ADD      r0,r0,#1
        0x00008134:    e350000a    ..P.    CMP      r0,#0xa
        0x00008138:    bafffffc    ....    BLT      0x8130
        0x0000813c:    e5d20000    ....    LDRB     r0,[r2,#0]
        0x00008140:    e1a00400    ....    MOV      r0,r0,LSL #8
        0x00008144:    e5d21000    ....    LDRB     r1,[r2,#0]
        0x00008148:    e0810000    ....    ADD      r0,r1,r0
        0x0000814c:    e5931008    ....    LDR      r1,[r3,#8]
        0x00008150:    e3811e80    ....    ORR      r1,r1,#0x800
        0x00008154:    e5831008    ....    STR      r1,[r3,#8]
        0x00008158:    e5931008    ....    LDR      r1,[r3,#8]
        0x0000815c:    e3c11ca0    ....    BIC      r1,r1,#0xa000
        0x00008160:    e5831008    ....    STR      r1,[r3,#8]
        0x00008164:    e1a0f00e    ....    MOV      pc,r14
    Flash_Reset
        0x00008168:    e59f0064    d...    LDR      r0,0x81d4
        0x0000816c:    e5901008    ....    LDR      r1,[r0,#8]
        0x00008170:    e3811c80    ....    ORR      r1,r1,#0x8000
        0x00008174:    e5801008    ....    STR      r1,[r0,#8]
        0x00008178:    e5901008    ....    LDR      r1,[r0,#8]
        0x0000817c:    e3c11da0    ....    BIC      r1,r1,#0x2800
        0x00008180:    e5801008    ....    STR      r1,[r0,#8]
        0x00008184:    e59f1050    P...    LDR      r1,0x81dc
        0x00008188:    e3a000ff    ....    MOV      r0,#0xff
        0x0000818c:    e5c10000    ....    STRB     r0,[r1,#0]
        0x00008190:    e3a00000    ....    MOV      r0,#0
        0x00008194:    e2800001    ....    ADD      r0,r0,#1
        0x00008198:    e250ce80    ..P.    SUBS     r12,r0,#0x800
        0x0000819c:    a25ccfee    ..\.    SUBGES   r12,r12,#0x3b8
        0x000081a0:    bafffffb    ....    BLT      0x8194
        0x000081a4:    e1a0f00e    ....    MOV      pc,r14
    read_nand_flash_id
        0x000081a8:    e92d4008    .@-.    STMFD    r13!,{r3,r14}
        0x000081ac:    ebffffed    ....    BL       Flash_Reset  ; 0x8168
        0x000081b0:    e28f0028    (...    ADD      r0,pc,#0x28 ; #0x81e0
        0x000081b4:    eb000034    4...    BL       _printf  ; 0x828c
        0x000081b8:    ebffffc5    ....    BL       Check_Flash_Id  ; 0x80d4
        0x000081bc:    e1a01000    ....    MOV      r1,r0
        0x000081c0:    e28f0048    H...    ADD      r0,pc,#0x48 ; #0x8210
        0x000081c4:    eb000030    0...    BL       _printf  ; 0x828c
        0x000081c8:    e28f0068    h...    ADD      r0,pc,#0x68 ; #0x8238
        0x000081cc:    e8bd4008    .@..    LDMFD    r13!,{r3,r14}
        0x000081d0:    ea00002d    -...    B        _printf  ; 0x828c
    $d
        0x000081d4:    03ff5000    .P..    DCD    67063808
        0x000081d8:    03ffd000    ....    DCD    67096576
        0x000081dc:    07fd8000    ....    DCD    134053888
        0x000081e0:    202a2a2a    ***     DCD    539634218
        0x000081e4:    696d756c    lumi    DCD    1768781164
        0x000081e8:    31353474    t451    DCD    825570420
        0x000081ec:    65742030    0 te    DCD    1702109232
        0x000081f0:    6e207473    st n    DCD    1847620723
        0x000081f4:    20646e61    and     DCD    543452769
        0x000081f8:    73616c66    flas    DCD    1935764582
        0x000081fc:    64692068    h id    DCD    1684611176
        0x00008200:    6f727020     pro    DCD    1869770784
        0x00008204:    6d617267    gram    DCD    1835102823
        0x00008208:    2a2a2a20     ***    DCD    707406368
        0x0000820c:    00000a0d    ....    DCD    2573
        0x00008210:    646e614e    Nand    DCD    1684955470
        0x00008214:    616c4620     Fla    DCD    1634485792
        0x00008218:    4b206873    sh K    DCD    1260415091
        0x0000821c:    38324639    9F28    DCD    942818873
        0x00008220:    30513830    08Q0    DCD    810629168
        0x00008224:    68632042    B ch    DCD    1751326786
        0x00008228:    69207069    ip i    DCD    1763733609
        0x0000822c:    203d2064    d =     DCD    540876900
        0x00008230:    78257830    0x%x    DCD    2015721520
        0x00008234:    000a0d20     ...    DCD    658720
        0x00008238:    202a2a2a    ***     DCD    539634218
        0x0000823c:    20646e65    end     DCD    543452773
        0x00008240:    0d2a2a2a    ***.    DCD    220867114
        0x00008244:    0000000a    ....    DCD    10
    C_Entry
    $a
        0x00008248:    e92d4008    .@-.    STMFD    r13!,{r3,r14}
        0x0000824c:    e59f001c    ....    LDR      r0,0x8270
        0x00008250:    e590103c    <...    LDR      r1,[r0,#0x3c]
        0x00008254:    e28f0018    ....    ADD      r0,pc,#0x18 ; #0x8274
        0x00008258:    eb00000b    ....    BL       _printf  ; 0x828c
        0x0000825c:    e59f0024    $...    LDR      r0,0x8288
        0x00008260:    e51f1094    ....    LDR      r1,0x81d4
        0x00008264:    e5810000    ....    STR      r0,[r1,#0]
        0x00008268:    ebffffce    ....    BL       read_nand_flash_id  ; 0x81a8

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -