📄 myshell.lst
字号:
========================================================================
** ELF Header Information
File Name: myshell.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x00008000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM C Compiler, ADS1.2 [Build 805]
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 10
Program header offset: 19848 (0x00004d88)
Section header offset: 19880 (0x00004da8)
Section header string table index: 9
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 9936 bytes (9880 bytes in file)
Virtual address: 0x00008000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 9132 bytes (alignment 4)
Address: 0x00008000
$a
Init
0x00008000: e10f0000 .... MRS r0,CPSR
0x00008004: e3c0003f ?... BIC r0,r0,#0x3f
0x00008008: e3800013 .... ORR r0,r0,#0x13
0x0000800c: e3800080 .... ORR r0,r0,#0x80
0x00008010: e3800040 @... ORR r0,r0,#0x40
0x00008014: e121f000 ..!. MSR CPSR_c,r0
0x00008018: e59f20bc . .. LDR r2,0x80dc
0x0000801c: e3e01000 .... MVN r1,#0
0x00008020: e5821000 .... STR r1,[r2,#0]
0x00008024: e59f20b4 . .. LDR r2,0x80e0
0x00008028: e3e01000 .... MVN r1,#0
0x0000802c: e5821000 .... STR r1,[r2,#0]
0x00008030: e59f00ac .... LDR r0,0x80e4
0x00008034: e59f10ac .... LDR r1,0x80e8
0x00008038: e5801000 .... STR r1,[r0,#0]
0x0000803c: e59f00a8 .... LDR r0,0x80ec
0x00008040: e59f10a8 .... LDR r1,0x80f0
0x00008044: e0411000 ..A. SUB r1,r1,r0
0x00008048: e59f20a4 . .. LDR r2,0x80f4
0x0000804c: e59f30a4 .0.. LDR r3,0x80f8
0x00008050: e59f50a4 .P.. LDR r5,0x80fc
0x00008054: e0433002 .0C. SUB r3,r3,r2
0x00008058: e0833001 .0.. ADD r3,r3,r1
0x0000805c: e3a01c80 .... MOV r1,#0x8000
COPYALL
0x00008060: e4914004 .@.. LDR r4,[r1],#4
0x00008064: e4804004 .@.. STR r4,[r0],#4
0x00008068: e2533004 .0S. SUBS r3,r3,#4
0x0000806c: 1afffffb .... BNE COPYALL ; 0x8060
0x00008070: e59f0078 x... LDR r0,0x80f0
COPYRW
0x00008074: e1520005 ..R. CMP r2,r5
0x00008078: 34904004 .@.4 LDRCC r4,[r0],#4
0x0000807c: 34824004 .@.4 STRCC r4,[r2],#4
0x00008080: 3afffffb ...: BCC COPYRW ; 0x8074
0x00008084: e59f0074 t... LDR r0,0x8100
0x00008088: e3a01000 .... MOV r1,#0
DOZI
0x0000808c: e1550000 ..U. CMP r5,r0
0x00008090: 34851004 ...4 STRCC r1,[r5],#4
0x00008094: 3afffffc ...: BCC DOZI ; 0x808c
0x00008098: e3a000d2 .... MOV r0,#0xd2
0x0000809c: e12ff000 ../. MSR CPSR_cxsf,r0
0x000080a0: e3a0d870 p... MOV r13,#0x700000
0x000080a4: e3a000d3 .... MOV r0,#0xd3
0x000080a8: e12ff000 ../. MSR CPSR_cxsf,r0
0x000080ac: e3a0d880 .... MOV r13,#0x800000
0x000080b0: e3a00053 S... MOV r0,#0x53
0x000080b4: e121f000 ..!. MSR CPSR_c,r0
0x000080b8: e59ff044 D... LDR pc,0x8104
irq_handler
0x000080bc: e24ee004 ..N. SUB r14,r14,#4
0x000080c0: e92d5fff ._-. STMFD r13!,{r0-r12,r14}
0x000080c4: e14f4000 .@O. MRS r4,SPSR
0x000080c8: e92d0010 ..-. STMFD r13!,{r4}
0x000080cc: eb00012b +... BL do_isr ; 0x8580
0x000080d0: e8bd0010 .... LDMFD r13!,{r4}
0x000080d4: e16ff004 ..o. MSR SPSR_cxsf,r4
0x000080d8: e8fd9fff .... LDMFD r13!,{r0-r12,pc}^
$d
0x000080dc: 03ff4008 .@.. DCD 67059720
0x000080e0: 03ff4004 .@.. DCD 67059716
0x000080e4: 03ff0000 .... DCD 67043328
0x000080e8: 87ffffa0 .... DCD 2281701280
0x000080ec: 00008000 .... DCD 32768
0x000080f0: 0000a3ac .... DCD 41900
0x000080f4: 00010000 .... DCD 65536
0x000080f8: 00010324 $... DCD 66340
0x000080fc: 000102ec .... DCD 66284
0x00008100: 00010324 $... DCD 66340
$f
0x00008104: 00008108 .... DCD 33032
myloader
$a
.text
0x00008108: e92d4010 .@-. STMFD r13!,{r4,r14}
0x0000810c: e3a04000 .@.. MOV r4,#0
0x00008110: e59f4008 .@.. LDR r4,0x8120
0x00008114: e1a0e00f .... MOV r14,pc
$p
0x00008118: e1a0f004 .... MOV pc,r4
0x0000811c: e8bd8010 .... LDMFD r13!,{r4,pc}
$d
$f
0x00008120: 00009234 4... DCD 37428
delay
$a
.text
0x00008124: e1a00000 .... NOP
0x00008128: e2402001 . @. SUB r2,r0,#1
0x0000812c: e1a00002 .... MOV r0,r2
0x00008130: e3720001 ..r. CMN r2,#1
0x00008134: 0a000005 .... BEQ 0x8150
0x00008138: e3a01b40 @... MOV r1,#0x10000
0x0000813c: e3510000 ..Q. CMP r1,#0
0x00008140: da000001 .... BLE 0x814c
0x00008144: e2411001 ..A. SUB r1,r1,#1
0x00008148: eafffffb .... B 0x813c
0x0000814c: eafffff5 .... B 0x8128
0x00008150: e1a0f00e .... MOV pc,r14
led
0x00008154: e92d401f .@-. STMFD r13!,{r0-r4,r14}
0x00008158: e1a0e001 .... MOV r14,r1
0x0000815c: e59f1268 h... LDR r1,0x83cc
0x00008160: e1a0400d .@.. MOV r4,r13
0x00008164: e891100e .... LDMIA r1,{r1-r3,r12}
0x00008168: e884100e .... STMIA r4,{r1-r3,r12}
0x0000816c: e3500003 ..P. CMP r0,#3
0x00008170: ca000005 .... BGT 0x818c
0x00008174: e3500000 ..P. CMP r0,#0
0x00008178: ba000003 .... BLT 0x818c
0x0000817c: e35e0000 ..^. CMP r14,#0
0x00008180: 0a000002 .... BEQ 0x8190
0x00008184: e35e0001 ..^. CMP r14,#1
0x00008188: 0a000000 .... BEQ 0x8190
0x0000818c: e8bd801f .... LDMFD r13!,{r0-r4,pc}
0x00008190: e59f1238 8... LDR r1,0x83d0
0x00008194: e5911000 .... LDR r1,[r1,#0]
0x00008198: e3510000 ..Q. CMP r1,#0
0x0000819c: 1a00000d .... BNE 0x81d8
0x000081a0: e59f122c ,... LDR r1,0x83d4
0x000081a4: e5911000 .... LDR r1,[r1,#0]
0x000081a8: e3811b80 .... ORR r1,r1,#0x20000
0x000081ac: e3811070 p... ORR r1,r1,#0x70
0x000081b0: e59f221c .".. LDR r2,0x83d4
0x000081b4: e5821000 .... STR r1,[r2,#0]
0x000081b8: e1a01002 .... MOV r1,r2
0x000081bc: e5911008 .... LDR r1,[r1,#8]
0x000081c0: e3c11b80 .... BIC r1,r1,#0x20000
0x000081c4: e3c11070 p... BIC r1,r1,#0x70
0x000081c8: e5821008 .... STR r1,[r2,#8]
0x000081cc: e3a01001 .... MOV r1,#1
0x000081d0: e59f21f8 .!.. LDR r2,0x83d0
0x000081d4: e5821000 .... STR r1,[r2,#0]
0x000081d8: e35e0000 ..^. CMP r14,#0
0x000081dc: 0a000004 .... BEQ 0x81f4
0x000081e0: e59f11ec .... LDR r1,0x83d4
0x000081e4: e5911008 .... LDR r1,[r1,#8]
0x000081e8: e79d2100 .!.. LDR r2,[r13,r0,LSL #2]
0x000081ec: e1811002 .... ORR r1,r1,r2
0x000081f0: ea000003 .... B 0x8204
0x000081f4: e59f11d8 .... LDR r1,0x83d4
0x000081f8: e5911008 .... LDR r1,[r1,#8]
0x000081fc: e79d2100 .!.. LDR r2,[r13,r0,LSL #2]
0x00008200: e1c11002 .... BIC r1,r1,r2
0x00008204: e59f21c8 .!.. LDR r2,0x83d4
0x00008208: e5821008 .... STR r1,[r2,#8]
0x0000820c: eaffffde .... B 0x818c
led_set_val
0x00008210: e92d4010 .@-. STMFD r13!,{r4,r14}
0x00008214: e24dd020 .M. SUB r13,r13,#0x20
0x00008218: e59f11b8 .... LDR r1,0x83d8
0x0000821c: e1a0400d .@.. MOV r4,r13
0x00008220: e891500c .P.. LDMIA r1,{r2,r3,r12,r14}
0x00008224: e884500c .P.. STMIA r4,{r2,r3,r12,r14}
0x00008228: e350000f ..P. CMP r0,#0xf
0x0000822c: da000001 .... BLE 0x8238
0x00008230: e28dd020 ... ADD r13,r13,#0x20
0x00008234: e8bd8010 .... LDMFD r13!,{r4,pc}
0x00008238: e59f119c .... LDR r1,0x83dc
0x0000823c: e5911000 .... LDR r1,[r1,#0]
0x00008240: e3510000 ..Q. CMP r1,#0
0x00008244: 1a00000d .... BNE 0x8280
0x00008248: e59f1184 .... LDR r1,0x83d4
0x0000824c: e5911000 .... LDR r1,[r1,#0]
0x00008250: e3811b80 .... ORR r1,r1,#0x20000
0x00008254: e3811070 p... ORR r1,r1,#0x70
0x00008258: e59f2174 t!.. LDR r2,0x83d4
0x0000825c: e5821000 .... STR r1,[r2,#0]
0x00008260: e1a01002 .... MOV r1,r2
0x00008264: e5911008 .... LDR r1,[r1,#8]
0x00008268: e3c11b80 .... BIC r1,r1,#0x20000
0x0000826c: e3c11070 p... BIC r1,r1,#0x70
0x00008270: e5821008 .... STR r1,[r2,#8]
0x00008274: e3a01001 .... MOV r1,#1
0x00008278: e59f215c \!.. LDR r2,0x83dc
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -