📄 outfile.txt
字号:
========================================================================
** ELF Header Information
File Name: ic_card.axf
Machine class: ELFCLASS32 (32-bit)
Data encoding: ELFDATA2LSB (Little endian)
Header version: EV_CURRENT (Current version)
File Type: ET_EXEC (Executable) (2)
Machine: EM_ARM (ARM)
Image Entry point: 0x30000000
Flags: EF_ARM_HASENTRY + EF_ARM_SYMSARESORTED + EF_ARM_MAPSYMSFIRST (0x02000016)
EABI conformance : ARM EABI Version 2.
Built with
ARM/Thumb Macro Assembler vsn ADS1.2 [Build 805]
ARM C Compiler, ADS1.2 [Build 805]
ARM Linker, ADS1.2 [Build 805]
Header size: 52 bytes (0x34)
Program header entry size: 32 bytes (0x20)
Section header entry size: 40 bytes (0x28)
Program header entries: 1
Section header entries: 16
Program header offset: 72816 (0x00011c70)
Section header offset: 72848 (0x00011c90)
Section header string table index: 15
========================================================================
** Program header #0 (PT_LOAD) [PF_X + PF_W + PF_R + PF_ARM_ENTRY]
Size : 25028 bytes (24848 bytes in file)
Virtual address: 0x30000000
========================================================================
** Section #1 'ER_RO' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR]
Size : 24820 bytes (alignment 4)
Address: 0x30000000
__ENTRY
ResetEntry
$a
Init
0x30000000: ea000045 E... B ResetHandler ; 0x3000011c
0x30000004: ea00001b .... B HandlerUndef ; 0x30000078
0x30000008: ea000020 ... B HandlerSWI ; 0x30000090
0x3000000c: ea00002b +... B HandlerPabort ; 0x300000c0
0x30000010: ea000024 $... B HandlerDabort ; 0x300000a8
0x30000014: eafffffe .... B 0x30000014
0x30000018: ea000010 .... B HandlerIRQ ; 0x30000060
0x3000001c: ea000009 .... B HandlerFIQ ; 0x30000048
0x30000020: ea000180 .... B EnterPWDN ; 0x30000628
ChangeBigEndian
$d
0x30000024: 0f10ee11 .... DCD 252767761
0x30000028: 0080e380 .... DCD 8446848
0x3000002c: 0f10ee01 .... DCD 252767745
0x30000030: ffffffff .... DCD 4294967295
0x30000034: ffffffff .... DCD 4294967295
0x30000038: ffffffff .... DCD 4294967295
0x3000003c: ffffffff .... DCD 4294967295
0x30000040: ffffffff .... DCD 4294967295
$a
0x30000044: ea000034 4... B ResetHandler ; 0x3000011c
HandlerFIQ
0x30000048: e24dd004 ..M. SUB r13,r13,#4
0x3000004c: e92d0001 ..-. STMFD r13!,{r0}
0x30000050: e59f00a4 .... LDR r0,0x300000fc
0x30000054: e5900000 .... LDR r0,[r0,#0]
0x30000058: e58d0004 .... STR r0,[r13,#4]
0x3000005c: e8bd8001 .... LDMFD r13!,{r0,pc}
HandlerIRQ
0x30000060: e24dd004 ..M. SUB r13,r13,#4
0x30000064: e92d0001 ..-. STMFD r13!,{r0}
0x30000068: e59f0090 .... LDR r0,0x30000100
0x3000006c: e5900000 .... LDR r0,[r0,#0]
0x30000070: e58d0004 .... STR r0,[r13,#4]
0x30000074: e8bd8001 .... LDMFD r13!,{r0,pc}
HandlerUndef
0x30000078: e24dd004 ..M. SUB r13,r13,#4
0x3000007c: e92d0001 ..-. STMFD r13!,{r0}
0x30000080: e59f007c |... LDR r0,0x30000104
0x30000084: e5900000 .... LDR r0,[r0,#0]
0x30000088: e58d0004 .... STR r0,[r13,#4]
0x3000008c: e8bd8001 .... LDMFD r13!,{r0,pc}
HandlerSWI
0x30000090: e24dd004 ..M. SUB r13,r13,#4
0x30000094: e92d0001 ..-. STMFD r13!,{r0}
0x30000098: e59f0068 h... LDR r0,0x30000108
0x3000009c: e5900000 .... LDR r0,[r0,#0]
0x300000a0: e58d0004 .... STR r0,[r13,#4]
0x300000a4: e8bd8001 .... LDMFD r13!,{r0,pc}
HandlerDabort
0x300000a8: e24dd004 ..M. SUB r13,r13,#4
0x300000ac: e92d0001 ..-. STMFD r13!,{r0}
0x300000b0: e59f0054 T... LDR r0,0x3000010c
0x300000b4: e5900000 .... LDR r0,[r0,#0]
0x300000b8: e58d0004 .... STR r0,[r13,#4]
0x300000bc: e8bd8001 .... LDMFD r13!,{r0,pc}
HandlerPabort
0x300000c0: e24dd004 ..M. SUB r13,r13,#4
0x300000c4: e92d0001 ..-. STMFD r13!,{r0}
0x300000c8: e59f0040 @... LDR r0,0x30000110
0x300000cc: e5900000 .... LDR r0,[r0,#0]
0x300000d0: e58d0004 .... STR r0,[r13,#4]
0x300000d4: e8bd8001 .... LDMFD r13!,{r0,pc}
IsrIRQ
0x300000d8: e24dd004 ..M. SUB r13,r13,#4
0x300000dc: e92d0300 ..-. STMFD r13!,{r8,r9}
0x300000e0: e59f902c ,... LDR r9,0x30000114
0x300000e4: e5999000 .... LDR r9,[r9,#0]
0x300000e8: e59f8028 (... LDR r8,0x30000118
0x300000ec: e0888109 .... ADD r8,r8,r9,LSL #2
0x300000f0: e5988000 .... LDR r8,[r8,#0]
0x300000f4: e58d8008 .... STR r8,[r13,#8]
0x300000f8: e8bd8300 .... LDMFD r13!,{r8,r9,pc}
$d
0x300000fc: 33ffff1c ...3 DCD 872415004
0x30000100: 33ffff18 ...3 DCD 872415000
0x30000104: 33ffff04 ...3 DCD 872414980
0x30000108: 33ffff08 ...3 DCD 872414984
0x3000010c: 33ffff10 ...3 DCD 872414992
0x30000110: 33ffff0c ...3 DCD 872414988
0x30000114: 4a000014 ...J DCD 1241514004
0x30000118: 33ffff20 ..3 DCD 872415008
ResetHandler
$a
0x3000011c: e3a00453 S... MOV r0,#0x53000000
0x30000120: e3a01000 .... MOV r1,#0
0x30000124: e5801000 .... STR r1,[r0,#0]
0x30000128: e59f0448 H... LDR r0,0x30000578
0x3000012c: e3e01000 .... MVN r1,#0
0x30000130: e5801000 .... STR r1,[r0,#0]
0x30000134: e59f0440 @... LDR r0,0x3000057c
0x30000138: e59f1440 @... LDR r1,0x30000580
0x3000013c: e5801000 .... STR r1,[r0,#0]
0x30000140: e3a0044c L... MOV r0,#0x4c000000
0x30000144: e3e014ff .... MVN r1,#0xff000000
0x30000148: e5801000 .... STR r1,[r0,#0]
0x3000014c: e59f0430 0... LDR r0,0x30000584
0x30000150: e3a01005 .... MOV r1,#5
0x30000154: e5801000 .... STR r1,[r0,#0]
0x30000158: ee110f10 .... MRC p15,0x0,r0,c1,c0,0
0x3000015c: e38004c0 .... ORR r0,r0,#0xc0000000
0x30000160: ee010f10 .... MCR p15,0x0,r0,c1,c0,0
0x30000164: e59f041c .... LDR r0,0x30000588
0x30000168: e59f141c .... LDR r1,0x3000058c
0x3000016c: e5801000 .... STR r1,[r0,#0]
0x30000170: e1a00000 .... NOP
0x30000174: e1a00000 .... NOP
0x30000178: e1a00000 .... NOP
0x3000017c: e1a00000 .... NOP
0x30000180: e1a00000 .... NOP
0x30000184: e1a00000 .... NOP
0x30000188: e1a00000 .... NOP
0x3000018c: e59f03fc .... LDR r0,0x30000590
0x30000190: e59f13fc .... LDR r1,0x30000594
0x30000194: e5801000 .... STR r1,[r0,#0]
0x30000198: e59f13f8 .... LDR r1,0x30000598
0x3000019c: e5910000 .... LDR r0,[r1,#0]
0x300001a0: e3100002 .... TST r0,#2
0x300001a4: 1a000140 @... BNE WAKEUP_SLEEP ; 0x300006ac
StartPointAfterSleepWakeUp
0x300001a8: e28f0b01 .... ADD r0,pc,#0x400 ; #0x300005b0
0x300001ac: e2800e03 .... ADD r0,r0,#0x30
0x300001b0: e3a01448 H... MOV r1,#0x48000000
0x300001b4: e2802034 4 .. ADD r2,r0,#0x34
0x300001b8: e4903004 .0.. LDR r3,[r0],#4
0x300001bc: e4813004 .0.. STR r3,[r1],#4
0x300001c0: e1520000 ..R. CMP r2,r0
0x300001c4: 1afffffb .... BNE 0x300001b8
0x300001c8: e59f03cc .... LDR r0,0x3000059c
0x300001cc: e3a01000 .... MOV r1,#0
0x300001d0: e5801000 .... STR r1,[r0,#0]
0x300001d4: e59f03c4 .... LDR r0,0x300005a0
0x300001d8: e3a010ff .... MOV r1,#0xff
0x300001dc: e5801000 .... STR r1,[r0,#0]
0x300001e0: e59f13bc .... LDR r1,0x300005a4
0x300001e4: e5910000 .... LDR r0,[r1,#0]
0x300001e8: e3c0003c <... BIC r0,r0,#0x3c
0x300001ec: e3100001 .... TST r0,#1
0x300001f0: 1a000012 .... BNE 0x30000240
0x300001f4: e59f03a0 .... LDR r0,0x3000059c
0x300001f8: e59f13a8 .... LDR r1,0x300005a8
0x300001fc: e5801000 .... STR r1,[r0,#0]
0x30000200: e59f039c .... LDR r0,0x300005a4
0x30000204: e3a01000 .... MOV r1,#0
0x30000208: e5801000 .... STR r1,[r0,#0]
0x3000020c: e3a01000 .... MOV r1,#0
0x30000210: e3a02000 . .. MOV r2,#0
0x30000214: e3a03000 .0.. MOV r3,#0
0x30000218: e3a04000 .@.. MOV r4,#0
0x3000021c: e3a05000 .P.. MOV r5,#0
0x30000220: e3a06000 .`.. MOV r6,#0
0x30000224: e3a07000 .p.. MOV r7,#0
0x30000228: e3a08000 .... MOV r8,#0
0x3000022c: e3a09640 @... MOV r9,#0x4000000
0x30000230: e3a005c0 .... MOV r0,#0x30000000
0x30000234: e8a001fe .... STMIA r0!,{r1-r8}
0x30000238: e2599020 .Y. SUBS r9,r9,#0x20
0x3000023c: 1afffffc .... BNE 0x30000234
0x30000240: eb000047 G... BL InitStacks ; 0x30000364
0x30000244: e3a00448 H... MOV r0,#0x48000000
0x30000248: e5900000 .... LDR r0,[r0,#0]
0x3000024c: e2100006 .... ANDS r0,r0,#6
0x30000250: 1a000026 &... BNE copy_proc_beg ; 0x300002f0
0x30000254: e24f0f97 ..O. SUB r0,pc,#0x25c ; #0x30000000
0x30000258: e3500000 ..P. CMP r0,#0
0x3000025c: 1a000023 #... BNE copy_proc_beg ; 0x300002f0
nand_boot_beg
0x30000260: e3a0544e NT.. MOV r5,#0x4e000000
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -