📄 sample.asm
字号:
; Listing generated by Microsoft (R) Optimizing Compiler Version 15.00.21022.08
TITLE e:\SysProg-Cupa\QSort\Sample\Sample.c
.686P
.XMM
include listing.inc
.model flat
INCLUDELIB MSVCRTD
INCLUDELIB OLDNAMES
PUBLIC ??_C@_03OFAPEBGM@?$CFs?6?$AA@ ; `string'
PUBLIC ??_C@_03EMIMMIHL@?$CK?4?$CK?$AA@ ; `string'
PUBLIC __$ArrayPad$
PUBLIC _main
EXTRN __imp___findclose:PROC
EXTRN __imp___findnext64i32:PROC
EXTRN __imp__printf:PROC
EXTRN __imp___findfirst64i32:PROC
EXTRN ___security_cookie:DWORD
EXTRN @__security_check_cookie@4:PROC
; COMDAT ??_C@_03OFAPEBGM@?$CFs?6?$AA@
; File e:\sysprog-cupa\qsort\sample\sample.c
CONST SEGMENT
??_C@_03OFAPEBGM@?$CFs?6?$AA@ DB '%s', 0aH, 00H ; `string'
CONST ENDS
; COMDAT ??_C@_03EMIMMIHL@?$CK?4?$CK?$AA@
CONST SEGMENT
??_C@_03EMIMMIHL@?$CK?4?$CK?$AA@ DB '*.*', 00H ; `string'
; Function compile flags: /Odtp /ZI
CONST ENDS
; COMDAT _main
_TEXT SEGMENT
_result$ = -308 ; size = 4
_f$ = -304 ; size = 296
_handle$ = -8 ; size = 4
__$ArrayPad$ = -4 ; size = 4
_main PROC ; COMDAT
; Line 6
push ebp
mov ebp, esp
sub esp, 372 ; 00000174H
mov eax, DWORD PTR ___security_cookie
xor eax, ebp
mov DWORD PTR __$ArrayPad$[ebp], eax
push ebx
push esi
push edi
; Line 11
lea eax, DWORD PTR _f$[ebp]
push eax
push OFFSET ??_C@_03EMIMMIHL@?$CK?4?$CK?$AA@
call DWORD PTR __imp___findfirst64i32
add esp, 8
mov DWORD PTR _handle$[ebp], eax
; Line 12
xor eax, eax
cmp DWORD PTR _handle$[ebp], -1
sete al
mov DWORD PTR _result$[ebp], eax
$LN2@main:
; Line 14
cmp DWORD PTR _result$[ebp], 0
jne SHORT $LN1@main
; Line 15
lea eax, DWORD PTR _f$[ebp+36]
push eax
push OFFSET ??_C@_03OFAPEBGM@?$CFs?6?$AA@
call DWORD PTR __imp__printf
add esp, 8
; Line 16
lea eax, DWORD PTR _f$[ebp]
push eax
mov ecx, DWORD PTR _handle$[ebp]
push ecx
call DWORD PTR __imp___findnext64i32
add esp, 8
mov DWORD PTR _result$[ebp], eax
; Line 17
jmp SHORT $LN2@main
$LN1@main:
; Line 19
mov eax, DWORD PTR _handle$[ebp]
push eax
call DWORD PTR __imp___findclose
add esp, 4
; Line 21
xor eax, eax
; Line 22
pop edi
pop esi
pop ebx
mov ecx, DWORD PTR __$ArrayPad$[ebp]
xor ecx, ebp
call @__security_check_cookie@4
mov esp, ebp
pop ebp
ret 0
_main ENDP
_TEXT ENDS
END
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -