代码搜索:D触发器
找到约 10,000 项符合「D触发器」的源代码
代码结果 10,000
www.eeworm.com/read/174603/5360292
@n=d
Index of /courses/GD/jsj/GD_jsj_020b/text/chapter12/section2/part1/_notes
Index of /courses
www.eeworm.com/read/174603/5360294
@s=d
Index of /courses/GD/jsj/GD_jsj_020b/text/chapter12/section2/part1/_notes
Index of /courses
www.eeworm.com/read/174603/5360298
@m=d
Index of /courses/GD/jsj/GD_jsj_020b/text/chapter12/section2/part1/_notes
Index of /courses
www.eeworm.com/read/174603/5360301
@s=d
Index of /courses/GD/jsj/GD_jsj_020b/text/chapter12/section2/part1
Index of /courses/GD/jsj
www.eeworm.com/read/174603/5360305
@m=d
Index of /courses/GD/jsj/GD_jsj_020b/text/chapter12/section2/part1
Index of /courses/GD/jsj
www.eeworm.com/read/347503/3170164
d and.d
#objdump: -dr --prefix-addresses
#name: MIPS and
#as: -32
# Test the and macro.
.*: +file format .*mips.*
Disassembly of section .text:
0+0000 ]*> andi a0,a0,0x0
0+0004 ]*> andi a0,a0,0x1
0
www.eeworm.com/read/347503/3170542
d if.d
#objdump: -d --prefix-addresses
#name: MRI structured if
#as: -M
# Test MRI structured if pseudo-op.
.*: file format .*
Disassembly of section .text:
0+000 cmpw %d1,%d0
0+002
www.eeworm.com/read/347503/3170546
d for.d
#objdump: -d --prefix-addresses
#name: MRI structured for
#as: -M
# Test MRI structured for pseudo-op.
.*: file format .*
Disassembly of section .text:
0+000 clrw %d1
0+002
www.eeworm.com/read/347503/3170950
d and.d
#as: -EL
#objdump: -dr -EL
.*: +file format elf32-.*arc
Disassembly of section .text:
00000000 :
0: 00 84 00 60 60008400 and r0,r1,r2
4: 00 b8 4d 63 634db800 and
www.eeworm.com/read/347503/3170982
d or.d
#as: -EL
#objdump: -dr -EL
.*: +file format elf32-.*arc
Disassembly of section .text:
00000000 :
0: 00 84 00 68 68008400 or r0,r1,r2
4: 00 b8 4d 6b 6b4db800 or