代码搜索:D触发器

找到约 10,000 项符合「D触发器」的源代码

代码结果 10,000
www.eeworm.com/read/278867/4140956

d and.d

#objdump: -dr #name: and # Test the and macro. .*: +file format .*mips.* No symbols in .* Disassembly of section .text: 0+0000 andi \$a0,\$a0,0 0+0004 andi \$a0,\$a0,1 0+0008 andi \$a0,\$a0,32768 0
www.eeworm.com/read/447738/1696270

d and.d

#objdump: -dr --prefix-addresses #name: MIPS and #as: -32 # Test the and macro. .*: +file format .*mips.* Disassembly of section .text: 0+0000 ]*> andi a0,a0,0x0 0+0004 ]*> andi a0,a0,0x1 0
www.eeworm.com/read/447738/1696648

d if.d

#objdump: -d --prefix-addresses #name: MRI structured if #as: -M # Test MRI structured if pseudo-op. .*: file format .* Disassembly of section .text: 0+000 cmpw %d1,%d0 0+002
www.eeworm.com/read/447738/1696652

d for.d

#objdump: -d --prefix-addresses #name: MRI structured for #as: -M # Test MRI structured for pseudo-op. .*: file format .* Disassembly of section .text: 0+000 clrw %d1 0+002
www.eeworm.com/read/447738/1697053

d and.d

#as: -EL #objdump: -dr -EL .*: +file format elf32-.*arc Disassembly of section .text: 00000000 : 0: 00 84 00 60 60008400 and r0,r1,r2 4: 00 b8 4d 63 634db800 and
www.eeworm.com/read/447738/1697085

d or.d

#as: -EL #objdump: -dr -EL .*: +file format elf32-.*arc Disassembly of section .text: 00000000 : 0: 00 84 00 68 68008400 or r0,r1,r2 4: 00 b8 4d 6b 6b4db800 or
www.eeworm.com/read/395929/2429051

d and.d

#objdump: -dr --prefix-addresses -mmips:4000 #name: MIPS and # Test the and macro. .*: +file format .*mips.* Disassembly of section .text: 0+0000 ]*> andi a0,a0,0x0 0+0004 ]*> andi a0,a0,0x
www.eeworm.com/read/395929/2429191

d if.d

#objdump: -d --prefix-addresses #name: MRI structured if #as: -M # Test MRI structured if pseudo-op. .*: file format .* Disassembly of section .text: 0+000 cmpw %d1,%d0 0+002
www.eeworm.com/read/395929/2429195

d for.d

#objdump: -d --prefix-addresses #name: MRI structured for #as: -M # Test MRI structured for pseudo-op. .*: file format .* Disassembly of section .text: 0+000 clrw %d1 0+002
www.eeworm.com/read/395929/2429391

d and.d

#as: -EL #objdump: -dr -EL .*: +file format elf32-.*arc Disassembly of section .text: 00000000 : 0: 00 84 00 60 60008400 and r0,r1,r2 4: 00 b8 4d 63 634db800 and