代码搜索:execute
找到约 10,000 项符合「execute」的源代码
代码结果 10,000
www.eeworm.com/read/478549/1351331
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/248665/4465811
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/217239/4875011
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/180437/5284568
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/299474/3852314
pl auth.pl
# +--
#
# Add this simple authentication handler into the Pi3Web server using a line
# like:
#
# CheckAuth Pi3WebPerl File="../Pi3Perl/auth.pl" Init="init" Execute="execute" AuthFile="../Pi3Perl/
www.eeworm.com/read/447892/1694135
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/392548/2495296
s dpmifun2.s
.data
ret_address:
.long 0
.text
.globl _execute_dpmi
/* ***********************
arg3
arg2
+8 arg1
+4 arg0 = fnct
+0 return address
www.eeworm.com/read/377453/9275771
v s_math.v
`timescale 1ns/10ps
module S_math (
DC_B_Src1,
DC_B_Src2,
Cst_BDEC,
DC_ADD,
DC_BCst,
DC_SUB,
DC_SADD,
DC_W_ADDKPC,
DC_W_BDEC,