代码搜索:objdump

找到约 4,575 项符合「objdump」的源代码

代码结果 4,575
www.eeworm.com/read/447738/1695022

d getaa-4b.d

#source: start.s #source: a.s #source: pad2p18m32.s #source: pad16.s #source: pad4.s #source: pad4.s #source: getaa.s #as: -no-expand #ld: -m elf64mmix #objdump: -dr .*: file format elf64-mmix D
www.eeworm.com/read/447738/1695238

d pushjs4m.d

#source: nop123.s #source: pushja.s #source: pad2p26m32.s #source: pad16.s #source: pad4.s #source: pad4.s #source: pad4.s #source: a.s #source: start.s #ld: -m mmo #objdump: -dr # Check that PUSHJ w
www.eeworm.com/read/447738/1695244

d jumpa-4b.d

#source: start.s #source: a.s #source: pad2p26m32.s #source: pad16.s #source: pad4.s #source: pad4.s #source: jumpa.s #as: -no-expand #ld: -m elf64mmix #objdump: -dr .*: file format elf64-mmix D
www.eeworm.com/read/447738/1695265

d pushjs1bm.d

#source: nop123.s #source: nop123.s #source: a.s #source: pad2p18m32.s #source: pad16.s #source: pad4.s #source: pad4.s #source: pushja.s #source: start.s #ld: -m mmo #objdump: -dr # Check that PUSHJ
www.eeworm.com/read/447738/1696018

d opcode64.d

#name: s390x opcode #objdump: -drw .*: +file format .* Disassembly of section .text: .* : 0: e3 95 af ff 00 08 [ ]*ag %r9,4095\(%r5,%r10\) 6: e3 95 af ff 00 18 [ ]*agf %r9,4095\(%r5,%r
www.eeworm.com/read/447738/1696025

d operands64.d

#name: s390x operands #objdump: -dr .*: +file format .* Disassembly of section .text: .* : 0: ec 12 00 00 00 45 [ ]*brxlg %r1,%r2,0 [ ]*2: R_390_PC16DBL test_rie\+0x2 6: c0 e5 00
www.eeworm.com/read/447738/1696060

d tlsd.d

#objdump: -dr #as: -big #name: sh dynamic tls .*: +file format .* Disassembly of section .text: 0+000 : 0: 2f c6 [ ]*mov\.l r12,@-r15 2: 2f e6 [ ]*mov\.l r14,@-r15 4: 4f 22 [ ]*sts\
www.eeworm.com/read/447738/1696072

d tlsnopic.d

#objdump: -dr #as: -big #name: sh non-pic tls .*: +file format .* Disassembly of section .text: 0+000 : 0: 2f e6 [ ]*mov\.l r14,@-r15 2: 6e f3 [ ]*mov r15,r14 4: 01 12 [ ]*stc gbr,r
www.eeworm.com/read/447738/1696724

d align.d

#objdump: -dr #name: D30V alignment test #as: .*: +file format elf32-d30v Disassembly of section .text: 0+0000 : 0: 08815a80 00f00000 abs r21, r42 || nop 8: 08815a80 00f00000 abs r2
www.eeworm.com/read/447738/1697209

d fp.d

#objdump: -s -j .data #name: alpha fp .*: file format .* Contents of section .data: 0000 71a37909 4f930a40 5441789a cd4b881b q.y.O..@TAx..K.. 0010 2a404f93 790971a3 789a5440 5441789a .@O.y.q