代码搜索:objdump
找到约 4,575 项符合「objdump」的源代码
代码结果 4,575
www.eeworm.com/read/447738/1695022
d getaa-4b.d
#source: start.s
#source: a.s
#source: pad2p18m32.s
#source: pad16.s
#source: pad4.s
#source: pad4.s
#source: getaa.s
#as: -no-expand
#ld: -m elf64mmix
#objdump: -dr
.*: file format elf64-mmix
D
www.eeworm.com/read/447738/1695238
d pushjs4m.d
#source: nop123.s
#source: pushja.s
#source: pad2p26m32.s
#source: pad16.s
#source: pad4.s
#source: pad4.s
#source: pad4.s
#source: a.s
#source: start.s
#ld: -m mmo
#objdump: -dr
# Check that PUSHJ w
www.eeworm.com/read/447738/1695244
d jumpa-4b.d
#source: start.s
#source: a.s
#source: pad2p26m32.s
#source: pad16.s
#source: pad4.s
#source: pad4.s
#source: jumpa.s
#as: -no-expand
#ld: -m elf64mmix
#objdump: -dr
.*: file format elf64-mmix
D
www.eeworm.com/read/447738/1695265
d pushjs1bm.d
#source: nop123.s
#source: nop123.s
#source: a.s
#source: pad2p18m32.s
#source: pad16.s
#source: pad4.s
#source: pad4.s
#source: pushja.s
#source: start.s
#ld: -m mmo
#objdump: -dr
# Check that PUSHJ
www.eeworm.com/read/447738/1696018
d opcode64.d
#name: s390x opcode
#objdump: -drw
.*: +file format .*
Disassembly of section .text:
.* :
0: e3 95 af ff 00 08 [ ]*ag %r9,4095\(%r5,%r10\)
6: e3 95 af ff 00 18 [ ]*agf %r9,4095\(%r5,%r
www.eeworm.com/read/447738/1696025
d operands64.d
#name: s390x operands
#objdump: -dr
.*: +file format .*
Disassembly of section .text:
.* :
0: ec 12 00 00 00 45 [ ]*brxlg %r1,%r2,0
[ ]*2: R_390_PC16DBL test_rie\+0x2
6: c0 e5 00
www.eeworm.com/read/447738/1696060
d tlsd.d
#objdump: -dr
#as: -big
#name: sh dynamic tls
.*: +file format .*
Disassembly of section .text:
0+000 :
0: 2f c6 [ ]*mov\.l r12,@-r15
2: 2f e6 [ ]*mov\.l r14,@-r15
4: 4f 22 [ ]*sts\
www.eeworm.com/read/447738/1696072
d tlsnopic.d
#objdump: -dr
#as: -big
#name: sh non-pic tls
.*: +file format .*
Disassembly of section .text:
0+000 :
0: 2f e6 [ ]*mov\.l r14,@-r15
2: 6e f3 [ ]*mov r15,r14
4: 01 12 [ ]*stc gbr,r
www.eeworm.com/read/447738/1696724
d align.d
#objdump: -dr
#name: D30V alignment test
#as:
.*: +file format elf32-d30v
Disassembly of section .text:
0+0000 :
0: 08815a80 00f00000 abs r21, r42 || nop
8: 08815a80 00f00000 abs r2
www.eeworm.com/read/447738/1697209
d fp.d
#objdump: -s -j .data
#name: alpha fp
.*: file format .*
Contents of section .data:
0000 71a37909 4f930a40 5441789a cd4b881b q.y.O..@TAx..K..
0010 2a404f93 790971a3 789a5440 5441789a .@O.y.q